Authorization

Known as: Authorisation, Authorization (computer access control), Auth 
Authorization or authorisation is the function of specifying access rights to resources related to information security and computer security in… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1943-2018
0500100019432017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on… (More)
  • figure 2
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2008
Highly Cited
2008
DKAL is a new declarative authorization language for distributed systems. It is based on existential fixed-point logic and is… (More)
  • figure 7
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We address the problem of authorization in large-scale, open, distributed systems. Authorization decisions are needed in… (More)
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We briefly describe the authorization requirements, focusing on the framework of the DataGrid and DataTAG Projects and illustrate… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Virtual organizations (VOs) are communities of resource providers and users distributed over multiple policy domains. These VOs… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
In “Grids” and “collaboratories,” we find distributed communities of resource providers and resource consumers, within which… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2000
Highly Cited
2000
The extensible markup language (XML) is a promising standard for describing semi-structured information and contents on the… (More)
  • figure 1
  • table 1
  • figure 2
  • table 2
  • figure 3
Is this relevant?
Highly Cited
1999
Highly Cited
1999
In recent years, workflow management systems (WFMSs) have gained popularity in both research and commercial sectors. WFMSs are… (More)
  • figure 1
  • figure 2
  • table I
  • table II
  • table III
Is this relevant?
Highly Cited
1997
Highly Cited
1997
We propose two extensions to the authorization model for relational databases defined originally by Griffiths and Wade. The first… (More)
  • figure 1
  • figure 2
  • figure 5
  • figure 6
  • figure 7
Is this relevant?
Highly Cited
1996
Highly Cited
1996
Worldlows represent processes in manufacturing and office environments that typically consist ofseverai well-defined activities… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?