Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,746,589 papers from all fields of science
Search
Sign In
Create Free Account
Authorization
Known as:
Authorisation
, Authorization (computer access control)
, Auth
Expand
Authorization or authorisation is the function of specifying access rights to resources related to information security and computer security in…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
ASP.NET Web Site Administration Tool
Access control
Active Directory
Administrative domain
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego
Rengarajan Amirtharajan
,
J. Rayappan
2012
Corpus ID: 61852360
Highly Cited
2011
Highly Cited
2011
Evolutionary Clustering and Analysis of Bibliographic Networks
Manish Gupta
,
C. Aggarwal
,
Jiawei Han
,
Yizhou Sun
International Conference on Advances in Social…
2011
Corpus ID: 15069423
In this paper, we study the problem of evolutionary clustering of multi-typed objects in a heterogeneous bibliographic network…
Expand
Highly Cited
2010
Highly Cited
2010
Multiscale Modeling of Planar and Nanowire Field-Effect Biosensors
C. Heitzinger
,
N. Mauser
,
C. Ringhofer
SIAM Journal on Applied Mathematics
2010
Corpus ID: 12740187
Field-effect nanobiosensors (or Biofets, biologically sensitive field-effect transistors) have recently been demonstrated…
Expand
Highly Cited
2009
Highly Cited
2009
Self-Routing Denial-of-Service Resistant Capabilities Using In-packet Bloom Filters
Christian Esteve Rothenberg
,
P. Jokela
,
P. Nikander
,
M. Sarela
,
J. Ylitalo
European Conference on Computer Network Defense
2009
Corpus ID: 15761064
In this paper, we propose and analyze an in-packet Bloom-filter-based source-routing architecture resistant to Distributed Denial…
Expand
Highly Cited
2007
Highly Cited
2007
Characterization of the First Prototypes of Silicon Photomultiplier Fabricated at ITC-irst
C. Piemonte
,
R. Battiston
,
+5 authors
N. Zorzi
IEEE Transactions on Nuclear Science
2007
Corpus ID: 25526787
This paper reports on the electrical characterization of the first prototypes of Geiger-Mode Avalanche Photodiodes (GM-APDs) and…
Expand
Highly Cited
2007
Highly Cited
2007
System architecture and cross-layer optimization of video broadcast over WiMAX
Jianfeng Wang
,
M. Venkatachalam
,
Yuguang Fang
IEEE Journal on Selected Areas in Communications
2007
Corpus ID: 9747208
Video broadcast and mobile TV have received significant interests from both academia and industry recently. The emerging mobile…
Expand
Review
2002
Review
2002
Home systems standards: achievements and challenges
K. Wacks
IEEE Communications Magazine
2002
Corpus ID: 61208034
"Home systems" is a new consumer products industry. The market potential is very large, although the market has been evolving…
Expand
Highly Cited
1997
Highly Cited
1997
A security concept for OLAP
Remzi Kirkgöze
,
Nevana Katic
,
Mladen Stolda
,
A. Tjoa
Database and Expert Systems Applications. 8th…
1997
Corpus ID: 39142527
A data warehouse collects and integrates data from multiple, autonomous, heterogeneous sources with the purpose of efficiently…
Expand
Highly Cited
1997
Highly Cited
1997
Robust embedded data from wavelet coefficients
J. J. Chae
,
B. S. Manjunath
Electronic imaging
1997
Corpus ID: 8094141
An approach to embedding gray scale images using a discrete wavelet transform is proposed. The proposed scheme enables using…
Expand
Highly Cited
1996
Highly Cited
1996
A policy based role framework for access control
Emil C. Lupu
,
Damian A. Marriott
,
M. Sloman
,
Nicholas Yialelis
ACM Workshop on Role-Based Access Control
1996
Corpus ID: 1236250
We outline a framework for specifying management roles which defines both authorisation and obligation policies for a particular…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE