Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,908,448 papers from all fields of science
Search
Sign In
Create Free Account
Authorization
Known as:
Authorisation
, Authorization (computer access control)
, Auth
Expand
Authorization or authorisation is the function of specifying access rights to resources related to information security and computer security in…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
ASP.NET Web Site Administration Tool
Access control
Active Directory
Administrative domain
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Hand Written Signature Recognition & Verification using Neural Network
Pradeep Kumar
,
Shekhar Singh
,
A. Garg
,
Nishant Prabhat
2013
Corpus ID: 13388669
the signature of a person is an important biometric attribute of a human being which can be used to authenticate human identity…
Expand
Highly Cited
2012
Highly Cited
2012
Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego
Rengarajan Amirtharajan
,
J. Rayappan
2012
Corpus ID: 61852360
Highly Cited
2011
Highly Cited
2011
Evolutionary Clustering and Analysis of Bibliographic Networks
Manish Gupta
,
C. Aggarwal
,
Jiawei Han
,
Yizhou Sun
International Conference on Advances in Social…
2011
Corpus ID: 15069423
In this paper, we study the problem of evolutionary clustering of multi-typed objects in a heterogeneous bibliographic network…
Expand
Highly Cited
2009
Highly Cited
2009
Self-Routing Denial-of-Service Resistant Capabilities Using In-packet Bloom Filters
Christian Esteve Rothenberg
,
P. Jokela
,
P. Nikander
,
M. Sarela
,
J. Ylitalo
European Conference on Computer Network Defense
2009
Corpus ID: 15761064
In this paper, we propose and analyze an in-packet Bloom-filter-based source-routing architecture resistant to Distributed Denial…
Expand
Highly Cited
2007
Highly Cited
2007
Characterization of the First Prototypes of Silicon Photomultiplier Fabricated at ITC-irst
C. Piemonte
,
R. Battiston
,
+5 authors
N. Zorzi
IEEE Transactions on Nuclear Science
2007
Corpus ID: 25526787
This paper reports on the electrical characterization of the first prototypes of Geiger-Mode Avalanche Photodiodes (GM-APDs) and…
Expand
Highly Cited
2007
Highly Cited
2007
System architecture and cross-layer optimization of video broadcast over WiMAX
Jianfeng Wang
,
M. Venkatachalam
,
Yuguang Fang
IEEE Journal on Selected Areas in Communications
2007
Corpus ID: 9747208
Video broadcast and mobile TV have received significant interests from both academia and industry recently. The emerging mobile…
Expand
2006
2006
The Myth about IT Security
Diana G. Oblinger
,
B. Hawkins
2006
Corpus ID: 140761080
S eeing an institution’s name in the headlines for a security breach may be among a CIO’s— and a president’s—worst nightmares…
Expand
Highly Cited
1997
Highly Cited
1997
A security concept for OLAP
Remzi Kirkgöze
,
Nevana Katic
,
Mladen Stolda
,
A. Tjoa
Database and Expert Systems Applications. 8th…
1997
Corpus ID: 39142527
A data warehouse collects and integrates data from multiple, autonomous, heterogeneous sources with the purpose of efficiently…
Expand
Highly Cited
1997
Highly Cited
1997
Robust embedded data from wavelet coefficients
J. J. Chae
,
B. S. Manjunath
Electronic imaging
1997
Corpus ID: 8094141
An approach to embedding gray scale images using a discrete wavelet transform is proposed. The proposed scheme enables using…
Expand
1990
1990
The Baltic churches and the national revival
Marite Sapiets
1990
Corpus ID: 154172691
The rapid growth of national revival movements in the Baltic republics over the last three years has not been just a political…
Expand