Skip to search formSkip to main contentSkip to account menu

Authorization

Known as: Authorisation, Authorization (computer access control), Auth 
Authorization or authorisation is the function of specifying access rights to resources related to information security and computer security in… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2008
Highly Cited
2008
Epoch is the instant of significant excitation of the vocal-tract system during production of speech. For most voiced speech, the… 
Highly Cited
2007
Highly Cited
2007
Data from 574 participants were used to assess perceptions of message, site, and sponsor credibility across four genres of… 
Highly Cited
2004
Highly Cited
2004
In this paper we describe our experience in applying KAoS services to ensure policy compliance for Semantic Web Services workflow… 
Highly Cited
2004
Highly Cited
2004
Preface xi Acknowledgments xxvii PART I: The International Humanitarian as Advocate and Activist 1 Chapter One: The International… 
Highly Cited
2002
Highly Cited
2002
Geographical factors play a critical role in determining how a civil war is fought and who will prevail. Drawing on the PRIO… 
Highly Cited
2002
Highly Cited
2002
A grid computing system is a geographically distributed environment with autonomous domains that share resources amongst… 
Highly Cited
2001
Highly Cited
2001
July mean temperature and annual precipipation during the last 9900 cal. yr BP were recon structed from pollen assemblages… 
Highly Cited
2000
Highly Cited
2000
The extensible markup language (XML) is a promising standard for describing semi-structured information and contents on the… 
Highly Cited
2000
Highly Cited
2000
M ost systems that control access to financial transactions, computer networks, or secured locations identify authorized persons…