Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 205,543,168 papers from all fields of science
Search
Sign In
Create Free Account
Authorization
Known as:
Authorisation
, Authorization (computer access control)
, Auth
Expand
Authorization or authorisation is the function of specifying access rights to resources related to information security and computer security in…
Expand
Wikipedia
Create Alert
Alert
Related topics
Related topics
49 relations
ASP.NET Web Site Administration Tool
Access control
Active Directory
Administrative domain
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Learning Deep Features for Scene Recognition using Places Database
Bolei Zhou
,
À. Lapedriza
,
Jianxiong Xiao
,
A. Torralba
,
A. Oliva
NIPS
2014
Corpus ID: 1849990
Scene recognition is one of the hallmark tasks of computer vision, allowing definition of a context for object recognition…
Expand
Highly Cited
2012
Highly Cited
2012
The OAuth 2.0 Authorization Framework
D. Hardt
RFC
2012
Corpus ID: 11365074
The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on…
Expand
Review
2008
Review
2008
Program slicing
M. Harman
,
K. Gallagher
Frontiers of Software Maintenance
2008
Corpus ID: 3720268
Review
2004
Review
2004
Routing techniques in wireless sensor networks: a survey
J. Al-Karaki
,
A. Kamal
IEEE Wireless Communications
2004
Corpus ID: 1236072
Wireless sensor networks consist of small nodes with sensing, computation, and wireless communications capabilities. Many routing…
Expand
Highly Cited
2002
Highly Cited
2002
A community authorization service for group collaboration
Laura Pearlman
,
V. Welch
,
Ian T Foster
,
C. Kesselman
,
S. Tuecke
Proceedings Third International Workshop on…
2002
Corpus ID: 1178149
In "grids" and "collaboratories", we find distributed communities of resource providers and resource consumers, within which…
Expand
Highly Cited
2000
Highly Cited
2000
Role-based authorization constraints specification
Gail-Joon Ahn
,
R. Sandhu
TSEC
2000
Corpus ID: 10862920
Constraints are an important aspect of role-based access control (RBAC) and are often regarded as one of the principal…
Expand
Highly Cited
1999
Highly Cited
1999
Cognitive radio: making software radios more personal
J. Mitola
,
Gerald Q. Maguire
IEEE Wirel. Commun.
1999
Corpus ID: 28753059
Software radios are emerging as platforms for multiband multimode personal communications systems. Radio etiquette is the set of…
Expand
Review
1999
Review
1999
Information hiding-a survey
F. Petitcolas
,
Ross J. Anderson
,
M. Kuhn
Proc. IEEE
1999
Corpus ID: 2915403
Information-hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures…
Expand
Highly Cited
1996
Highly Cited
1996
Quantum cryptography
H. Zbinden
,
H. Bechmann-Pasquinucci
,
N. Gisin
,
G. Ribordy
1996
Corpus ID: 6979295
II A beautiful idea 2 A The intuition . . . . . . . . . . . . . . . 2 B Classical cryptography . . . . . . . . . 3 1 Asymmetrical…
Expand
Review
1975
Review
1975
The protection of information in computer systems
J. Saltzer
,
M. D. Schroeder
Proceedings of the IEEE
1975
Corpus ID: 269166
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
,
Terms of Service
, and
Dataset License
ACCEPT & CONTINUE