Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Authorizations“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Authorizations" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Authorizations"
van der Zee, Ivar T., Rick A. Vreman, Lawrence Liberti, and Mario Alanis Garza. "Regulatory reliance pathways during health emergencies: enabling timely authorizations for COVID-19 vaccines in Latin America." Revista Panamericana de Salud Pública 46 (August 30, 2022): 1. http://dx.doi.org/10.26633/rpsp.2022.115.
Der volle Inhalt der QuelleBai, Yun, and Vijay Varadharajan. "Object Oriented Database with Authorization Policies." Fundamenta Informaticae 53, no. 3-4 (2002): 229–50. https://doi.org/10.3233/fun-2002-533-402.
Der volle Inhalt der QuelleSharma, Mallika, Annika Gustafson, Barbara Jagels, and Tracy Wong. "Collaboration with commercial payor to eliminate prior authorization." Journal of Clinical Oncology 37, no. 27_suppl (2019): 9. http://dx.doi.org/10.1200/jco.2019.37.27_suppl.9.
Der volle Inhalt der QuelleMéndez Quincho, Leonor Carmen, Pedro Melitón Ramos Matías, and Oscar Felipe Arce Cruzado. "Diagnóstico del uso del agua y vertimientos de efluentes líquidos en el Perú (2013-2015)." Revista del Instituto de investigación de la Facultad de minas, metalurgia y ciencias geográficas 20, no. 39 (2017): 123–36. https://doi.org/10.15381/iigeo.v20i39.14175.
Der volle Inhalt der QuelleMcLaughlin, Rob. "Authorizations for maritime law enforcement operations." International Review of the Red Cross 98, no. 902 (2016): 465–90. http://dx.doi.org/10.1017/s1816383117000340.
Der volle Inhalt der QuelleBargeron, Leonce, Alice Bonaime, and Shawn Thomas. "The Timing and Source of Long-Run Returns Following Repurchases." Journal of Financial and Quantitative Analysis 52, no. 2 (2017): 491–517. http://dx.doi.org/10.1017/s0022109017000084.
Der volle Inhalt der QuelleXu, Yang, Wuqiang Gao, Quanrun Zeng, Guojun Wang, Ju Ren, and Yaoxue Zhang. "A Feasible Fuzzy-Extended Attribute-Based Access Control Technique." Security and Communication Networks 2018 (June 5, 2018): 1–11. http://dx.doi.org/10.1155/2018/6476315.
Der volle Inhalt der QuelleHofmann, Bjørn. "From consent to authorization." Etikk i praksis - Nordic Journal of Applied Ethics, no. 2 (December 27, 2024): 35–47. https://doi.org/10.5324/eip.v18i2.5965.
Der volle Inhalt der QuelleVandenberghe, Karolien. "Dual-Use Regulation 2021/821: What’s Old & What’s New in EU Export Control." Global Trade and Customs Journal 16, Issue 9 (2021): 479–88. http://dx.doi.org/10.54648/gtcj2021053.
Der volle Inhalt der QuelleBhardwaj, Aarti Sonia, Mark Liu, Sofya Pintova, et al. "Implementation of a streamlined prior authorization process to improve cancer care delivery." Journal of Clinical Oncology 41, no. 16_suppl (2023): 1531. http://dx.doi.org/10.1200/jco.2023.41.16_suppl.1531.
Der volle Inhalt der QuelleDissertationen zum Thema "Authorizations"
Lui, W. C., and 雷永祥. "Flexible authorizations in workflow management systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B42577135.
Der volle Inhalt der QuelleLui, W. C. "Flexible authorizations in workflow management systems." Click to view the E-thesis via HKUTO, 2002. http://sunzi.lib.hku.hk/hkuto/record/B42577135.
Der volle Inhalt der QuelleFirman, Fikri. "Outdoor Small Cell Deployment with Complementary Spectrum Authorizations, Licensed (LSA) and Unlicensed (LAA) : Techno-Economic Analysis." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-207140.
Der volle Inhalt der QuelleRuan, Chun, University of Western Sydney, of Science Technology and Environment College, and School of Computing and Information Technology. "Models for authorization and conflict resolution." THESIS_CSTE_CIT_Ruan_C.xml, 2003. http://handle.uws.edu.au:8081/1959.7/546.
Der volle Inhalt der QuellePachas, Pérez Diego. "Mining Exploration in Peru: A Brief Scope on the Main Authorizations for the Development of an Exploration Project in Peru." Derecho & Sociedad, 2015. http://repositorio.pucp.edu.pe/index/handle/123456789/118585.
Der volle Inhalt der QuelleCrampton, Jason Alexis Valentine. "Authorization and antichains." Thesis, Birkbeck (University of London), 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.271717.
Der volle Inhalt der QuelleHumenn, Polar. "The authorization calculus." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available, full text:, 2008. http://wwwlib.umi.com/cr/syr/main.
Der volle Inhalt der QuelleKini, Pranab. "Towards improving the performance of enterprise authorization systems using speculative authorization." Thesis, University of British Columbia, 2010. http://hdl.handle.net/2429/29561.
Der volle Inhalt der QuelleCabarkapa, Dragan. "Authorization Architecture for SWoT." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-134639.
Der volle Inhalt der QuelleBjörkenvall, Anton. "Authorization Tool for Usersand Media Archives in WordPress : A Role Based Authorization Plugin." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-371460.
Der volle Inhalt der QuelleBücher zum Thema "Authorizations"
Oregon. Dept. of State Lands., ed. Waterway authorizations: Does your use of a waterway require state authorization? Oregon Dept. of State Lands, 2007.
Den vollen Inhalt der Quelle findenAdministration, United States Congress Senate Committee on Rules and. Expenditure authorizations and requirements for Senate committees. U.S. G.P.O., 1986.
Den vollen Inhalt der Quelle findenSenate, United States Congress. Expenditure authorizations and requirements for Senate committees. U.S. G.P.O., 1988.
Den vollen Inhalt der Quelle findenSenate, United States Congress. Expenditure authorizations and requirements for Senate committees. U.S. G.P.O., 1988.
Den vollen Inhalt der Quelle findenSenate, United States Congress. Expenditure authorizations and requirements for Senate committees. U.S. G.P.O., 1993.
Den vollen Inhalt der Quelle findenSenate, United States Congress. Expenditure authorizations and requirements for Senate committees. U.S. G.P.O., 1994.
Den vollen Inhalt der Quelle findenUnited States. Congress. Senate. Committee on Rules and Administration. Expenditure authorizations and requirements for Senate committees. U.S. G.P.O., 1985.
Den vollen Inhalt der Quelle findenLehnert, Volker. Authorizations in SAP software: Design and configuration. Galileo Press, 2010.
Den vollen Inhalt der Quelle findenUnited States. Congress. Senate. Committee on Rules and Administration. Expenditure authorizations and requirements for Senate committees. U.S. G.P.O., 1986.
Den vollen Inhalt der Quelle findenUnited States. Congress. Senate. Expenditure authorizations and requirements for Senate committees. U.S. G.P.O., 1996.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Authorizations"
De Capitani di Vimercati, Sabrina. "Authorizations." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_810.
Der volle Inhalt der QuelleDe Capitani di Vimercati, Sabrina. "Authorizations." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_810-2.
Der volle Inhalt der QuelleDe Capitani diVimercati, Sabrina. "Authorizations." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_810.
Der volle Inhalt der QuelleJajodia, Sushil, Michiharu Kudo, and V. S. Subrahmanian. "Provisional Authorizations." In Advances in Information Security. Springer US, 2001. http://dx.doi.org/10.1007/978-1-4615-1467-1_8.
Der volle Inhalt der QuelleArthur, Will, David Challener, and Kenneth Goldman. "Authorizations and Sessions." In A Practical Guide to TPM 2.0. Apress, 2015. http://dx.doi.org/10.1007/978-1-4302-6584-9_13.
Der volle Inhalt der QuelleAtluri, Vijay, and Heechang Shin. "Geospatial Authorizations, Efficient Enforcement." In Encyclopedia of GIS. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-35973-1_503.
Der volle Inhalt der QuelleAtluri, Vijay, and Heechang Shin. "Geospatial Authorizations, Efficient Enforcement." In Encyclopedia of GIS. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-23519-6_503-2.
Der volle Inhalt der QuelleAtluri, Vijay, and Heechang Shin. "Geospatial Authorizations, Efficient Enforcement." In Encyclopedia of GIS. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-17885-1_503.
Der volle Inhalt der QuelleWang, Hua, and Jinli Cao. "Delegating Revocations and Authorizations." In Business Process Management Workshops. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-78238-4_29.
Der volle Inhalt der QuelleGrilli, Barbara A., and Theresa G. Webb. "Authorizations, Approvals, and Award." In Strategic Sourcing in the Public Sector. Routledge, 2023. http://dx.doi.org/10.4324/9781003267287-9.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Authorizations"
Quintero, Vladimir, Cesar Chevel, and Paul Sanmartin-Mendoza. "Health Services Authorizations: Methodology Proposal." In 2024 IEEE Technology and Engineering Management Society (TEMSCON LATAM). IEEE, 2024. http://dx.doi.org/10.1109/temsconlatam61834.2024.10717813.
Der volle Inhalt der QuelleCummings, Laura. ""Flagging Out" - The Rise of Non-National Satellite Spectrum Authorizations." In IISL Colloquium on the Law of Outer Space, Held at the 75th International Astronautical Congress (IAC 2024). International Astronautical Federation (IAF), 2024. https://doi.org/10.52202/078384-0005.
Der volle Inhalt der QuelleChakarov, Aleks, Jaco Geldenhuys, Matthew Heck, et al. "Formally Verified Cloud-Scale Authorization." In 2025 IEEE/ACM 47th International Conference on Software Engineering (ICSE). IEEE, 2025. https://doi.org/10.1109/icse55347.2025.00166.
Der volle Inhalt der QuelleSuntaxi, Gabriela, Aboubakr Achraf El Ghazi, and Klemens Böhm. "Mutual Authorizations." In SACMAT '19: The 24th ACM Symposium on Access Control Models and Technologies. ACM, 2019. http://dx.doi.org/10.1145/3322431.3325415.
Der volle Inhalt der QuelleA. Maciaszek, Leszek, and Mieczyslaw L. Owoc. "Designing Application Authorizations." In 2001 Informing Science Conference. Informing Science Institute, 2001. http://dx.doi.org/10.28945/2409.
Der volle Inhalt der QuelleBasin, David, Samuel J. Burri, and Günter Karjoth. "Optimal workflow-aware authorizations." In the 17th ACM symposium. ACM Press, 2012. http://dx.doi.org/10.1145/2295136.2295154.
Der volle Inhalt der QuelleBeznosov, Konstantin (Kosta). "Flooding and recycling authorizations." In the 2005 workshop. ACM Press, 2005. http://dx.doi.org/10.1145/1146269.1146285.
Der volle Inhalt der Quelle"Semantic Interoperability of Authorizations." In 2nd International Workshop on Security In Information Systems. SciTePress - Science and and Technology Publications, 2004. http://dx.doi.org/10.5220/0002682402690278.
Der volle Inhalt der QuelleZhang, Mingsheng, Wu Chen, Yisong Wang, and Mingyi Zhang. "Flexible Authorizations with Logic Program." In 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC). IEEE, 2009. http://dx.doi.org/10.1109/nswctc.2009.9.
Der volle Inhalt der QuelleBertino, Elisa, Pierangela Samarati, and Sushil Jajodia. "Authorizations in relational database management systems." In the 1st ACM conference. ACM Press, 1993. http://dx.doi.org/10.1145/168588.168605.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Authorizations"
Lepinski, M., S. Kent, and D. Kong. A Profile for Route Origin Authorizations (ROAs). RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6482.
Der volle Inhalt der QuelleSnijders, J., B. Maddison, M. Lepinski, D. Kong, and S. Kent. A Profile for Route Origin Authorizations (ROAs). RFC Editor, 2024. http://dx.doi.org/10.17487/rfc9582.
Der volle Inhalt der QuelleYan, Z., R. Bush, G. Geng, T. de Kock, and J. Yao. Avoiding Route Origin Authorizations (ROAs) Containing Multiple IP Prefixes. RFC Editor, 2023. http://dx.doi.org/10.17487/rfc9455.
Der volle Inhalt der QuelleSchilling, Duane T. Assessment of CINC Authorizations to CINC Requirements (ACAR) (Follow-On). Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada411947.
Der volle Inhalt der QuelleHuston, G., and G. Michaelson. Validation of Route Origination Using the Resource Certificate Public Key Infrastructure (PKI) and Route Origin Authorizations (ROAs). RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6483.
Der volle Inhalt der QuelleDAUTEL, W. A. FFTF Authorization Agreement. Office of Scientific and Technical Information (OSTI), 2000. http://dx.doi.org/10.2172/804751.
Der volle Inhalt der QuelleVollbrecht, J., P. Calhoun, S. Farrell, et al. AAA Authorization Framework. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2904.
Der volle Inhalt der QuelleFarrell, S., J. Vollbrecht, P. Calhoun, et al. AAA Authorization Requirements. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2906.
Der volle Inhalt der QuelleRosenberg, J. Presence Authorization Rules. RFC Editor, 2007. http://dx.doi.org/10.17487/rfc5025.
Der volle Inhalt der QuelleDAUTEL, W. A. FFTF Authorization Agreement. Office of Scientific and Technical Information (OSTI), 2000. http://dx.doi.org/10.2172/801319.
Der volle Inhalt der Quelle