An investigation into the use of workflow in companies in Gauteng
- Authors: Brecher, Dieter Ludwig
- Date: 2010-10-26T07:23:08Z
- Subjects: Workflow , Relationship marketing , Reengineering (Management) , Gauteng (South Africa)
- Type: Mini-Dissertation
- Identifier: uj:6945 , http://hdl.handle.net/10210/3455
- Description: M.Comm.
- Full Text:
- Authors: Brecher, Dieter Ludwig
- Date: 2010-10-26T07:23:08Z
- Subjects: Workflow , Relationship marketing , Reengineering (Management) , Gauteng (South Africa)
- Type: Mini-Dissertation
- Identifier: uj:6945 , http://hdl.handle.net/10210/3455
- Description: M.Comm.
- Full Text:
A prototype design for RBAC in a workflow environment
- Authors: Cholewka, Damian Grzegorz
- Date: 2012-02-13
- Subjects: Data protection , Workflow , Computer security , Computer access control
- Type: Thesis
- Identifier: uj:2044 , http://hdl.handle.net/10210/4394
- Description: M.Sc. , Role-based access control (RBAC) associates roles with privileges and users with roles. These associations are, however, static in that changes are infrequent and explicit. In certain instances this does not reflect business requirements. Access to an object should be based not only on the identity of the object and the user, but also on the actual task that must be performed. Context-sensitive access control meets the requirements in that it also considers the actual task, i.e. the context of the work to be done, when deciding whether an access should be granted or not. Workflow technology provides an appropriate environment for establishing the context of work. This dissertation discusses the implementation of a context-sensitive access control mechanism within a workflow environment. Although the prototype represents scaled-down workflow functionality, it illustrates the concept of context-sensitive access control. Access control was traditionally aimed at physically controlling access to a computer terminal. Large doors were put in place and time was divided between users who needed to work on a terminal. Today, however, physical means of restraining access have to a large extent given way to logical controls. Current access control mechanisms frequently burden the end-users with unnecessary security-related tasks. A user may, for example, be expected to assume a specific role at the beginning of a session, resulting in unnecessary multi-logons. Alternatively, users can automatically play the most senior role that they can hold and consequently receive the permissions associated with that role. The user is therefore trusted to implement the security policy and not misuse granted privileges. It is also possible for an end-user to bypass security functionality inadvertently- end-users do not always remember to do the correct thing. End-users are furthermore not necessarily adequately educated in security principles and may thus regard security-related tasks as hampering the tasks that they regard as being more important.
- Full Text:
- Authors: Cholewka, Damian Grzegorz
- Date: 2012-02-13
- Subjects: Data protection , Workflow , Computer security , Computer access control
- Type: Thesis
- Identifier: uj:2044 , http://hdl.handle.net/10210/4394
- Description: M.Sc. , Role-based access control (RBAC) associates roles with privileges and users with roles. These associations are, however, static in that changes are infrequent and explicit. In certain instances this does not reflect business requirements. Access to an object should be based not only on the identity of the object and the user, but also on the actual task that must be performed. Context-sensitive access control meets the requirements in that it also considers the actual task, i.e. the context of the work to be done, when deciding whether an access should be granted or not. Workflow technology provides an appropriate environment for establishing the context of work. This dissertation discusses the implementation of a context-sensitive access control mechanism within a workflow environment. Although the prototype represents scaled-down workflow functionality, it illustrates the concept of context-sensitive access control. Access control was traditionally aimed at physically controlling access to a computer terminal. Large doors were put in place and time was divided between users who needed to work on a terminal. Today, however, physical means of restraining access have to a large extent given way to logical controls. Current access control mechanisms frequently burden the end-users with unnecessary security-related tasks. A user may, for example, be expected to assume a specific role at the beginning of a session, resulting in unnecessary multi-logons. Alternatively, users can automatically play the most senior role that they can hold and consequently receive the permissions associated with that role. The user is therefore trusted to implement the security policy and not misuse granted privileges. It is also possible for an end-user to bypass security functionality inadvertently- end-users do not always remember to do the correct thing. End-users are furthermore not necessarily adequately educated in security principles and may thus regard security-related tasks as hampering the tasks that they regard as being more important.
- Full Text:
A preparative bioinformatic workflow for selection of putative genetically and epigenetically regulated loci as applied to the vitamin D receptor gene
- Authors: Saccone, Donovan Sean
- Date: 2014-10-08
- Subjects: Tuberculosis - Genetic aspects , Vitamin D - Receptors , Bioinformatics , Workflow
- Type: Thesis
- Identifier: uj:12565 , http://hdl.handle.net/10210/12357
- Description: M.Sc. (Biochemistry) , The vitamin D receptor (VDR) has been implicated in communicable diseases such as tuberculosis (TB), HIV infection and leprosy, as well as development or prognosis of noncommunicable diseases such as multiple sclerosis, lupus, type I diabetes mellitus, and osteoporosis. The burden of these diseases is often higher in specific population groups, for instance the higher TB burden of African as compared to White South Africans. Besides genetics, epigenetic factors play a role in differential disease susceptibility and prognosis between population groups. To uncover the cause of differential susceptibility to VDR-related diseases, it is crucial that population group-specific variations in genetic and epigenetic mechanisms that regulate VDR are identified. Increases in predictive power of in silico tools, and the recent explosion in availability of genome-wide genetic and epigenetic data made bioinformatics an attractive option to preselect regions to study in the VDR...
- Full Text:
- Authors: Saccone, Donovan Sean
- Date: 2014-10-08
- Subjects: Tuberculosis - Genetic aspects , Vitamin D - Receptors , Bioinformatics , Workflow
- Type: Thesis
- Identifier: uj:12565 , http://hdl.handle.net/10210/12357
- Description: M.Sc. (Biochemistry) , The vitamin D receptor (VDR) has been implicated in communicable diseases such as tuberculosis (TB), HIV infection and leprosy, as well as development or prognosis of noncommunicable diseases such as multiple sclerosis, lupus, type I diabetes mellitus, and osteoporosis. The burden of these diseases is often higher in specific population groups, for instance the higher TB burden of African as compared to White South Africans. Besides genetics, epigenetic factors play a role in differential disease susceptibility and prognosis between population groups. To uncover the cause of differential susceptibility to VDR-related diseases, it is crucial that population group-specific variations in genetic and epigenetic mechanisms that regulate VDR are identified. Increases in predictive power of in silico tools, and the recent explosion in availability of genome-wide genetic and epigenetic data made bioinformatics an attractive option to preselect regions to study in the VDR...
- Full Text:
- «
- ‹
- 1
- ›
- »