Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,548,565 papers from all fields of science
Search
Sign In
Create Free Account
Authorization
Known as:
Authorisation
, Authorization (computer access control)
, Auth
Expand
Authorization or authorisation is the function of specifying access rights to resources related to information security and computer security in…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
ASP.NET Web Site Administration Tool
Access control
Active Directory
Administrative domain
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
Scalable RFID security protocols supporting tag ownership transfer
Boyeon Song
,
C. Mitchell
Computer Communications
2011
Corpus ID: 825171
Highly Cited
2010
Highly Cited
2010
Hysteresis Effects in Blue-Phase Liquid Crystals
Kuan‐Ming Chen
,
S. Gauza
,
H. Xianyu
,
Shin‐Tson Wu
Journal of Display Technology
2010
Corpus ID: 43744151
Hysteresis effects of two blue-phase (BP) liquid crystals BP-I and BP-II, and polymer-stabilized BP-I and BP-II are investigated…
Expand
Highly Cited
2010
Highly Cited
2010
A privacy-preserving approach to policy-based content dissemination
Ning Shang
,
Mohamed Nabeel
,
F. Paci
,
E. Bertino
IEEE International Conference on Data Engineering
2010
Corpus ID: 4833265
We propose a novel scheme for selective distribution of content, encoded as documents, that preserves the privacy of the users to…
Expand
Highly Cited
2010
Highly Cited
2010
Wireless Video Quality Assessment: A Study of Subjective Scores and Objective Algorithms
Anush K. Moorthy
,
K. Seshadrinathan
,
R. Soundararajan
,
A. Bovik
IEEE transactions on circuits and systems for…
2010
Corpus ID: 10481554
Evaluating the perceptual quality of video is of tremendous importance in the design and optimization of wireless video…
Expand
Highly Cited
2007
Highly Cited
2007
Characterization of the First Prototypes of Silicon Photomultiplier Fabricated at ITC-irst
C. Piemonte
,
R. Battiston
,
+5 authors
N. Zorzi
IEEE Transactions on Nuclear Science
2007
Corpus ID: 25526787
This paper reports on the electrical characterization of the first prototypes of Geiger-Mode Avalanche Photodiodes (GM-APDs) and…
Expand
Highly Cited
2006
Highly Cited
2006
A Model-driven WSDL Extension for Describing the QoS ofWeb Services
A. D’Ambrogio
IEEE International Conference on Web Services…
2006
Corpus ID: 13979069
Web services are the building blocks of the emerging computing paradigm based on service-oriented architectures. A Web service is…
Expand
Highly Cited
2005
Highly Cited
2005
MIMO OFDM receivers for Systems with IQ imbalances
A. Tarighat
,
A. H. Sayed
IEEE Transactions on Signal Processing
2005
Corpus ID: 2638402
Orthogonal frequency division multiplexing (OFDM) is a widely recognized modulation scheme for high data rate communications…
Expand
Review
2001
Review
2001
Bluetooth: technology for short-range wireless apps - Internet Computing, IEEE
2001
Corpus ID: 206438075
H andheld devices are rapidly becoming an integral part of our daily lives, and many road warriors already carry a cell phone…
Expand
Highly Cited
2001
Highly Cited
2001
A rule-based framework for role based delegation
Longhua Zhang
,
Gail-Joon Ahn
,
B. Chu
ACM Symposium on Access Control Models and…
2001
Corpus ID: 14914942
In current role-based systems, security officers handle assignments of users to roles. However, fully depending on this…
Expand
Highly Cited
1997
Highly Cited
1997
Ethics online
Deborah G. Johnson
1997
Corpus ID: 41359527
process of making fundamental decisions about the future of their systems of online communication. The public discussions taking…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE