Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,400,051 papers from all fields of science
Search
Sign In
Create Free Account
Multi-party authorization
Known as:
Multi Party Authorization
Multi-party authorization (MPA) is a process to protect a telecommunications network, data center or industrial control system from undesirable acts…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
4 relations
Data center
Separation of duties
Telecommunications network
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Multi-party authorization and conflict mediation for decentralized configuration management processes
Holger Kinkelin
,
H. Niedermayer
,
Marc-Florian Müller
,
G. Carle
IFIP/IEEE Symposium on Integrated Network…
2019
Corpus ID: 83458735
Configuration management in networks with highest security demands must not depend on just one administrator and her device…
Expand
2016
2016
Multi-party Authorization Model for Social Networks
Huo Ying-y
2016
Corpus ID: 63076504
Most of the current access control mechanisms focus on data of private space of users,which cannot control the data beyond the…
Expand
2016
2016
面向社交网络的多方授权模型 (Multi-party Authorization Model for Social Networks)
Yingyu Huo
,
Li Ma
,
Yong Zhong
,
Xiaolin Qin
计算机科学
2016
Corpus ID: 213190589
2015
2015
Secure multi-party authorization in clouds
Wenjie Lin
2015
Corpus ID: 156555245
2015
2015
Research on Fair Use of Digital Content in Social Network
Yingyu Huo
,
Li Ma
,
Yong Zhong
Knowledge Science, Engineering and Management
2015
Corpus ID: 30657884
The convenience of sharing of digital contents in social network makes protection of copyrighted digital content a concerned…
Expand
2014
2014
Detecting the Vulnerability of Multi-Party Authorization Protocols to Name Matching Attacks
Wenjie Lin
,
Guoxing Chen
,
T. Lai
2014
Corpus ID: 85557133
Software as a Service (SaaS) clouds cooperate to provide services, which often provoke multi-party authorization. The multi-party…
Expand
2010
2010
Notice of RetractionEnterprise authorization analysis and enterprise authorization design based on PMI
L. Qinwei
International Conference on Computer Engineering…
2010
Corpus ID: 21098423
The existence of super user in the enterprise information center broken the least privilege principle of information security…
Expand
2007
2007
Multi-party Authorization Signature Scheme Based on Hyper-elliptic Curves Cryptosystem
Zhou Xuan-wu
,
Yang Xiaoyuan
,
Wei Ping
,
Wei Li-xian
2007
Corpus ID: 61564947
This paper analyzes multi-party authorization scheme in electronic business,as well as multi-signature scheme in network…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE