Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Authorization

Known as: Authorisation, Authorization (computer access control), Auth 
Authorization or authorisation is the function of specifying access rights to resources related to information security and computer security in… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on… Expand
  • figure 2
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Review
2004
Review
2004
Wireless sensor networks consist of small nodes with sensing, computation, and wireless communications capabilities. Many routing… Expand
  • figure 4
Highly Cited
2004
Highly Cited
2004
White LED offers advantageous properties such as high brightness, reliability, lower power consumption and long lifetime. White… Expand
  • figure 1
  • figure 2
  • table I
  • figure 3
  • figure 4
Highly Cited
2002
Highly Cited
2002
In "grids" and "collaboratories", we find distributed communities of resource providers and resource consumers, within which… Expand
  • figure 1
  • figure 2
Highly Cited
1999
Highly Cited
1999
Software radios are emerging as platforms for multiband multimode personal communications systems. Radio etiquette is the set of… Expand
  • figure 1
  • figure 2
  • figure 4
  • table 1
  • table 2
Review
1999
Review
1999
Information-hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures… Expand
  • table I
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Highly Cited
1997
Highly Cited
1997
In this paper, we develop a new paradigm for access control and authorization management, called task-based authorization… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Review
1996
Review
1996
Program slicing is a decomposition technique that slides program components not relevant to a chosen computation, referred to as… Expand
  • figure 1
  • figure 2
  • figure 3
Highly Cited
1978
Highly Cited
1978
This ebook is the first authorized digital version of Kernighan and Ritchie's 1988 classic, The C Programming Language (2nd Ed… Expand
  • table 2.1
  • table 7.1
  • table 7.2
Review
1975
Review
1975
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It… Expand
  • table I
  • figure 1
  • figure 2
  • figure 3
  • figure 4