Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,237,304 papers from all fields of science
Search
Sign In
Create Free Account
Delegation (computer security)
Known as:
Delegation in IT
Delegation is the process of a computer user handing over their authentication credentials to another user. In role-based access control models…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Authentication
Authorization
Identity management
Role-based access control
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Delegation vs. Control in Supply Chain Procurement under Competition
E. Bolandifar
,
Panos Kouvelis
,
Fuqiang Zhang
2016
Corpus ID: 266470278
This paper studies the optimal component procurement strategies of two competing OEMs selling substitutable products. The OEMs…
Expand
2014
2014
The governance of multiple-site physician practice: International experience and its implication for China
T. Cha
2014
Corpus ID: 75185380
Some experiments have been done on multiple-site physician practice,and this has became a hot topic in recent years. This paper…
Expand
2009
2009
Delegating revocations and authorizations in collaborative business environments
Hua Wang
,
Jinli Cao
,
Yanchun Zhang
Inf. Syst. Frontiers
2009
Corpus ID: 13767742
Efficient collaboration allows organizations and individuals to improve the efficiency and quality of their business activities…
Expand
2007
2007
When is Delegation Abdication?: How Citizens Use Institutions to Help Delegation Succeed
A. Lupia
,
Mathew D. McCubbins
2007
Corpus ID: 155212445
Modern democracy requires delegation. One common problem with delegation is that principals and agents often have conflicting…
Expand
Highly Cited
2006
Highly Cited
2006
Inter-instance authorization constraints for secure workflow management
Janice Warner
,
V. Atluri
ACM Symposium on Access Control Models and…
2006
Corpus ID: 16232741
Work flows model and control the execution of business process in an organization. They are typically comprised of tasks or…
Expand
Highly Cited
2005
Highly Cited
2005
Characterizing a national community web
Daniel Gomes
,
Mário J. Silva
TOIT
2005
Corpus ID: 6598581
This article presents a characterization of the community Web of the people of Portugal. We defined criteria for delimiting this…
Expand
2003
2003
A Taxonomy of Autonomy in Multiagent Organisation
M. Schillo
,
K. Fischer
Agents and Computational Autonomy
2003
Corpus ID: 14776501
Starting from a general definition of how to model the organisation of multiagent systems with the aid of holonic structures, we…
Expand
Highly Cited
2002
Highly Cited
2002
Dynamically Composable Collaborations with Delegation Layers
K. Ostermann
European Conference on Object-Oriented…
2002
Corpus ID: 3251295
It has been recognized in several works that a slice of behavior affecting a set of collaborating classes is a better unit of…
Expand
Highly Cited
1996
Highly Cited
1996
Split objects: a disciplined use of delegation within objects
D. Bardou
,
C. Dony
Conference on Object-Oriented Programming Systems…
1996
Corpus ID: 15598065
This paper's primary aim is to improve the understanding of the delegation mechanism as defined in [18]. We propose a new…
Expand
Highly Cited
1994
Highly Cited
1994
Transforming leadership: Developing people through delegation.
Karl W. Kuhnert
1994
Corpus ID: 46424328
Because of such influences as downsizing, restructuring, and greater international competition for products and services…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE