Дисертації з теми "Time based access control"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 дисертацій для дослідження на тему "Time based access control".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Jaggi, Felix P. "An access control model based on time and events." Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/28945.
Повний текст джерелаScience, Faculty of
Computer Science, Department of
Graduate
Alsarhani, Sami. "Reasoning about history based access control policy using past time operators of interval temporal logic." Thesis, De Montfort University, 2014. http://hdl.handle.net/2086/10406.
Повний текст джерелаKnight, G. S. "Scenario-based access control." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0021/NQ54421.pdf.
Повний текст джерелаAktoudianakis, Evangelos. "Relationship based access control." Thesis, University of Surrey, 2016. http://epubs.surrey.ac.uk/809642/.
Повний текст джерелаMagnussen, Gaute, and Stig Stavik. "Access Control in Heterogenous Health Care Systems : A comparison of Role Based Access Control Versus Decision Based Access Control." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9295.
Повний текст джерелаRole based access control (RBAC) is widely used in health care systems today. Some of the biggest systems in use at Norwegian hospitals utilizes role based integration. The basic concept of RBAC is that users are assigned to roles, permissions are assigned to roles and users acquire permissions by being members of roles. An alternative approach to the role based access distribution, is that information should be available only to those who are taking active part in a patients treatment. This approach is called decision based access control (DBAC). While some RBAC implementations grant access to a groups of people by ward, DBAC ensures that access to relevant parts of the patients medical record is given for treatment purposes regardless of which department the health care worker belongs to. Until now the granularity which the legal framework describes has been difficult to follow. The practical approach has been to grant access to entire wards or organizational units in which the patient currently resides. Due to the protection of personal privacy, it is not acceptable that any medical record is available to every clinician at all times. The most important reason to implement DBAC where RBAC exists today, is to get an access control model that is more dynamic. The users should have the access they need to perform their job at all times, but not more access than needed. With RBAC, practice has shown that it is very hard to make dynamic access rules when properties such as time and tasks of an employees work change. This study reveals that pretty much all security measures in the RBAC systems can be overridden by the use of emergency access features. These features are used extensively in everyday work at the hospitals, and thereby creates a security risk. At the same time conformance with the legal framework is not maintained. Two scenarios are simulated in a fictional RBAC and DBAC environment in this report. The results of the simulation show that a complete audit of the logs containing access right enhancements in the RBAC environment is unfeasible at a large hospital, and even checking a few percent of the entries is also a very large job. Changing from RBAC to DBAC would probably affect this situation to the better. Some economical advantages are also pointed out. If a change is made, a considerable amount of time that is used by health care workers to unblock access to information they need in their everyday work will be saved.
Klöck, Clemens. "Auction-based Medium Access Control." [S.l. : s.n.], 2007. http://digbib.ubka.uni-karlsruhe.de/volltexte/1000007323.
Повний текст джерелаMacfie, Alex. "Semantic role-based access control." Thesis, University of Westminster, 2014. https://westminsterresearch.westminster.ac.uk/item/964y2/semantic-role-based-access-control.
Повний текст джерелаBelokosztolszki, András. "Role-based access control policy administration." Thesis, University of Cambridge, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.615798.
Повний текст джерелаPang, Kenneth K. (Kenneth Kwok Kit) 1976. "Fine-grained event-based access control." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/47532.
Повний текст джерелаIncludes bibliographical references (leaf 46).
by Kenneth K. Pang.
B.S.
M.Eng.
Montrieux, Lionel. "Model-based analysis of role-based access control." Thesis, Open University, 2013. http://oro.open.ac.uk/38672/.
Повний текст джерелаStenbakk, Bjørn-Erik Sæther, and Gunnar René Øie. "Role-Based Information Ranking and Access Control." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2005. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9236.
Повний текст джерелаThis thesis presents a formal role-model based on a combination of approaches towards rolebased access control. This model is used both for access control and information ranking. Purpose: Healthcare information is required by law to be strictly secured. Thus an access control policy is needed, especially when this information is stored in a computer system. Roles, instead of just users, have been used for enforcing access control in computer systems. When a healthcare employee is granted access to information, only the relevant information should be presented by the system, providing better overview and highlighting critical information stored among less important data. The purpose of this thesis is to enable efficiency and quality improvements in healthcare by using IT-solutions that address both access control and information highlighting. Methods: We have developed a formal role model in a previous project. It has been manually tested, and some possible design choices were identified. The project report pointed out that more work was required, in the form of making design choices, implementing a prototype, and extending the model to comply with the Norwegian standard for electronic health records. In preparing this thesis, we reviewed literature about the extensions that we wanted to make to that model. This included deontic logic, delegation and temporal constraints. We made decisions on some of the possible design choices. Some of the topics that were presented in the previous project are also re-introduced in this thesis. The theories are explained through examples, which are later used as a basis for an illustrating scenario. The theory and scenario were used for requirement elicitation for the role-model, and for validating the model. Based on these requirements a formal role-model was developed. To comply with the Norwegian EHR standard the model includes delegation and context based access control. An access control list was also added to allow for patients to limit or deny access to their record information for any individual. To validate the model, we implemented parts of the model in Prolog and tested it with data from the scenario. Results: The test results show rankings for information and controls access to it correctly, thus validating the implemented parts of the model. Other results are a formal model, an executable implementation of parts of the model, recommendations for model design, and the scenario. Conclusions: Using the same role-model for access control and information ranking works, and allows using flexible ways to define policies and information needs.
Zhang, Xiushan. "L2 cache replacement based on inter-access time per access count prediction." Diss., Online access via UMI:, 2009.
Знайти повний текст джерелаHu, Wendong. "Medium access control protocols for cognitive radio based dynamics spectrum access networks." Diss., Restricted to subscribing institutions, 2008. http://proquest.umi.com/pqdweb?did=1580792591&sid=28&Fmt=2&clientId=1564&RQT=309&VName=PQD.
Повний текст джерелаKutlu, Akif. "Wireless medium access control protocols for real-time industrial applications." Thesis, University of Sussex, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.362214.
Повний текст джерелаNadipelly, Vinaykumar. "Dynamic Scoping for Browser Based Access Control System." TopSCHOLAR®, 2012. http://digitalcommons.wku.edu/theses/1149.
Повний текст джерелаHe, Qingfeng. "Requirements-Based Access Control Analysis and Policy Specification." NCSU, 2005. http://www.lib.ncsu.edu/theses/available/etd-08072005-113622/.
Повний текст джерелаChen, Liang. "Analyzing and developing role-based access control models." Thesis, Royal Holloway, University of London, 2011. http://repository.royalholloway.ac.uk/items/1de9694d-de0f-c437-5a35-82a813abdd1a/10/.
Повний текст джерелаWang, Kaining. "Context-based coalition access control for ubiquitous computing." Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/27193.
Повний текст джерелаLoock, Marianne. "CBAC – a model for conflict-based access control." Thesis, University of Pretoria, 2012. http://hdl.handle.net/2263/25423.
Повний текст джерелаThesis (PhD)--University of Pretoria, 2012.
Computer Science
unrestricted
Davuluri, Chowdary Venkata Ram Mohan. "Role-Based Access Control in Collaborative Research Environments." The Ohio State University, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=osu1285036690.
Повний текст джерелаShen, Ziyi. "Red Door: Firewall Based Access Control in ROS." Thesis, University of North Texas, 2020. https://digital.library.unt.edu/ark:/67531/metadc1752358/.
Повний текст джерелаKhayat, Etienne J. "Role-based access control (RBAC) : formal modelling and risk-based administration." Thesis, London South Bank University, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.435233.
Повний текст джерелаJemel, Mayssa. "Stockage des données locales : sécurité et disponibilité." Electronic Thesis or Diss., Paris, ENST, 2016. http://www.theses.fr/2016ENST0053.
Повний текст джерелаDue to technological advancements, people are constantly manipulating multiple connected and smart devices in their daily lives. Cross-device data management, therefore, remains the concern of several academic and industrial studies. The proposed frameworks are mainly based on proprietary solutions called private or closed solutions. This strategy has shown its deficiency on security issues, cost, developer support and customization. In recent years, however, the Web has faced a revolution in developing standardized solutions triggered by the significant improvements of HTML5. With this new version, innovative features and APIs are introduced to follow business and user requirements. The main purpose is to provide the web developer with a vendor-neutral language that enables the implementation of competing application with lower cost. These applications are related neither to the used devices nor to the installed software. The main motivation of this PhD thesis is to migrate towards the adoption of standardized solutions to ensure secure and reliable cross-device data management in both the client and server side. There is already a proposed standardized Cloud Digital Safe on the server side storage that follows the AFNOR specification while there is no standardized solution yet on the client-side. This thesis is focused on two main areas : 1) the proposal of a standardized Client Digital Safe where user data are stored locally and 2) the synchronization of these data between the Client and the Cloud Digital Safe and between the different user devices. We contribute in this research area in three ways. First, we propose a Client Digital Safe based on HTML5 Local Storage APIs. We start by strengthening the security of these APIs to be used by our Client Digital Safe. Second, we propose an efficient synchronization protocol called SyncDS with minimum resource consumption that ensures the synchronization of user data between the Client and the Cloud Digital Safe. Finally, we address security concerns, in particular, the access control on data sharing following the Digital Safe requirements
Rondinini, Giorgia. "Role-Based Access Control in ambienti cloud multi-region." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.
Знайти повний текст джерелаVillegas, Wilfred. "A trust-based access control scheme for social networks." Thesis, McGill University, 2008. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=22020.
Повний текст джерелаLes données personnelles publiées sur internet par l'entremise des nouveaux réseaux sociaux virtuels présentent des défis considérables en ce qui attrait à l'échange numérique. Cette thèse propose un système de contrôle d'accès appelé Personal Data Access Control, ou PDAC, qui permet aux utilisateurs d'échanger leurs données personnelles avec leurs amis de façon mesurée, en utilisant un calcul de confiance. Ce calcul de confiance utilise comme critères d'évaluation les interactions antérieures entre l'utilisateur et chacun de ses amis afin de classer chacune de ses connaissances dans une de trois zones de protection. Ces zones délimitent le niveau d'accès accordé aux données de l'utilisateur. De plus, l'utilisateur peut assigner certains amis come vérificateurs qui donnent leur approbation et ainsi détermine en toute confidentialité qui devrait avoir accès a ses données. Nos résultats d'analyse démontrent que le PDAC accorde privilèges d'accès aux données de façon efficace. Ces simulations démontrent aussi que le PDAC préserve la confidentialité en saisissant les niveaux de confiance qui existe dans les réseaux sociaux virtuels d'aujourd'hui actuels.
Moré, Andre, and Ermias Gebremeskel. "HopsWorks : A project-based access control model for Hadoop." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-175742.
Повний текст джерелаI dagsläget så genereras och samlas det in oerhört stora mängder data som växer i ett allt högre tempo för varje dag som går. Den korrekt analyserade datan skulle kunna erbjuda stora möjligheter för företag men problemet är att det är väldigt resurskrävande att bearbeta. Att göra det möjligt för organisationer att dela med sig utav datan skulle effektivisera det hela tack vare återanvändandet av data men det dyker då upp olika frågor kring lagliga samt etiska aspekter när man delar dessa data. Syftet med denna rapport är att få en djupare förståelse för dom olika åtkomstmetoder som kan användas vid delning av data för att sedan kunna välja den metod som man ansett vara mest lämplig att använda sig utav i en plattform. Plattformen kommer att användas av användare som vill skapa projekt där man vill analysera, dela och arbeta med DataSets, vidare kommer plattformens säkerhet att implementeras med en projekt-baserad åtkomstkontroll på API nivå och detaljerad rollbaserad åtkomstkontroll på filsystemet för att ge dataägaren full kontroll över den data som delas
Kolovski, Vladimir. "A logic-based framework for Web access control policies." College Park, Md. : University of Maryland, 2008. http://hdl.handle.net/1903/8180.
Повний текст джерелаThesis research directed by: Dept. of Computer Science. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
OLSSON, JOAKIM. "Method for gesture based authentication in physical access control." Thesis, KTH, Maskinkonstruktion (Inst.), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-209339.
Повний текст джерелаASSA Abloy is the largest global supplier of intelligent locks and security solutions. The company constantly strives to develop new and innovative solutions for physical access control. One concept the company wanted to investigate aimed to allow the user to effortlessly unlock a door using gestures, resulting in a seamless experience. The idea was to use a wearable as a credential device and identifying the user gestures with the sensors supplied by the wearable. The gesture used in this thesis project were knocks, meaning that the user unlocks the door by knocking on it. The main objective of this thesis project was to develop a system allowing knocks to be used as a method of authentication and evaluate the system based on system security and user convenience. The system developed consists of two accelerometer sensors; one located in the wearable and one located in the lock/door. The signals from each sensor are processed and analyzed to detect knocks. The time correlation between the knocks detected by each sensor are analyzed to verify that they originate from the same user. A theoretical model of the system was developed to facilitate the evaluation of the system. The evaluation of the system showed that both the system security and the user continence attained satisfying values. This thesis shows that the concept has high potential but further work is needed. The framework of methods used to evaluate the system in this thesis can in the same way be used to evaluate systems during any further work.
Jiangcheng, Qin. "User Behavior Trust Based Cloud Computing Access Control Model." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-12708.
Повний текст джерелаSubedi, Harendra. "Mathematical Modelling of Delegation in Role Based Access Control." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-222381.
Повний текст джерелаRohrer, Felix. "DR BACA: dynamic role based access control for Android." Thesis, Boston University, 2013. https://hdl.handle.net/2144/12203.
Повний текст джерелаAndroid, as an open platform, dominates the booming mobile market. However, its permission mechanism is inflexible and often results in over-privileged applications. This in turn creates severe security issues. Aiming to support the Principle of Least Privilege, we propose a Dynamic Role Based Access Control for Android (DR BACA) model and implement the DR BACA system to address these problems. Our system offers multi-user management on Android mobile devices, comparable to traditional workstations, and provides fine-grained Role Based Access Control (RBAC) to en- hance Android security at both the application and permission level. Moreover, by leveraging context-aware capabilities of mobile devices and Near Field communication (NFC) technology, our solution supports dynamic RBAC that provides more flexible access control while still being able to mitigate some of the most serious security risks on mobile devices. The DR BACA system is highly scalable, suitable for both end- users and large business environments. It simplifies configuration and management of Android devices and can help enterprises to deal with security issues by implementing a uniform security policy. We show that our DR BACA system can be deployed and used with eet:se. With a proper security policy, our evaluation shows that DR BACA can effectively mitigate the security risks posed by both malicious and vulnerable non-malicious applications while incurring only a small overall system overhead.
Ramesh, Chithrupa. "Contention-based Multiple Access Architectures for Networked Control Systems." Licentiate thesis, KTH, Reglerteknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-29781.
Повний текст джерелаQC 20110216
Alohaly, Manar Fathi. "Frameworks for Attribute-Based Access Control (ABAC) Policy Engineering." Thesis, University of North Texas, 2020. https://digital.library.unt.edu/ark:/67531/metadc1707241/.
Повний текст джерелаAdams, William Joseph. "Decentralized Trust-Based Access Control for Dynamic Collaborative Environments." Diss., Virginia Tech, 2006. http://hdl.handle.net/10919/26592.
Повний текст джерелаDCEs were assembled and changed membership as required to achieve the goals of the group. A feature of these environments was that there was no way of knowing who would join the group, no way of refusing anyone entry into group, and no way of determining how long members would remain in the group. DCEs were formed quickly to enable participants to share information while, at the same time, allowing them to retain control over the resources that they brought with them to the coalition.
This research progressed the state of the art in the fields of access control and trust management. The Trust Management System developed through this research effectively implemented a decentralized access control scheme. Each resource owner independently evaluated the reputation and risk of network members to make access decisions. Because the PMI system used past behavior as an indication of future performance, no a priori user or resource configuration was required.
Ph. D.
Park, Sang Mork. "PRIVACY-PRESERVING ATTRIBUTE-BASED ACCESS CONTROL IN A GRID." Wright State University / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=wright1283121251.
Повний текст джерелаBalasubramanian, Kavitha. "Channel adaptive real-time medium access control protocols for industrial wireless networks." [Ames, Iowa : Iowa State University], 2007.
Знайти повний текст джерелаCheng, Zhuo. "Hybrid Power Control in Time Division Scheduling Wideband Code Division Multiplex Access." Thesis, KTH, Kommunikationssystem, CoS, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91097.
Повний текст джерелаMed den höga datahastighet som Enhanced Uplink (EUL) medger kan en konventionell algoritm för effektkontroll baserad på signal to interference ratio (SIR) leda till effekthöjning beroende på självinterferens eller felaktigt SIR mål. Time division (TD) schedulering vid Wideband Code Division Multiple Access (WCDMA) anses vara en nyckelfunktion för att uppnå höga datahastigheter. I övergången mellan aktiv och inaktiv transmissionstidsintervall vid time division multiplexing (TDM) har effektoscillering/effektpeak observerats. Detta gör det nödvändigt att se över algoritmerna för effektkontroll vid olika scenarion av TD schedulering. Målet med effektkontrollen i denna studie är att minimera rise over thermal noise (RoT) för en given datahastighet givet begränsningen att kvaliteten på physical layer control channel är tillräcklig (beaktande att dedicated physical control channel (DPCCH) SIR inte understiger 3dB med en sannolikhet på som mest 5%). Ett annat mål är att minimera den lokala effektoscillationen (effektpeakar) som kan inträffa till exempel vid övergång mellan aktiv och inaktiv transmissionstidsintervall. De undersökta hybrida metoderna för effektkontroll är: (1) icke-parametrisk Generalized rake receiver SIR (GSIR) Inner Loop Power Control (ILPC) vid aktiv transmissionstidsintervall + Received Signal Code Power (RSCP) ILPC vid inaktiv transmissionstidsintervall och (2) RSCP ILPC under aktiv transmissionstidsintervall + GSIR ILPC under inaktiv transmissiontidsintervall. Båda metoderna jämförs med ren GSIR och ren RSCP ILPC. Länk nivå simulering med flera användare anslutna till en enda cell visar att: Problemet med effektpeakar observeras tydligt vid GSIR + GSIR transmit power control (TPC) men generellt sett presterar den bra i alla studerade TD scenarion. GSIR presterar bättre än andra TPC metoder beträffande RoT, speciellt i TU kanal modellen. Detta beror på att metoden är bra på att motverka momentant förändrad fading och med god precision estimerar SIR. Bland alla presenterade TPC metoder är GSIR + GSIR TPC den bästa på att behålla en god kvalitet på DPCCH kanalen. Ingen effekthöjning har observerats vid GSIR + GSIR TPC. RSCP + RSCP eliminerar problemet med effektpeakar och presterar bättre än andra TPC metoder presenterade under 3GPPs Pedestrial A (pedA) 3km/h kanal beträffande RoT. Dock är metoden generellt sett sämre på att behålla kontrollkanalens kvalitet än GSIR + GSIR TPC. GSIR + GSIR ILPC eliminerar problemet med effektpeakar och presterar bättre än GSIR power control i ett scenario med 2 och 4 TDM high data rate (HDR) UE och 2 TDM HDR UE tillsammans med 4 Code Division Multiplex (CDM) LDR UE i pedA 3km/h kanalen beträffande RoT. Dock kan inte kvaliteten på kontrollkanalen behållas i detta fall heller under inaktiv transmissionstidsintervall. Det är inte rekommenderat att använda RSCP + GSIR TPC eftersom den presterar sämst av alla TPC metoder beträffande RoT i de allra flesta fall. Till dess fördel är att den är den näst bästa på att behålla kvaliteten på kontrollkanalen. Effektpeakar har observerats när RSCP + GSIR TPC använts. För att behålla kontrollkanalens kvalitet används alltid en minimum SIR nivå ovanpå alla föreslagna TPC metoder. När det finns flera anslutna TDM HDR UEs i cellen indikerar resultaten att det är en utmaning att behålla kvalitetskraven på kontrollkanalen. På grund av detta kan det bli nödvändigt att begränsa antalet anslutna terminaler i en cell i ett TD scenario.
Neekzad, Behnam. "Space-time behavior of millimeter wave channel and directional medium access control." College Park, Md.: University of Maryland, 2008. http://hdl.handle.net/1903/8181.
Повний текст джерелаThesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Geepalla, Emsaieb Mosbah. "Model-driven approaches to analysing time- and location-dependent access control specifications." Thesis, University of Birmingham, 2013. http://etheses.bham.ac.uk//id/eprint/4562/.
Повний текст джерелаManian, Vijay. "Voting enabled role-based access control model for distributed collaboration." [Gainesville, Fla.] : University of Florida, 2005. http://purl.fcla.edu/fcla/etd/UFE0011941.
Повний текст джерелаSun, Xumin 1972. "Medium access control with congestion feedback in CDMA based networks." Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=33347.
Повний текст джерелаHsu, Chen-Ning, and 徐振寧. "Authorization-based Access Control with Time-range Limitation for App Transfer." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/85249397571134628867.
Повний текст джерела國立臺灣科技大學
資訊管理系
103
This paper design a mechanism of Authorization-based Access Control with Time-range Limitation for App Transfer. Developers upload App to the App Market, afterward he can select the setting for time-zone that can transfer App. When users download the App from the App Market, it will simultaneously obtain authorized time message of App. We propose the method for using the concept of hash functions, setting to a time-zone while we conduct a hash operation of hash value. Therefore we through several times multiple hash operation, we can obtain for several continuous time segments.
Chu, Shao-I., and 朱紹儀. "Research on Time-of-day Internet Access Management by Quota-based Priority Control." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/61428458158295196807.
Повний текст джерела國立臺灣大學
電機工程學研究所
95
There exists abusive and unfair Internet access during peak hours by users of a free-of-charge or flat-rate network even under a quota-based priority control (QPC). To effectively managing the Internet access over time based on QPC, this thesis studies and analyzes two classes of schemes: time-of-day pricing (TDP) and quota scheduling (QS). TDP is an incentive control method, where users can flexibly allocate the daily quota by virtual price. QS allocates the daily quota to individual time periods to directly and forcedly limit the maximum volume usage of each user during peak hours. The TDP design takes advantage of the empirical data to characterize user demand and quota-allocation behavior with respect to time and pricing. In-depth analyses of empirical data reveal distinctive behavior patterns of myopic and prudent quota allocations over time and both patterns indicate high preference for peak-hour access. The user models adopt general utility functions and capture how pricing affects user behavior as prudent or myopic. Preference parameters of users’ utility over time are then estimated by collecting easily measurable user volumes. The TDP design problem is then formulated and solved as a Stackelberg game. Numerical results shows that the TDP design leads to significant improvements in peak-hour abuse and fairness, peak shaving and load balancing over pure QPC. The methodology of TDP requires only two simple and short-period data collections from an operational network. One is from the network with QPC; the other is from the network without quota control. Results demonstrate the effectiveness of TDP design methodology when applied to Internet access environments with frequent changes. Two QS schemes, load balancing-based quota scheduling (LB-QS) and peak shaving-based quota scheduling (PS-QS), are proposed. LB-QS intends to equalize average traffic over time by proportional quota allocation to time periods of control. There is no empirical data of traffic usage needed for the LB-QS design. PS-QS aims at reducing total traffic of peak hours by utilizing an aggregate empirical data-based user model. This model needs the measurement data collected from a network with QPC to approximate user quota allocation behavior over time. Both QS schemes are compulsive control measures. Performances of TDP and QS are evaluated and compared over the empirical data of a 5000-user network. Results demonstrate TDP significantly outperforms both LB-QS and PS-QS in regulating the Internet access over time. This is because TDP exploits user behavior modeling and pricing to induce user behavior over time, avoiding congestion at the time of quota renewal. As for calculation complexity, the TDP design needs to solve an optimization problem, while the QS design only requires simple mathematical operations. However, the CPU time for TDP calculation takes about 1 minute. Recommendations are given for selecting an effective Internet access scheme based on data availability and traffic pattern over time. We further study how to manage the user traffic over a profitable and multi-service network by designing pricing and bandwidth allocation at the same time. Although pricing and bandwidth allocation of individual services are two important and coupled resource management functions, they are treated separately in most of the literature. In this thesis, we design for a service provider an integrated pricing and bandwidth allocation (IPBA) scheme for a popular network service, where each user is guaranteed with a minimum bandwidth for transmission according to the service class subscribed. Revenue maximization of service provisioning is the service provider’s objective. The design problem is formulated as a nonlinear programming problem. It adopts an empirical user demand model, where a user’s usage time for a service class is a function of prices. Constrained by the total bandwidth limitation, the revenue-maximizing price design induces user demands for individual classes, which in turn determines an optimal allocation of bandwidth. Analyses of the IPBA solution demonstrate that the price increases with traffic intensity while the bandwidth allocation is insensitive to the variation. Results also reveal that when users’ demand for a class is relatively sensitive to the price of other class. Over the same network capacity, the total revenue of offering more than one service classes is higher than that of offering only single service class.
Chu, Shao-I. "Research on Time-of-day Internet Access Management by Quota-based Priority Control." 2007. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-1007200711363700.
Повний текст джерелаLin, Mu-Ting, and 林睦庭. "A Study on Time-Based Assured Deletion and Access Control in Cloud Storage Service." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/12877450973031200134.
Повний текст джерела國立中興大學
資訊管理學系所
102
Cloud storage brings us a different view about storage and changes our life. From the files have to save in the disk or USB and carry around to as long as there has Internet that can download the files we need. For fault-tolerance, the files store in the cloud must have backed up, which maintain by the cloud vendor. However, there has danger that even deleted the files, the employee in cloud vendor may still own the backups, and the sensitive data may be leakage. This study proposed a time-based assured deletion for protecting the file in cloud storage for different structures. Time-based assured deletion means when creating the file, user can assign a deletion time to it. Before the deletion time, user can access the file in anytime. While the deletion time passing, the file is deleting and permanently inaccessible to anybody. It is to avoid someone may still own the file backup upon request of deleting files. The structure proposed by this study can apply on single user or organization that interacts with cloud storage to increase its practicality. Besides, the access control also proposes to protect files from unauthorized access before achieving deletion time. This study provides visions of incorporating value-added security features into today's cloud storage service.
Gama, Sithembiso G. "Energy efficient distributed receiver based cooperative medium access control protocol for wireless sensor networks." Thesis, 2013. http://hdl.handle.net/10413/11421.
Повний текст джерелаM.Sc.Eng. University of KwaZulu-Natal, Durban 2013.
Watwe, Siddharth P. "Efficient Schemes for Improving the Performance of Clock Synchronization Protocols in Wireless Sensor Networks Using TDMA- based MAC Protocols." Thesis, 2015. http://etd.iisc.ernet.in/2005/3550.
Повний текст джерелаYu, Jiunn-Der, and 余俊德. "Job-Based Access Control Model." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/49551906890045281070.
Повний текст джерела元智大學
電機與資訊工程研究所
87
Due to the popularity of the Internet and electronic commerce, information security technology becomes more and more important. Generally speaking, information security technology includes authentication, data encryption and decryption, key management and access control and so. In this plan we will study the access control model. The purpose of access control is to limit the permission and action of the legal users. Traditional access control methods, such as the access control matrix, access control lists(ACLs), mandatory access control (MAC) and discretionary access control (DAC), can not satisfy the needs of today’s demand. The Role-Based access control (RBAC), suggested by National Institute of Standards and Technology (NIST), is the access control model. In RBAC, permissions are associated with roles. How to perform permission assignment for objects and users for a complex is a problem. This paper will discuss permission assignment of objects and address an access control model to solve the problems of RBAC.
Huang, Tzu-Wei, and 黃賜瑋. "Distributed Task-Role Based Access Control." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/72068048471456468998.
Повний текст джерела國立成功大學
會計學系碩博士班
92
This research project applies the Task-Role Based Access Control mechanism to a distributed (database) environment. The Task-Role Based Access Control mechanism has a secure trusted computing based component that the traditional RBAC approach falls short of. This secure trusted computing-based component is designed according to secure trusted computing-based algorithm, which ensures the security and integrity of schedule transactions. In order to investigate its practical implications, we will apply the DTRBAC approach to a case study of a multi-national enterprise.
Huang, Wan-Ling, and 黃婉琳. "The Distributed Role-based Access Control." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/80632796341997456133.
Повний текст джерела國立臺灣大學
資訊工程學系研究所
86
In this thesis, we develop the architecture of multi-level AC (Administrato rCenter, what is to manage the configuration of the system and to check the pe rmission of the user) distributed role-based access control. In our architec ture, the higher level AC is the central server, which isresponsible for the a ffairs of the enterprise level, and the local AC is responsible for authorizin g the day-to-day work. The lower level AC is mainlyresponsible for revoking th e grant, and can be a backup server of the highestlevel AC.