E-Thesis 244 views 102 downloads
Theorising Monitoring: General Models and Access Control / FATIMA AL-HIJJI
Swansea University Author: FATIMA AL-HIJJI
Abstract
This thesis investigates algebraic models of monitoring that cover the essential aspects of data gathering, storing, and analysis in various contexts. The observation and recording of the behavior of a system or an entity over time is known as monitoring. Monitoring has many uses, including security...
| Published: |
Swansea University, Wales, UK
2025
|
|---|---|
| Institution: | Swansea University |
| Degree level: | Master of Research |
| Degree name: | MRes |
| Supervisor: | Tucker, J |
| URI: | https://cronfa.swan.ac.uk/Record/cronfa69636 |
| first_indexed |
2025-06-05T14:23:53Z |
|---|---|
| last_indexed |
2025-06-06T07:03:45Z |
| id |
cronfa69636 |
| recordtype |
RisThesis |
| fullrecord |
<?xml version="1.0"?><rfc1807><datestamp>2025-06-05T15:23:51.6880601</datestamp><bib-version>v2</bib-version><id>69636</id><entry>2025-06-05</entry><title>Theorising Monitoring: General Models and Access Control</title><swanseaauthors><author><sid>a321dda98d0e286d23f3d9f4466ba8df</sid><firstname>FATIMA</firstname><surname>AL-HIJJI</surname><name>FATIMA AL-HIJJI</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2025-06-05</date><abstract>This thesis investigates algebraic models of monitoring that cover the essential aspects of data gathering, storing, and analysis in various contexts. The observation and recording of the behavior of a system or an entity over time is known as monitoring. Monitoring has many uses, including security, regulation compliance, and performance optimization. This thesis contributes to the development of a formal framework intended for methodically examining the attributes of monitoring systems.This framework is based on a general model that isolates the fundamental concepts and procedures of monitoring (Johnson et al., 2017). We review the basic model with particular attention to: (i) a system of notifications that makes it easier to create and distribute alerts based on monitoring data; and (ii) interventions that enable the prevention or modification of particular behaviors based on monitoring data. We introduce a new feature namely timestamps that enhance the models treatment of time.We apply this revised model to case studies in access control. First, we analyse the role of monitoring in the process of login into an account. Secondly, we apply it to model the role of monitoring in getting access to physical buildings. these two case studies require us to model formally passwords, keys, registration and conformance.</abstract><type>E-Thesis</type><journal/><volume/><journalNumber/><paginationStart/><paginationEnd/><publisher/><placeOfPublication>Swansea University, Wales, UK</placeOfPublication><isbnPrint/><isbnElectronic/><issnPrint/><issnElectronic/><keywords>Monitoring systems, Surveillance theory, Data observation, Behavioural analysis, Access control, Identity management, Security systems, Privacy and ethics, Login systems, Password authentication, Digital keys, Physical access control, Building access systems, Cybersecurity, System notifications, Security event response, Discrete-time monitoring, Real-time data, Monitoring clock, Time-dependent behavior, Event logging, Timestamp formatting, Monitoring over intervals, Johnson et al. (2017),Wang and Tucker (2023), Logjects, Contextual data models, Abstract data types, Monitoring infrastructure, Surveillance culture</keywords><publishedDay>13</publishedDay><publishedMonth>3</publishedMonth><publishedYear>2025</publishedYear><publishedDate>2025-03-13</publishedDate><doi/><url/><notes>A selection of content is redacted or is partially redacted from this thesis to protect sensitive and personal information.</notes><college>COLLEGE NANME</college><CollegeCode>COLLEGE CODE</CollegeCode><institution>Swansea University</institution><supervisor>Tucker, J</supervisor><degreelevel>Master of Research</degreelevel><degreename>MRes</degreename><apcterm/><funders/><projectreference/><lastEdited>2025-06-05T15:23:51.6880601</lastEdited><Created>2025-06-05T15:09:51.6988373</Created><path><level id="1">Faculty of Science and Engineering</level><level id="2">School of Mathematics and Computer Science - Computer Science</level></path><authors><author><firstname>FATIMA</firstname><surname>AL-HIJJI</surname><order>1</order></author></authors><documents><document><filename>69636__34402__2986c44bddf14a14bf7ee5b554e173ec.pdf</filename><originalFilename>2025_Alhijji_F.final.69636.pdf</originalFilename><uploaded>2025-06-05T15:22:50.5457620</uploaded><type>Output</type><contentLength>1981901</contentLength><contentType>application/pdf</contentType><version>E-Thesis – open access</version><cronfaStatus>true</cronfaStatus><documentNotes>Copyright: The Author, Fatima Alhijji, 2025</documentNotes><copyrightCorrect>true</copyrightCorrect><language>eng</language></document></documents><OutputDurs/></rfc1807> |
| spelling |
2025-06-05T15:23:51.6880601 v2 69636 2025-06-05 Theorising Monitoring: General Models and Access Control a321dda98d0e286d23f3d9f4466ba8df FATIMA AL-HIJJI FATIMA AL-HIJJI true false 2025-06-05 This thesis investigates algebraic models of monitoring that cover the essential aspects of data gathering, storing, and analysis in various contexts. The observation and recording of the behavior of a system or an entity over time is known as monitoring. Monitoring has many uses, including security, regulation compliance, and performance optimization. This thesis contributes to the development of a formal framework intended for methodically examining the attributes of monitoring systems.This framework is based on a general model that isolates the fundamental concepts and procedures of monitoring (Johnson et al., 2017). We review the basic model with particular attention to: (i) a system of notifications that makes it easier to create and distribute alerts based on monitoring data; and (ii) interventions that enable the prevention or modification of particular behaviors based on monitoring data. We introduce a new feature namely timestamps that enhance the models treatment of time.We apply this revised model to case studies in access control. First, we analyse the role of monitoring in the process of login into an account. Secondly, we apply it to model the role of monitoring in getting access to physical buildings. these two case studies require us to model formally passwords, keys, registration and conformance. E-Thesis Swansea University, Wales, UK Monitoring systems, Surveillance theory, Data observation, Behavioural analysis, Access control, Identity management, Security systems, Privacy and ethics, Login systems, Password authentication, Digital keys, Physical access control, Building access systems, Cybersecurity, System notifications, Security event response, Discrete-time monitoring, Real-time data, Monitoring clock, Time-dependent behavior, Event logging, Timestamp formatting, Monitoring over intervals, Johnson et al. (2017),Wang and Tucker (2023), Logjects, Contextual data models, Abstract data types, Monitoring infrastructure, Surveillance culture 13 3 2025 2025-03-13 A selection of content is redacted or is partially redacted from this thesis to protect sensitive and personal information. COLLEGE NANME COLLEGE CODE Swansea University Tucker, J Master of Research MRes 2025-06-05T15:23:51.6880601 2025-06-05T15:09:51.6988373 Faculty of Science and Engineering School of Mathematics and Computer Science - Computer Science FATIMA AL-HIJJI 1 69636__34402__2986c44bddf14a14bf7ee5b554e173ec.pdf 2025_Alhijji_F.final.69636.pdf 2025-06-05T15:22:50.5457620 Output 1981901 application/pdf E-Thesis – open access true Copyright: The Author, Fatima Alhijji, 2025 true eng |
| title |
Theorising Monitoring: General Models and Access Control |
| spellingShingle |
Theorising Monitoring: General Models and Access Control FATIMA AL-HIJJI |
| title_short |
Theorising Monitoring: General Models and Access Control |
| title_full |
Theorising Monitoring: General Models and Access Control |
| title_fullStr |
Theorising Monitoring: General Models and Access Control |
| title_full_unstemmed |
Theorising Monitoring: General Models and Access Control |
| title_sort |
Theorising Monitoring: General Models and Access Control |
| author_id_str_mv |
a321dda98d0e286d23f3d9f4466ba8df |
| author_id_fullname_str_mv |
a321dda98d0e286d23f3d9f4466ba8df_***_FATIMA AL-HIJJI |
| author |
FATIMA AL-HIJJI |
| author2 |
FATIMA AL-HIJJI |
| format |
E-Thesis |
| publishDate |
2025 |
| institution |
Swansea University |
| college_str |
Faculty of Science and Engineering |
| hierarchytype |
|
| hierarchy_top_id |
facultyofscienceandengineering |
| hierarchy_top_title |
Faculty of Science and Engineering |
| hierarchy_parent_id |
facultyofscienceandengineering |
| hierarchy_parent_title |
Faculty of Science and Engineering |
| department_str |
School of Mathematics and Computer Science - Computer Science{{{_:::_}}}Faculty of Science and Engineering{{{_:::_}}}School of Mathematics and Computer Science - Computer Science |
| document_store_str |
1 |
| active_str |
0 |
| description |
This thesis investigates algebraic models of monitoring that cover the essential aspects of data gathering, storing, and analysis in various contexts. The observation and recording of the behavior of a system or an entity over time is known as monitoring. Monitoring has many uses, including security, regulation compliance, and performance optimization. This thesis contributes to the development of a formal framework intended for methodically examining the attributes of monitoring systems.This framework is based on a general model that isolates the fundamental concepts and procedures of monitoring (Johnson et al., 2017). We review the basic model with particular attention to: (i) a system of notifications that makes it easier to create and distribute alerts based on monitoring data; and (ii) interventions that enable the prevention or modification of particular behaviors based on monitoring data. We introduce a new feature namely timestamps that enhance the models treatment of time.We apply this revised model to case studies in access control. First, we analyse the role of monitoring in the process of login into an account. Secondly, we apply it to model the role of monitoring in getting access to physical buildings. these two case studies require us to model formally passwords, keys, registration and conformance. |
| published_date |
2025-03-13T07:40:45Z |
| _version_ |
1850743818866917376 |
| score |
11.088929 |

