Добірка наукової літератури з теми "RBTC"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "RBTC".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "RBTC"
Braun, Burkhard R., W. Steven Head, Ming X. Wang, and Alexander D. Johnson. "Identification and Characterization of TUP1-Regulated Genes in Candida albicans." Genetics 156, no. 1 (September 1, 2000): 31–44. http://dx.doi.org/10.1093/genetics/156.1.31.
Повний текст джерелаFujishiro, Noriko, Shuichi Mitsunaga, Akira Shinohara, Misaki K. Takeno, Hideki Funazaki, Gen Kimura, Kazuo Watanabe, et al. "Frequency of severe neutropenia occurring as an adverse events of gemcitabine plus cisplatin chemotherapy in patients with recurrent biliary tract cancer compared to those with unresectable biliary tract cancer." Journal of Clinical Oncology 35, no. 4_suppl (February 1, 2017): 488. http://dx.doi.org/10.1200/jco.2017.35.4_suppl.488.
Повний текст джерелаCanales-Rodríguez, Citlalin, Ana Paola Martínez-Falcón, Alfredo Ramírez-Hernández, and Aurelio Ramírez-Bautista. "Diversidad de Copestylum Macquart, 1846 (Diptera: Syrphidae) asociados a cactáceas (Cactaceae Juss, 1789) en descomposición en dos Reservas de la Biosfera de México central." Cuadernos de Biodiversidad, no. 60 (February 4, 2021): 1. http://dx.doi.org/10.14198/cdbio.2021.60.01.
Повний текст джерелаArendt, Łukasz. "Czy polski rynek pracy zmierza ku polaryzacji?" Olsztyn Economic Journal 13, no. 3 (June 26, 2018): 309–22. http://dx.doi.org/10.31648/oej.2755.
Повний текст джерелаRamírez-López, Xareni, Carlos Ramírez-Herrera, Mario V. Velasco-García, and Víctor M. Cetina-Alcalá. "Population structure and spatial distribution of oregano (Lippia graveolensH. B. K.) at the Tehuacán-Cuicatlán Biosphere Reserve, Mexico." Revista Chapingo Serie Ciencias Forestales y del Ambiente 28, no. 2 (April 30, 2022): 289–303. http://dx.doi.org/10.5154/r.rchscfa.2021.04.024.
Повний текст джерелаSumithra Ramakrishna, Shivaraja Munikrishnappa, and Arul Selvamary Thomaiyar. "The Effect of Linear, Parabolic and Inverted Parabolic Salinity Gradients on The Onset of Darcy Brinkman Rayleigh Benard Two-Component Convection in a Two-Layered System with Dufour Effect." Journal of Advanced Research in Fluid Mechanics and Thermal Sciences 101, no. 2 (January 20, 2023): 121–36. http://dx.doi.org/10.37934/arfmts.101.2.121136.
Повний текст джерелаKhan, Sara, Palma Solano-Paez, Jordan R. Hansford, Mei Lu, Salma Al-karmi, Lydia Leung, Ashley Plant-Fox, et al. "INNV-43. MORE THAN WHAT MEETS THE EYE: ETMR AN UNDER RECOGNISED ATYPICAL BRAINSTEM PRIMARY. A RARE BRAIN TUMOR CONSORTIUM (RBTC) STUDY." Neuro-Oncology 23, Supplement_6 (November 2, 2021): vi114—vi115. http://dx.doi.org/10.1093/neuonc/noab196.453.
Повний текст джерелаAdeloye, Adewale O., and Peter A. Ajibade. "Synthesis and Photophysical and Electrochemical Properties of Functionalized Mono-, Bis-, and Trisanthracenyl Bridged Ru(II) Bis(2,2′:6′,2″-terpyridine) Charge Transfer Complexes." Scientific World Journal 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/570864.
Повний текст джерелаRamírez-Pfeiffer, C., K. Nielsen, P. Smith, F. Marín-Ricalde, C. Rodríguez-Padilla, and R. Gomez-Flores. "Application of the Fluorescence Polarization Assay for Detection of Caprine Antibodies to Brucella melitensis in Areas of High Prevalence and Widespread Vaccination." Clinical and Vaccine Immunology 14, no. 3 (January 31, 2007): 299–303. http://dx.doi.org/10.1128/cvi.00350-06.
Повний текст джерелаMandujano, Salvador, Ariana Barrera-Salazar, and Antonio Vergara-Castrejón. "Similarity in plant species consumed by goat flocks in the tropical dry forest of the Cañada, Oaxaca." Revista Mexicana de Ciencias Pecuarias 10, no. 2 (June 17, 2019): 490–505. http://dx.doi.org/10.22319/rmcp.v10i2.4370.
Повний текст джерелаДисертації з теми "RBTC"
RINALDI, RICCARDO. "An empirical study on the relationship between technological innovation and the task structure of jobs." Doctoral thesis, Università di Siena, 2019. http://hdl.handle.net/11365/1082074.
Повний текст джерелаGuo, Yuxia. "User/group administration for RBAC." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0001/MQ42067.pdf.
Повний текст джерелаKhambhammettu, Hemanth. "Enforcing complex policies in RBAC." Thesis, Royal Holloway, University of London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.529765.
Повний текст джерелаBuccelli, Emanuele. "Ingegnerizzazione di RBAC-MAS in TuCSoN." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/8462/.
Повний текст джерелаDarwish, Wesam M. "Analysis of ANSI RBAC support in commercial middleware." Thesis, University of British Columbia, 2009. http://hdl.handle.net/2429/7147.
Повний текст джерелаMa, Mingchao. "Distributed RBAC for subscription-based remote network services." Thesis, University of Greenwich, 2007. http://gala.gre.ac.uk/6232/.
Повний текст джерелаBáča, Petr. "RBC model - aplikace na ČR." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-76667.
Повний текст джерелаRegateiro, Diogo José Domingues. "A secure, distributed and dynamic RBAC for relational applications." Master's thesis, Universidade de Aveiro, 2014. http://hdl.handle.net/10773/14045.
Повний текст джерелаNowadays, database application use tools like Java Database Connectivity, Hibernate or ADO.NET to access data stored in databases. These tools are designed to bring together the relational database and object-oriented programming paradigms, forsaking applied access control policies. Hence, the application developers must master the established policies as a means to develop software that is conformant with the established access control policies. Furthermore, there are situations where these policies can evolve dynamically. In these cases it becomes hard to adjust the access control mechanisms. This challenge has led to the development of an extension to the role based access control (RBAC) model where permissions are defined as a sequence of create, read, update and delete (CRUD) expressions that can be executed and the interfaces to access them. From these permissions it's possible to generate security artefacts on the client side, i.e. in a distributed manner, which allows the clients to access the stored data while satisfying the security policies defined. On top of this model extension, a security layer has also been created in order to make the access control secure and obligatory. For the RBAC model extension this work leverages a previous work that created a dynamic access control architecture for relational applications, here referred to as DACA (Dynamic Access Control Architecture). DACA uses business logic information and the defined access control policies to build dynamically the security artefacts for the applications. In situations where the access control policies can evolve dynamically, the security artefacts are adjusted automatically. This base work, however, defines as permissions CRUD expressions, which can be executed in any order, and needs an adequate security layer to authenticate users and protect the system form intruders. Hence, this work aims to create a new architecture, called “S-DRACA” (Secure, Dynamic and Distributed Role-based Access Control Architecture), which extends the work done with DACA so that it is capable of enforcing sequences of CRUD expressions that the applications can execute if the sequences are associated with their roles and the development of a security layer to make it secure. We discuss as well the performance of this system and its applicability to other environments outside of relational databases.
Atualmente, aplicações que acedem a bases de dados utilizam ferramentas como o Java Database Connectivity, Hibernate ou ADO.NET para aceder aos dados nelas armazenados. Estas ferramentas estão desenhadas para unir os paradigmas das bases de dados relacionais e da programação orientada a objetos, mas não estão preocupados com as políticas de controlo de acesso a aplicar. Portanto, os programadores de aplicações têm de dominar as políticas estabelecidas a fim de desenvolver aplicações em conformidade com as políticas de controlo de acesso estabelecidas.. Além disso, existem situações em que as políticas de controlo de acesso podem evoluir dinamicamente. Nestes casos, torna-se difícil adequar os mecanismos de controlo de acesso. Este desafio motivou o desenvolvimento de uma extensão ao modelo de controlo de acesso baseado em papeis (RBAC) que define como permissões sequências de expressões para criar, ler, atualizar e apagar (CRUD) informação e as interfaces de acesso a cada uma delas. A partir destas permissões podem ser gerados artefactos de segurança do lado dos clientes, i.e. de uma forma distribuída, que lhes permitem aceder à informação armazenada na base de dados segundo as políticas definidas. Por cima desta extenção também foi criada uma camada de segurança para tornar o controlo de acesso seguro e obrigatório. Para a extensão do modelo RBAC este trabalho baseou-se num trabalho anterior que criou uma arquitectura dinâmica de controlo de acesso para aplicações de bases de dados relacionais, aqui referida como DACA (Dynamic Access Control Architecture). DACA utiliza informação da lógica de negócio e as políticas de controlo de acesso que foram definidos para criar dinamicamente os artefactos de segurança para as aplicações. Em situações onde as políticas de controle de acesso evoluem de forma dinâmica, os artefactos de segurança são ajustados automaticamente. Este trabalho base, no entanto, define como permissões as expressões CRUD, podendo estas ser executadas em qualquer ordem, e necessita de uma camada de segurança adequada para autenticar utilizadores e proteger os dados sensíveis de intrusos. Portanto, neste trabalho, pretende-se criar uma nova arquitectura, chamada “S-DRACA” (Secure, Dynamic and Distributed Role-based Access Control Architecture), que estende o trabalho feito no âmbito do DACA para que este seja capaz de garantir que sejam cumpridas sequência de expressões CRUD que as aplicações podem executar e que estão associados aos seus papéis nas políticas RBAC e desenvolver uma camada de segurança adequada para a tornar segura. Discutimos, também, o seu desempenho e aplicabilidade em outros ambientes sem ser em bases de dados relacionais.
Squarcina, Marco <1984>. "Granalyze: towards the automatic verification of Grsecurity RBAC policies." Master's Degree Thesis, Università Ca' Foscari Venezia, 2014. http://hdl.handle.net/10579/4729.
Повний текст джерелаGoran, Sladić. "Model kontekstno zavisne kontrole pristupa u poslovnim sistemima." Phd thesis, Univerzitet u Novom Sadu, Fakultet tehničkih nauka u Novom Sadu, 2011. http://dx.doi.org/10.2298/NS2011SLADICGORAN.
Повний текст джерелаAccess control is concerned with the way in which users can access to resources in the computer system. This dissertation focuses on problems of access control for business processes. The subject of the dissertation is a formal specification of the RBAC-based context sensitive access control model for business processes. By using a context-sensitive access control it is possible to define more complex access control policies whose implementation in existing access control models for business processes is not possible or is very complicated. The given model is applicable in diferent business systems, and supports the definition of access control policies for both simple and complex business processes. The model's prototype is verified by two case studies on real business processes. The presented prototype implementation represents a proof of the proposed model's practical value.
Книги з теми "RBTC"
Meroni, Germana, ed. TRIM/RBCC Proteins. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5398-7.
Повний текст джерелаMeroni, Germana. TRIM/RBCC proteins. New York, N.Y: Springer Science+Business Media, 2012.
Знайти повний текст джерелаCorp, INDUS, and United States. Environmental Protection Agency. Control Technology Center, eds. User's manual for the RBLC BBS. Research Triangle Park, N.C: Control Technology Center, U.S. Environmental Protection Agency, 1997.
Знайти повний текст джерелаFischer-Hellmann, Klaus-Peter. Information Flow Based Security Control Beyond RBAC. Edited by Rainer Bischoff. Wiesbaden: Springer Fachmedien Wiesbaden, 2012. http://dx.doi.org/10.1007/978-3-8348-2618-3.
Повний текст джерелаCorp, INDUS, Clean Air Technology Center (U.S.), and United States. Environmental Protection Agency. Office of Air Quality Planning and Standards. Information Transfer Group, eds. User's manual for the RBLC data base. Research Triangle Park, N.C: Information Transfer Group, Office of Air Quality Planning and Standards, U.S. Environmental Protection Agency, 1998.
Знайти повний текст джерелаWoodcock, Gordon R. HRST, rocket/RBCC options: A comparative study. [Washington, DC: National Aeronautics and Space Administration, 1997.
Знайти повний текст джерелаBailey, Jon S., and Mary R. Burch. The RBT® Ethics Code. New York, NY : Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9780367814922.
Повний текст джерелаIskandar. Profil 'RBT' pos Keude Peureulak. [Darussalam, Banda Aceh?]: Pusat Penelitian Ilmu Sosial dan Budaya, Universitas Syiah Kuala, 1997.
Знайти повний текст джерелаT, Chojnacki Kent, and United States. National Aeronautics and Space Administration., eds. Rocket Based Combined Cycle (RBCC) Propulsion Technology Workshop proceedings. Huntsville, Ala: Propulsion Research Center, University of Alabama in Huntsville, 1992.
Знайти повний текст джерелаCoury, Tarek. Global indeterminacy in locally determinate RBC models. St. Louis, Mo.]: Federal Reserve Bank of St. Louis, 2007.
Знайти повний текст джерелаЧастини книг з теми "RBTC"
Wang, Lunwei, Lifeng Wei, Xiangke Liao, and Huaimin Wang. "AT-RBAC: An Authentication Trustworthiness-Based RBAC Model." In Grid and Cooperative Computing - GCC 2004 Workshops, 343–50. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30207-0_43.
Повний текст джерелаMolesini, Ambra, Enrico Denti, and Andrea Omicini. "RBAC-MAS and SODA: Experimenting RBAC in AOSE." In Engineering Societies in the Agents World IX, 69–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02562-4_4.
Повний текст джерелаVillars, P., K. Cenzual, J. Daams, R. Gladyshevskii, O. Shcherban, V. Dubenskyy, V. Kuprysyuk, and I. Savysyuk. "RbTl(SO4)2." In Structure Types. Part 8: Space Groups (156) P3m1 – (148) R-3, 339. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-540-70892-6_154.
Повний текст джерелаOleshchuk, Vladimir. "Trust-Aware RBAC." In Lecture Notes in Computer Science, 97–107. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33704-8_9.
Повний текст джерелаZhang, Yue, and James B. D. Joshi. "GEO-RBAC Model." In Encyclopedia of Database Systems, 1–2. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4899-7993-3_1509-2.
Повний текст джерелаBarker, Steve, Paul Douglas, and Terry Fanning. "Implementing RBAC Policies." In Research Directions in Data and Applications Security, 27–36. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-0-387-35697-6_3.
Повний текст джерелаZhang, Yue, and James B. D. Joshi. "GEO-RBAC Model." In Encyclopedia of Database Systems, 1244–45. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_1509.
Повний текст джерелаZhang, Yue, and James B. D. Joshi. "GEO-RBAC Model." In Encyclopedia of Database Systems, 1614–16. New York, NY: Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_1509.
Повний текст джерелаChandran, Suroop Mohan, and J. B. D. Joshi. "LoT-RBAC: A Location and Time-Based RBAC Model." In Lecture Notes in Computer Science, 361–75. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11581062_27.
Повний текст джерелаDing, Yi, Jun Jin, Jinglun Zhang, Zhongyi Wu, and Kai Hu. "SC-RBAC: A Smart Contract based RBAC Model for DApps." In Human Centered Computing, 75–85. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37429-7_8.
Повний текст джерелаТези доповідей конференцій з теми "RBTC"
Milbocker, Michael T., Gilbert T. Feke, Yakov Reznichenko, Douglas G. Goger, and Hironobu Ogasawara. "Real-Time Measurement of the Red Blood Cell Column Width of Retinal Vessels." In Noninvasive Assessment of the Visual System. Washington, D.C.: Optica Publishing Group, 1991. http://dx.doi.org/10.1364/navs.1991.tub1.
Повний текст джерелаLi, He, Weiwei Zhang, Yanhua Li, Chunyong huo, Yaorong Feng, and Lingkang Ji. "Comparison of BTC, RBTC and HLP Models in the Calculation of the Dynamic Ductile Fracture Propagation Velocities Based on the X80 Full-Scale Burst Test." In International Conference on Pipelines and Trenchless Technology. Reston, VA: American Society of Civil Engineers, 2013. http://dx.doi.org/10.1061/9780784413142.125.
Повний текст джерелаKirkpatrick, Michael S., Maria Luisa Damiani, and Elisa Bertino. "Prox-RBAC." In the 19th ACM SIGSPATIAL International Conference. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2093973.2094018.
Повний текст джерелаBertino, Elisa, Barbara Catania, Maria Luisa Damiani, and Paolo Perlasca. "GEO-RBAC." In the tenth ACM symposium. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1063979.1063985.
Повний текст джерелаYouman, Charles E. "RBAC transition." In the first ACM Workshop. New York, New York, USA: ACM Press, 1996. http://dx.doi.org/10.1145/270152.270160.
Повний текст джерелаKiviharju, Mikko. "RBAC with ABS - Implementation Practicalities for RBAC Integrity Policies." In International Conference on Security and Cryptography. SCITEPRESS - Science and and Technology Publications, 2014. http://dx.doi.org/10.5220/0005122105000509.
Повний текст джерелаFerrara, Anna Lisa, Georg Fuchsbauer, and Bogdan Warinschi. "Cryptographically Enforced RBAC." In 2013 IEEE 26th Computer Security Foundations Symposium (CSF). IEEE, 2013. http://dx.doi.org/10.1109/csf.2013.15.
Повний текст джерелаCoyne, Edward J. "Prioritizing RBAC features." In the first ACM Workshop. New York, New York, USA: ACM Press, 1996. http://dx.doi.org/10.1145/270152.270156.
Повний текст джерелаSandhu, Ravi. "Issues in RBAC." In the first ACM Workshop. New York, New York, USA: ACM Press, 1996. http://dx.doi.org/10.1145/270152.270162.
Повний текст джерелаOuyang, Kai, and James B. D. Joshi. "CT-RBAC: A Temporal RBAC Model with Conditional Periodic Time." In 2007 IEEE International Performance, Computing, and Communications Conference. IEEE, 2007. http://dx.doi.org/10.1109/pccc.2007.358928.
Повний текст джерелаЗвіти організацій з теми "RBTC"
Samios N. P. RBRC Scientific Review Committee Meeting, Volume 101. Office of Scientific and Technical Information (OSTI), January 2011. http://dx.doi.org/10.2172/1093764.
Повний текст джерелаSamios, N. P. RBRC Scientific Review Committee Meeting, Volume 97. Office of Scientific and Technical Information (OSTI), November 2009. http://dx.doi.org/10.2172/972031.
Повний текст джерелаORGANIZERS: OZAKI, S., and N. P. SAMIOS. PROCEEDINGS OF RIKEN BNL RESEARCH CENTER WORKSHOP: RBRC QCDOC COMPUTER DEDICATION AND SYMPOSIUM ON RBRC QCDOC (VOLUME 74). Office of Scientific and Technical Information (OSTI), July 2005. http://dx.doi.org/10.2172/15020005.
Повний текст джерелаHull, Julie, and Mark Markham. RBAC Driven Least Privilege Architecture For Control Systems. Office of Scientific and Technical Information (OSTI), January 2014. http://dx.doi.org/10.2172/1124080.
Повний текст джерелаEn'yo, Hideto, and Taku Izubuchi. RIKEN/RBRC Scientific Review Committee Meeting (Vol. 132). Office of Scientific and Technical Information (OSTI), May 2019. http://dx.doi.org/10.2172/1524567.
Повний текст джерелаBaltz A. RIKEN/RBRC Workshop: future Directions in High Energy QCD. Office of Scientific and Technical Information (OSTI), October 2011. http://dx.doi.org/10.2172/1044786.
Повний текст джерелаCoury, Tarek, and Yi Wen. Global Indeterminacy in Locally Determinate RBC Models. Federal Reserve Bank of St. Louis, 2007. http://dx.doi.org/10.20955/wp.2007.029.
Повний текст джерелаKlasky, Hilda B., Sashi Tadinada, Paul T. Williams, and Bennett Richard Bass. A Role-Based Access Control (RBAC) Schema for REAP Web App. Office of Scientific and Technical Information (OSTI), September 2013. http://dx.doi.org/10.2172/1093096.
Повний текст джерелаPrescott, Edward. RBC Methodology and the Development of Aggregate Economic Theory. Cambridge, MA: National Bureau of Economic Research, July 2016. http://dx.doi.org/10.3386/w22422.
Повний текст джерелаSpinella, Philip C. Immune Effects of RBC Storage in Critically Ill Patients. Fort Belvoir, VA: Defense Technical Information Center, December 2011. http://dx.doi.org/10.21236/ada560489.
Повний текст джерела