Skip to search formSkip to main contentSkip to account menu

Authorization

Known as: Authorisation, Authorization (computer access control), Auth 
Authorization or authorisation is the function of specifying access rights to resources related to information security and computer security in… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
the signature of a person is an important biometric attribute of a human being which can be used to authenticate human identity… 
Highly Cited
2011
Highly Cited
2011
In this paper, we study the problem of evolutionary clustering of multi-typed objects in a heterogeneous bibliographic network… 
Highly Cited
2009
Highly Cited
2009
In this paper, we propose and analyze an in-packet Bloom-filter-based source-routing architecture resistant to Distributed Denial… 
Highly Cited
2007
Highly Cited
2007
This paper reports on the electrical characterization of the first prototypes of Geiger-Mode Avalanche Photodiodes (GM-APDs) and… 
Highly Cited
2007
Highly Cited
2007
Video broadcast and mobile TV have received significant interests from both academia and industry recently. The emerging mobile… 
2006
2006
S eeing an institution’s name in the headlines for a security breach may be among a CIO’s— and a president’s—worst nightmares… 
Highly Cited
1997
Highly Cited
1997
A data warehouse collects and integrates data from multiple, autonomous, heterogeneous sources with the purpose of efficiently… 
Highly Cited
1997
Highly Cited
1997
An approach to embedding gray scale images using a discrete wavelet transform is proposed. The proposed scheme enables using… 
1990
1990
The rapid growth of national revival movements in the Baltic republics over the last three years has not been just a political…