No Cover Image

E-Thesis 244 views 102 downloads

Theorising Monitoring: General Models and Access Control / FATIMA AL-HIJJI

Swansea University Author: FATIMA AL-HIJJI

Abstract

This thesis investigates algebraic models of monitoring that cover the essential aspects of data gathering, storing, and analysis in various contexts. The observation and recording of the behavior of a system or an entity over time is known as monitoring. Monitoring has many uses, including security...

Full description

Published: Swansea University, Wales, UK 2025
Institution: Swansea University
Degree level: Master of Research
Degree name: MRes
Supervisor: Tucker, J
URI: https://cronfa.swan.ac.uk/Record/cronfa69636
Abstract: This thesis investigates algebraic models of monitoring that cover the essential aspects of data gathering, storing, and analysis in various contexts. The observation and recording of the behavior of a system or an entity over time is known as monitoring. Monitoring has many uses, including security, regulation compliance, and performance optimization. This thesis contributes to the development of a formal framework intended for methodically examining the attributes of monitoring systems.This framework is based on a general model that isolates the fundamental concepts and procedures of monitoring (Johnson et al., 2017). We review the basic model with particular attention to: (i) a system of notifications that makes it easier to create and distribute alerts based on monitoring data; and (ii) interventions that enable the prevention or modification of particular behaviors based on monitoring data. We introduce a new feature namely timestamps that enhance the models treatment of time.We apply this revised model to case studies in access control. First, we analyse the role of monitoring in the process of login into an account. Secondly, we apply it to model the role of monitoring in getting access to physical buildings. these two case studies require us to model formally passwords, keys, registration and conformance.
Item Description: A selection of content is redacted or is partially redacted from this thesis to protect sensitive and personal information.
Keywords: Monitoring systems, Surveillance theory, Data observation, Behavioural analysis, Access control, Identity management, Security systems, Privacy and ethics, Login systems, Password authentication, Digital keys, Physical access control, Building access systems, Cybersecurity, System notifications, Security event response, Discrete-time monitoring, Real-time data, Monitoring clock, Time-dependent behavior, Event logging, Timestamp formatting, Monitoring over intervals, Johnson et al. (2017),Wang and Tucker (2023), Logjects, Contextual data models, Abstract data types, Monitoring infrastructure, Surveillance culture
College: Faculty of Science and Engineering