Skip to search formSkip to main contentSkip to account menu

Authorization

Known as: Authorisation, Authorization (computer access control), Auth 
Authorization or authorisation is the function of specifying access rights to resources related to information security and computer security in… 
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Scene recognition is one of the hallmark tasks of computer vision, allowing definition of a context for object recognition… 
Highly Cited
2012
Highly Cited
2012
The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on… 
Review
2008
Review
2008
Review
2004
Review
2004
Wireless sensor networks consist of small nodes with sensing, computation, and wireless communications capabilities. Many routing… 
Highly Cited
2002
Highly Cited
2002
In "grids" and "collaboratories", we find distributed communities of resource providers and resource consumers, within which… 
Highly Cited
2000
Highly Cited
2000
Constraints are an important aspect of role-based access control (RBAC) and are often regarded as one of the principal… 
Highly Cited
1999
Highly Cited
1999
Software radios are emerging as platforms for multiband multimode personal communications systems. Radio etiquette is the set of… 
Review
1999
Review
1999
Information-hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures… 
Highly Cited
1996
Highly Cited
1996
II A beautiful idea 2 A The intuition . . . . . . . . . . . . . . . 2 B Classical cryptography . . . . . . . . . 3 1 Asymmetrical… 
Review
1975
Review
1975
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It…