No Cover Image

E-Thesis 244 views 102 downloads

Theorising Monitoring: General Models and Access Control / FATIMA AL-HIJJI

Swansea University Author: FATIMA AL-HIJJI

Abstract

This thesis investigates algebraic models of monitoring that cover the essential aspects of data gathering, storing, and analysis in various contexts. The observation and recording of the behavior of a system or an entity over time is known as monitoring. Monitoring has many uses, including security...

Full description

Published: Swansea University, Wales, UK 2025
Institution: Swansea University
Degree level: Master of Research
Degree name: MRes
Supervisor: Tucker, J
URI: https://cronfa.swan.ac.uk/Record/cronfa69636
first_indexed 2025-06-05T14:23:53Z
last_indexed 2025-06-06T07:03:45Z
id cronfa69636
recordtype RisThesis
fullrecord <?xml version="1.0"?><rfc1807><datestamp>2025-06-05T15:23:51.6880601</datestamp><bib-version>v2</bib-version><id>69636</id><entry>2025-06-05</entry><title>Theorising Monitoring: General Models and Access Control</title><swanseaauthors><author><sid>a321dda98d0e286d23f3d9f4466ba8df</sid><firstname>FATIMA</firstname><surname>AL-HIJJI</surname><name>FATIMA AL-HIJJI</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2025-06-05</date><abstract>This thesis investigates algebraic models of monitoring that cover the essential aspects of data gathering, storing, and analysis in various contexts. The observation and recording of the behavior of a system or an entity over time is known as monitoring. Monitoring has many uses, including security, regulation compliance, and performance optimization. This thesis contributes to the development of a formal framework intended for methodically examining the attributes of monitoring systems.This framework is based on a general model that isolates the fundamental concepts and procedures of monitoring (Johnson et al., 2017). We review the basic model with particular attention to: (i) a system of noti&#xFB01;cations that makes it easier to create and distribute alerts based on monitoring data; and (ii) interventions that enable the prevention or modi&#xFB01;cation of particular behaviors based on monitoring data. We introduce a new feature namely timestamps that enhance the models treatment of time.We apply this revised model to case studies in access control. First, we analyse the role of monitoring in the process of login into an account. Secondly, we apply it to model the role of monitoring in getting access to physical buildings. these two case studies require us to model formally passwords, keys, registration and conformance.</abstract><type>E-Thesis</type><journal/><volume/><journalNumber/><paginationStart/><paginationEnd/><publisher/><placeOfPublication>Swansea University, Wales, UK</placeOfPublication><isbnPrint/><isbnElectronic/><issnPrint/><issnElectronic/><keywords>Monitoring systems, Surveillance theory, Data observation, Behavioural analysis, Access control, Identity management, Security systems, Privacy and ethics, Login systems, Password authentication, Digital keys, Physical access control, Building access systems, Cybersecurity, System notifications, Security event response, Discrete-time monitoring, Real-time data, Monitoring clock, Time-dependent behavior, Event logging, Timestamp formatting, Monitoring over intervals, Johnson et al. (2017),Wang and Tucker (2023), Logjects, Contextual data models, Abstract data types, Monitoring infrastructure, Surveillance culture</keywords><publishedDay>13</publishedDay><publishedMonth>3</publishedMonth><publishedYear>2025</publishedYear><publishedDate>2025-03-13</publishedDate><doi/><url/><notes>A selection of content is redacted or is partially redacted from this thesis to protect sensitive and personal information.</notes><college>COLLEGE NANME</college><CollegeCode>COLLEGE CODE</CollegeCode><institution>Swansea University</institution><supervisor>Tucker, J</supervisor><degreelevel>Master of Research</degreelevel><degreename>MRes</degreename><apcterm/><funders/><projectreference/><lastEdited>2025-06-05T15:23:51.6880601</lastEdited><Created>2025-06-05T15:09:51.6988373</Created><path><level id="1">Faculty of Science and Engineering</level><level id="2">School of Mathematics and Computer Science - Computer Science</level></path><authors><author><firstname>FATIMA</firstname><surname>AL-HIJJI</surname><order>1</order></author></authors><documents><document><filename>69636__34402__2986c44bddf14a14bf7ee5b554e173ec.pdf</filename><originalFilename>2025_Alhijji_F.final.69636.pdf</originalFilename><uploaded>2025-06-05T15:22:50.5457620</uploaded><type>Output</type><contentLength>1981901</contentLength><contentType>application/pdf</contentType><version>E-Thesis &#x2013; open access</version><cronfaStatus>true</cronfaStatus><documentNotes>Copyright: The Author, Fatima Alhijji, 2025</documentNotes><copyrightCorrect>true</copyrightCorrect><language>eng</language></document></documents><OutputDurs/></rfc1807>
spelling 2025-06-05T15:23:51.6880601 v2 69636 2025-06-05 Theorising Monitoring: General Models and Access Control a321dda98d0e286d23f3d9f4466ba8df FATIMA AL-HIJJI FATIMA AL-HIJJI true false 2025-06-05 This thesis investigates algebraic models of monitoring that cover the essential aspects of data gathering, storing, and analysis in various contexts. The observation and recording of the behavior of a system or an entity over time is known as monitoring. Monitoring has many uses, including security, regulation compliance, and performance optimization. This thesis contributes to the development of a formal framework intended for methodically examining the attributes of monitoring systems.This framework is based on a general model that isolates the fundamental concepts and procedures of monitoring (Johnson et al., 2017). We review the basic model with particular attention to: (i) a system of notifications that makes it easier to create and distribute alerts based on monitoring data; and (ii) interventions that enable the prevention or modification of particular behaviors based on monitoring data. We introduce a new feature namely timestamps that enhance the models treatment of time.We apply this revised model to case studies in access control. First, we analyse the role of monitoring in the process of login into an account. Secondly, we apply it to model the role of monitoring in getting access to physical buildings. these two case studies require us to model formally passwords, keys, registration and conformance. E-Thesis Swansea University, Wales, UK Monitoring systems, Surveillance theory, Data observation, Behavioural analysis, Access control, Identity management, Security systems, Privacy and ethics, Login systems, Password authentication, Digital keys, Physical access control, Building access systems, Cybersecurity, System notifications, Security event response, Discrete-time monitoring, Real-time data, Monitoring clock, Time-dependent behavior, Event logging, Timestamp formatting, Monitoring over intervals, Johnson et al. (2017),Wang and Tucker (2023), Logjects, Contextual data models, Abstract data types, Monitoring infrastructure, Surveillance culture 13 3 2025 2025-03-13 A selection of content is redacted or is partially redacted from this thesis to protect sensitive and personal information. COLLEGE NANME COLLEGE CODE Swansea University Tucker, J Master of Research MRes 2025-06-05T15:23:51.6880601 2025-06-05T15:09:51.6988373 Faculty of Science and Engineering School of Mathematics and Computer Science - Computer Science FATIMA AL-HIJJI 1 69636__34402__2986c44bddf14a14bf7ee5b554e173ec.pdf 2025_Alhijji_F.final.69636.pdf 2025-06-05T15:22:50.5457620 Output 1981901 application/pdf E-Thesis – open access true Copyright: The Author, Fatima Alhijji, 2025 true eng
title Theorising Monitoring: General Models and Access Control
spellingShingle Theorising Monitoring: General Models and Access Control
FATIMA AL-HIJJI
title_short Theorising Monitoring: General Models and Access Control
title_full Theorising Monitoring: General Models and Access Control
title_fullStr Theorising Monitoring: General Models and Access Control
title_full_unstemmed Theorising Monitoring: General Models and Access Control
title_sort Theorising Monitoring: General Models and Access Control
author_id_str_mv a321dda98d0e286d23f3d9f4466ba8df
author_id_fullname_str_mv a321dda98d0e286d23f3d9f4466ba8df_***_FATIMA AL-HIJJI
author FATIMA AL-HIJJI
author2 FATIMA AL-HIJJI
format E-Thesis
publishDate 2025
institution Swansea University
college_str Faculty of Science and Engineering
hierarchytype
hierarchy_top_id facultyofscienceandengineering
hierarchy_top_title Faculty of Science and Engineering
hierarchy_parent_id facultyofscienceandengineering
hierarchy_parent_title Faculty of Science and Engineering
department_str School of Mathematics and Computer Science - Computer Science{{{_:::_}}}Faculty of Science and Engineering{{{_:::_}}}School of Mathematics and Computer Science - Computer Science
document_store_str 1
active_str 0
description This thesis investigates algebraic models of monitoring that cover the essential aspects of data gathering, storing, and analysis in various contexts. The observation and recording of the behavior of a system or an entity over time is known as monitoring. Monitoring has many uses, including security, regulation compliance, and performance optimization. This thesis contributes to the development of a formal framework intended for methodically examining the attributes of monitoring systems.This framework is based on a general model that isolates the fundamental concepts and procedures of monitoring (Johnson et al., 2017). We review the basic model with particular attention to: (i) a system of notifications that makes it easier to create and distribute alerts based on monitoring data; and (ii) interventions that enable the prevention or modification of particular behaviors based on monitoring data. We introduce a new feature namely timestamps that enhance the models treatment of time.We apply this revised model to case studies in access control. First, we analyse the role of monitoring in the process of login into an account. Secondly, we apply it to model the role of monitoring in getting access to physical buildings. these two case studies require us to model formally passwords, keys, registration and conformance.
published_date 2025-03-13T07:40:45Z
_version_ 1850743818866917376
score 11.088929