Authorization documentation

Known as: Permission, Allowance, Authorized 
Decision of the competent authorities in form of a letter, document, or verbal or electronic form, that confirms that somebody has permission to do… (More)

Topic mentions per year

Topic mentions per year

1953-2018
05019532017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2015
Review
2015
Open authorization (OAuth) is an open protocol, which allows secure authorization in a simple and standardized way from third… (More)
  • table I
  • figure 1
  • figure 2
  • figure 3
  • table II
Is this relevant?
Highly Cited
2013
Highly Cited
2013
n engl j med 369;25 nejm.org december 19, 2013 2369 Administration (FDA) has granted marketing authorization for the first high… (More)
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Nexus Authorization Logic (NAL) provides a principled basis for specifying and reasoning about credentials and authorization… (More)
Is this relevant?
Highly Cited
2006
Highly Cited
2006
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or… (More)
  • figure 1.1
  • figure 1.2
  • figure 1.3
  • figure 2.1
  • figure 2.2
Is this relevant?
Highly Cited
2005
Highly Cited
2005
This paper describes the recent results of the GridShib and MyProxy projects to integrate the public key infrastructure (PKI… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Mobile devices enable secure, convenient authorization of e-banking, retail payment, brokerage, and other types of transactions. 
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2003
Highly Cited
2003
After a short period of being not much more than a curiosity, the World-Wide Web quickly became an important medium for… (More)
  • figure 2.1
  • figure 2.2
  • figure 3.3
  • figure 3.4
  • figure 4.1
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Constraints are an important aspect of role-based access control (RBAC) and are often regarded as one of the principal… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1999
Highly Cited
1999
Java security technology originally focused on creating a safe environment in which to run potentially untrusted code downloaded… (More)
Is this relevant?
Highly Cited
1997
Highly Cited
1997
In this paper, we develop a new paradigm for access control and authorization management, called task-based authorization… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?