Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Authorization

Known as: Authorisation, Authorization (computer access control), Auth 
Authorization or authorisation is the function of specifying access rights to resources related to information security and computer security in… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
Abstract The Internet of Things (IoT) is composed of different networked objects (i.e., smart devices) which are interconnected… Expand
Is this relevant?
Highly Cited
2018
Highly Cited
2018
Convolutional neural networks are built upon the convolution operation, which extracts informative features by fusing spatial and… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
Highly Cited
2014
Highly Cited
2014
Scene recognition is one of the hallmark tasks of computer vision, allowing definition of a context for object recognition… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2012
Highly Cited
2012
The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on… Expand
  • figure 2
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2010
Highly Cited
2010
We present a declarative authorization language. Policies and credentials are expressed using predicates defined by logical… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2010
Highly Cited
2010
This article describes an authorization model suitable for cloud computing that supports hierarchical rolebased access control… Expand
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
Is this relevant?
Highly Cited
2002
Highly Cited
2002
In "grids" and "collaboratories", we find distributed communities of resource providers and resource consumers, within which… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
1999
Highly Cited
1999
In recent years, workflow management systems (WFMSs) have gained popularity in both research and commercial sectors. WFMSs are… Expand
  • figure 1
  • figure 2
  • table I
  • table II
  • table III
Is this relevant?
Highly Cited
1997
Highly Cited
1997
In this paper, we develop a new paradigm for access control and authorization management, called task-based authorization… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
1978
Highly Cited
1978
This ebook is the first authorized digital version of Kernighan and Ritchie's 1988 classic, The C Programming Language (2nd Ed… Expand
  • table 2.1
  • table 7.1
  • table 7.2
Is this relevant?