Academic literature on the topic 'Authorised user'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Authorised user.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Authorised user"

1

SAFAVI-NAINI, REIHANEH, HUAXIONG WANG, and DUNCAN S. WONG. "RESILIENT LKH: SECURE MULTICAST KEY DISTRIBUTION SCHEMES." International Journal of Foundations of Computer Science 17, no. 05 (2006): 1205–21. http://dx.doi.org/10.1142/s0129054106004340.

Full text
Abstract:
Multicasting has become the main mode communication for providing a wide range of Internet services such as video broadcasting and multi-party teleconferencing, where data must be delivered to multiple recipients. The main focus of the work on securing multicast applications has been to control access and to ensure that only authorised users can access the broadcast. The authorised group is not fixed and may change over time and hence efficient methods of re-keying are of very important. Logical Key Hierarchy (LKH) schemes are schemes that use a logical tree to assign keys to users: each user
APA, Harvard, Vancouver, ISO, and other styles
2

Anwer, Mardin A., Ingo Stengel, and Rina Dinkha Zarro. "User-centered Security for Protecting Patient Privacy for E-health Cloud Computing." Journal of University of Human Development 2, no. 3 (2016): 509. http://dx.doi.org/10.21928/juhd.v2n3y2016.pp509-514.

Full text
Abstract:
E-health is the present communication structure in medicine especially in developed countries. Toward enhancing the quality of care and reduce the health care delivery cost, cloud Computing technology has been adopted. In recent times services such as exchange and share medical data among staff and then to the patients are one the main reasons behind using this technology in e-health. Hence, using cloud computing in e-health has many challenges particularly when dealing with electronic healthcare records (EHR).
 Cloud computing is an agglomeration of technologies, operating systems, stora
APA, Harvard, Vancouver, ISO, and other styles
3

Karapetyan, Daniel, Andrew J. Parkes, Gregory Gutin, and Andrei Gagarin. "Pattern-Based Approach to the Workflow Satisfiability Problem with User-Independent Constraints." Journal of Artificial Intelligence Research 66 (September 5, 2019): 85–122. http://dx.doi.org/10.1613/jair.1.11339.

Full text
Abstract:
The fixed parameter tractable (FPT) approach is a powerful tool in tackling computationally hard problems. In this paper, we link FPT results to classic artificial intelligence (AI) techniques to show how they complement each other. Specifically, we consider the workflow satisfiability problem (WSP) which asks whether there exists an assignment of authorised users to the steps in a workflow specification, subject to certain constraints on the assignment. It was shown by Cohen et al. (JAIR 2014) that WSP restricted to the class of user-independent constraints (UI), covering many practical cases
APA, Harvard, Vancouver, ISO, and other styles
4

Schreuders, Z. Cliffe, Tanya McGill, and Christian Payne. "Towards Usable Application-Oriented Access Controls." International Journal of Information Security and Privacy 6, no. 1 (2012): 57–76. http://dx.doi.org/10.4018/jisp.2012010104.

Full text
Abstract:
A number of security mechanisms are available for improving the security of systems by restricting the actions of individual programs to activities that are authorised. However, configuring these systems to enforce end users’ own security goals is often beyond their expertise. Little research has investigated the usability issues associated with application-oriented access controls. This paper presents the results of a qualitative analysis of user perceptions of the usability of three application-oriented security systems: SELinux, AppArmor, and FBAC-LSM. Qualitative analysis identified a numb
APA, Harvard, Vancouver, ISO, and other styles
5

ALmarwani, Reem, Ning Zhang, and James Garside. "An effective, secure and efficient tagging method for integrity protection of outsourced data in a public cloud storage." PLOS ONE 15, no. 11 (2020): e0241236. http://dx.doi.org/10.1371/journal.pone.0241236.

Full text
Abstract:
Data Integrity Auditing (DIA) is a security service for checking the integrity of data stored in a PCS (Public Cloud Storage), a third-party based storage service. A DIA service is provided by using integrity tags (hereafter referred to tags). This paper proposes a novel tagging method, called Tagging of Outsourced Data (TOD), for generating and verifying tags of files. TOD has a number of unique properties: (i) it supports both public and private verifiability, and achieves this property with a low level of overhead at the user end, making it particularly attractive to mobile users with resou
APA, Harvard, Vancouver, ISO, and other styles
6

Al-Zubaidie, Mishall, Zhongwei Zhang, and Ji Zhang. "RAMHU: A New Robust Lightweight Scheme for Mutual Users Authentication in Healthcare Applications." Security and Communication Networks 2019 (March 17, 2019): 1–26. http://dx.doi.org/10.1155/2019/3263902.

Full text
Abstract:
Providing a mechanism to authenticate users in healthcare applications is an essential security requirement to prevent both external and internal attackers from penetrating patients’ identities and revealing their health data. Many schemes have been developed to provide authentication mechanisms to ensure that only legitimate users are authorised to connect, but these schemes still suffer from vulnerable security. Various attacks expose patients’ data for malicious tampering or destruction. Transferring health-related data and information between users and the health centre makes them exposed
APA, Harvard, Vancouver, ISO, and other styles
7

Wen, Yean-Fu, Ko-Yu Hung, Yi-Ting Hwang, and Yeong-Sung Frank Lin. "Sports lottery game prediction system development and evaluation on social networks." Internet Research 26, no. 3 (2016): 758–88. http://dx.doi.org/10.1108/intr-05-2014-0139.

Full text
Abstract:
Purpose – The purpose of this paper is to establish a social-network sp.orts lottery system to support users in predicting and simulating sports lottery betting. The community data were generated to support user decision and featured instant game records and odds data synchronisation. Furthermore, the next development cycle were evaluated through a questionnaire. Design/methodology/approach – An extended prototype website development methodology was applied to develop the system. An online sample was collected to evaluate the function, interface, operation, and prediction designs. The χ2 test
APA, Harvard, Vancouver, ISO, and other styles
8

Tarp, Sven. "Retskrivningsordbog mellem to stole." HERMES - Journal of Language and Communication in Business 26, no. 50 (2017): 127. http://dx.doi.org/10.7146/hjlcb.v26i50.97828.

Full text
Abstract:
In November 2012, the fourth edition of the official Danish orthographic dictionary, Retskrivningsordbogen, was published by the Danish Language Board which, according to national law, is authorised to establish the official Danish orthography and publish its decisions in the form of a dictionary, now available in both a printed and an electronic version. In order to be high quality, a work of this sort requires knowledge of language policy and linguistics, on the one hand, and lexicography, on the other hand. The article analyses the Retskrivningsordbogen exclusively from the point of view of
APA, Harvard, Vancouver, ISO, and other styles
9

Gupta, Rajendra. "COMPARISON OF CLASSIFICATION ALGORITHMS TO DETECT PHISHING WEB PAGES USING FEATURE SELECTION AND EXTRACTION." International Journal of Research -GRANTHAALAYAH 4, no. 8 (2016): 118–35. http://dx.doi.org/10.29121/granthaalayah.v4.i8.2016.2570.

Full text
Abstract:
The phishing is a kind of e-commerce lure which try to steal the confidential information of the web user by making identical website of legitimate one in which the contents and images almost remains similar to the legitimate website with small changes. Another way of phishing is to make minor changes in the URL or in the domain of the legitimate website. In this paper, a number of anti-phishing toolbars have been discussed and proposed a system model to tackle the phishing attack. The proposed anti-phishing system is based on the development of the Plug-in tool for the web browser. The perfor
APA, Harvard, Vancouver, ISO, and other styles
10

Meng, Xiao Ming, and Jian Hua Zhang. "Research on Dynamic Authorization Access Control Strategy Model of Distributed Multi-Organization MIS." Applied Mechanics and Materials 263-266 (December 2012): 1461–66. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.1461.

Full text
Abstract:
Focus on the problem of dynamic authorization access control of Distributed Multi-Organization Management Information System (DMOMIS), the system resources are divided into two kinds: relatively independent resources and shared resources. These two kinds of resources were used different authorization system to authorize. The relatively independent resources were authorized by using distributed authorization system (DA), and the similar and shared resources were authorized by using authorized system (A). According to the key terms definition, the system hypothesis and the idea of dynamic progra
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Authorised user"

1

Adeka, Muhammad I., Simon J. Shepherd, Raed A. Abd-Alhameed, and N. A. S. Ahmed. "A Versatile and Ubiquitous Secret Sharing: A cloud data repository secure access." 2015. http://hdl.handle.net/10454/11481.

Full text
Abstract:
No<br>The Versatile and Ubiquitous Secret Sharing System, a cloud data repository secure access and a web based authentication scheme. It is designed to implement the sharing, distribution and reconstruction of sensitive secret data that could compromise the functioning of an organisation, if leaked to unauthorised persons. This is carried out in a secure web environment, globally. It is a threshold secret sharing scheme, designed to extend the human trust security perimeter. The system could be adapted to serve as a cloud data repository and secure data communication scheme. A secret sharing
APA, Harvard, Vancouver, ISO, and other styles
2

Coleman, Anita Sundaram. "Comments on Eschenfelder's What is an Authorized Use?" 2006. http://hdl.handle.net/10150/106309.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhu, Xiaohua, and Kristin R. Eschenfelder. "Who is an Authorized User?: Analyzing Socio-Technical Access Regimes for Licensed Digital Resources." 2007. http://hdl.handle.net/10150/106379.

Full text
Abstract:
This is a submission to the 3rd Annual Social Informatics SIG Research Symposium: The Social Web, Social Computing and the Social Analysis of Computing. This paper describes changes in the configuration of access regimes for scholarly information licensed to libraries and information centers in the United States from late 1960's to the early 2000's. While access regimes are typically thought of as technical systems (e.g., proxy servers, password systems), we conceptualize access regime as amalgams of political, contractual, economic and technical elements that define who can use licensed digit
APA, Harvard, Vancouver, ISO, and other styles
4

王月鳳. "An Analysis of the Idioms Used in the Authorized Versions of Native Languages in Elementary Schools." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/15798147824194998083.

Full text
Abstract:
碩士<br>國立新竹教育大學<br>進修部語文教學碩士班<br>93<br>This study is designed to analyze the idioms used in the authorized versions of native languages in elementary schools. The purposes of this study are stated as follows: first, I want to get an understanding of the usage of the idioms in the authorized versions of native languages in elementary schools; second, the frequency and amount of these idioms will be calculated; third, on the basis of the classification of these idioms, the research fruits as well as suggestions will be advanced as primary references for language teaches in selecting reference bo
APA, Harvard, Vancouver, ISO, and other styles
5

LI, CHIH TSAN, and 李政燦. "Destruction Fire Operation —A Study on the Compensation Responsibility of Authorized Use and of Objects." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/12905567126963773214.

Full text
Abstract:
碩士<br>國立中山大學<br>中山學術研究所<br>93<br>Two major pillars of the state responsibility system are administrative losses compensation system and national compensation system. The “Destruction Fire Operation” which causes innocent third person’s property loss forms administrative losses compensation responsibility or national compensation responsibility promptly. The fire protection law in Taiwan has been revised and enlarged the 19th item 2 since August, 1995. From the view of protecting people’s right, it is admirable to compensate people propriety loss caused by disaster. However the related comp
APA, Harvard, Vancouver, ISO, and other styles
6

Eschenfelder, Kristin R. "What is an Authorized Use? The Social Construction of Access and Use Rights Restrictions in Licensed Scholarly Digital Resources Protected by Technological Protection Measures." 2006. http://hdl.handle.net/10150/106488.

Full text
Abstract:
This is a submission to the "Interrogating the Social Realities of Information Systems" Preconference Symposium at ASIST 2006. This abstract describes an investigation of the changing access and use rights of licensed scholarly digital resources, particularly the rights associated with digital works protected by technological protection measures (TPM â also known as digital rights management systems or DRM)
APA, Harvard, Vancouver, ISO, and other styles
7

Dalbello, Marija. "Commentary on Kristin Eschenfelder's, What is an Authorized Use? The Social Construction of Access and Use Rights Restrictions in Licensed Scholarly Digital Resources Protected by Technological Protection Measures." 2006. http://hdl.handle.net/10150/105611.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Authorised user"

1

GOVERNMENT, US. An Act to Authorize the Bureau of Reclamation to Conduct Certain Feasibility Studies to Augment Water Supplies for the Klamath Project, Oregon and California, and for Other Purposes. U.S. G.P.O., 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

United States. Congress. Senate. Committee on Labor and Human Resources. User fees for the Food and Drug Administration: Hearing of the Committee on Labor and Human Resources, United States Senate, One Hundred Second session, on examining proposed legislation to authorize the Food and Drug Administration to charge user fees to prescription drug manufacturers to increase resources to improve the review time on drug applications, September 22, 1992. U.S. G.P.O., 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Recreation fees: Hearing before the Committee on Energy and Natural Resources, United States Senate, One Hundred Seventh Congress, second session on S. 2473, to enhance the Recreational Fee Demonstration Program for the National Park Service, and for other purposes; S. 2607, to authorize the Secretary of the Interior and the Secretary of Agriculture to collect recreation fees on federal lands, and for other purposes, June 19, 2002. U.S. G.P.O., 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

McGrath, Gavin Basil. A textual commentary on the Greek received text of the New Testament: Being the Greek text used in the authorized version also known as the King James version also known as the authorized (King James) version also known as the King James Bible also known as the Saint James version. Gavin Basil McGrath, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Resources, United States Congress Senate Committee on Energy and Natural. To authorize and direct the Secretary of the Interior to terminate a reservation of use and occupancy at the Buffalo National River, and for other purposes: Report (to accompany S. 996). U.S. G.P.O., 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

United States. Congress. Senate. Select Committee on Indian Affairs. Amending the act of October 19, 1984 (Public Law 98-530; 98 Stat. 2698), to authorize certain uses of water by the Ak-Chin Indian Community, Arizona: Report (to accompany S. 2507). U.S. G.P.O., 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Resources, United States Congress House Committee on. Amending Public Law 99-338 to authorize the continued use of certain lands within the Sequoia National Park by portions of an existing hydroelectric project: Report (to accompany H.R. 3932) (including cost estimate of the Congressional Budget Office). U.S. G.P.O., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Resources, United States Congress House Committee on. Amending Public Law 99-338 to authorize the continued use of certain lands within the Sequoia National Park by portions of an existing hydroelectric project: Report (to accompany H.R. 3932) (including cost estimate of the Congressional Budget Office). U.S. G.P.O., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

United States. Congress. House. Committee on Resources. Amending Public Law 99-338 to authorize the continued use of certain lands within the Sequoia National Park by portions of an existing hydroelectric project: Report (to accompany H.R. 3932) (including cost estimate of the Congressional Budget Office). U.S. G.P.O., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Resources, United States Congress House Committee on. Amending Public Law 99-338 to authorize the continued use of certain lands within the Sequoia National Park by portions of an existing hydroelectric project: Report (to accompany H.R. 3932) (including cost estimate of the Congressional Budget Office). U.S. G.P.O., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Authorised user"

1

Slamanig, Daniel. "Efficient Schemes for Anonymous Yet Authorized and Bounded Use of Cloud Resources." In Selected Areas in Cryptography. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28496-0_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gupta, Bharat, Deepak Arora, and Vishal Jha. "An Anomaly Based Approach for Intrusion Detection by Authorized Users in Database Systems." In Information Systems, Technology and Management. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12035-0_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mardan, Azat. "Using Sessions and OAuth to Authorize and Authenticate Users in Node.js Apps." In Practical Node.js. Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6596-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Noor, Norzailawati Mohd, and Mazlan Hashim. "Modeling Un-authorized Land Use Sprawl with Integrated Remote Sensing-GIS Technique and Cellular Automata." In Computational Science and Its Applications – ICCSA 2009. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02454-2_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Augusto, Alexandre B., and Manuel E. Correia. "A Secure and Dynamic Mobile Identity Wallet Authorization Architecture Based on a XMPP Messaging Infrastructure." In Innovations in XML Applications and Metadata Management. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2669-0.ch002.

Full text
Abstract:
In this chapter, the authors propose and describe an identity management framework that allows users to asynchronously control and effectively share sensitive dynamic data, thus guaranteeing security and privacy in a simple and transparent way. Their approach is realised by a fully secure mobile identity digital wallet, running on mobile devices (Android devices), where users can exercise discretionary control over the access to sensitive dynamic attributes, disclosing their value only to pre-authenticated and authorised users for determined periods of time. For that, the authors rely on an adaptation of the OAuth protocol to authorise and secure the disclosure of personal-private user data by the usage of token exchange and new XML Schemas to establish secure authorisation and disclosure of a set of supported dynamic data types that are being maintained by the personal mobile digital wallet. The communication infrastructure is fully implemented over the XMPP instant messaging protocol and is completely compatible with the public XMPP large messaging infrastructures already deployed on the Internet for real time XML document interchange.
APA, Harvard, Vancouver, ISO, and other styles
6

Karapapa, Stavroula. "Implicitly Authorized Uses." In Defences to Copyright Infringement. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198795636.003.0005.

Full text
Abstract:
When combatting allegations of copyright infringement, the defendant can argue that the copyright holder authorized the activity at issue, either expressly or implicitly. Exclusive rights under copyright have a common constituent: they represent activities that the copyright holder can authorize or prohibit, authorization being necessary to avoid liability for infringement. Authorization from the copyright holder may be explicit and not raise interpretative difficulties, or it may be implied. The doctrine of implied consent has not received harmonization at EU level but can be found in national laws with regard to interpreting a contractual relationship or conduct. Written agreements may include implied contractual terms and in this context, the implied license doctrine is viewed as a ramification of contract law. But implied authorization may be assumed even in the absence of an agreement or prior communication, where the conduct of the copyright holder gives the impression that a particular activity is permitted. This understanding of implied consent can be traced to German jurisprudence and a body of recent cases that have affirmed the existence of implied authorization where copyright holders did not signify their refusal to consent to a specific activity e.g. by not enacting access control mechanisms in their online content. The judicially created doctrine of ‘implied consent’ is crucial to the functioning of essential Internet facilities such as search engines. This chapter discusses the scope of this doctrine, its applicability to other Internet services, its potential to serve as a defensive rule, and the way in which Svensson can be read as introducing an implied consent defence into EU copyright law.
APA, Harvard, Vancouver, ISO, and other styles
7

Mettler, Fred A., and Milton J. Guiberteau. "Authorized User and Radioisotope Safety Issues." In Essentials of Nuclear Medicine and Molecular Imaging. Elsevier, 2019. http://dx.doi.org/10.1016/b978-0-323-48319-3.00013-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mettler, Fred A., and Milton J. Guiberteau. "Authorized User and Radioisotope Safety Issues." In Essentials of Nuclear Medicine Imaging. Elsevier, 2012. http://dx.doi.org/10.1016/b978-1-4557-0104-9.00013-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Galbraith, John Kenneth, and James K. Galbraith. "An Instrument of Revolution." In Money. Princeton University Press, 2017. http://dx.doi.org/10.23943/princeton/9780691171661.003.0006.

Full text
Abstract:
This chapter discusses the use of paper money and assignats to finance the American Revolution and the French Revolution, respectively. Before the First Continental Congress assembled, some of the American colonies (including Massachusetts) had authorized note issues to pay for military operations. The Congress was without direct powers of taxation; one of its first acts was to authorize a note issue. More states now authorized more notes that financed the American Revolution. Robert Morris, considered the “Financier of the Revolution,” obtained roughly $6.5 million in loans from France, a few hundred thousand from Spain and later, after victory was in prospect, a little over a million from the Dutch. The chapter first considers how paper money was used to finance the American Revolution, along with the problem of inflation during the period, before turning to the French Revolution and how it was financed with assignats.
APA, Harvard, Vancouver, ISO, and other styles
10

R, Kedar, Kaviraj A, Manish R, Niteesh B, and Suthir S. "Authorized Vehicle Recognition System." In Intelligent Systems and Computer Technology. IOS Press, 2020. http://dx.doi.org/10.3233/apc200190.

Full text
Abstract:
The technology is growing and increasing in our day to day life to satisfy the needs of human beings. The system we are going to propose makes the human job easier. Here the YOLO algorithm which is a deep learning object detection architecture is used to detect the number plate of the vehicle. After detecting the number plate it converts the vehicle number to a text format. Then it checks it with the database to see if the vehicle is authorized to enter into the premise or not. This system can be implemented in highly restrained areas such as military areas, government organizations, Parliament, etc. This proposed system has around six stages: Capture Image, Search for black pixels, Image filtering, Plate region extraction, character extraction, OCR for character recognition. The alphanumeric characters are identified using the OCR algorithm. It is then used to compare the obtained result from the YOLO algorithm with the database and then check if the vehicle is allowed to enter the premise or not. This proposed system is simulated and implemented using Python, and it was also tested on real-time images for performance purposes.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Authorised user"

1

Basnet, Shubhekshya, Beeshanga Abewardana Jayawickrama, Ying He, and Eryk Dutkiewicz. "Fairness Aware Resource Allocation for Average Capacity Maximisation in General Authorized Access User." In 2018 IEEE 88th Vehicular Technology Conference (VTC-Fall). IEEE, 2018. http://dx.doi.org/10.1109/vtcfall.2018.8690573.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Karasek, Daniel Y., Jeehyeong Kim, Victor Youdom Kemmoe, Md Zakirul Alam Bhuiyan, Sunghyun Cho, and Junggab Son. "SuperB: Superior Behavior-based Anomaly Detection Defining Authorized Users’ Traffic Patterns." In 2020 29th International Conference on Computer Communications and Networks (ICCCN). IEEE, 2020. http://dx.doi.org/10.1109/icccn49398.2020.9209657.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Arun, M., S. Balamurali, Bharat S. Rawal, Qiang Duan, R. Lakshmana Kumar, and Balusamy Balamurugan. "Mutual Authentication and Authorized Data Access Between Fog and User Based on Blockchain Technology." In IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, 2020. http://dx.doi.org/10.1109/infocomwkshps50562.2020.9162915.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fang, Hao, Tao Zhang, Yueming Cai, Linyuan Zhang, and Hao Wu. "Detection Schemes of Illegal Spectrum Access Behaviors in Multiple Authorized Users Scenario." In 2020 International Conference on Wireless Communications and Signal Processing (WCSP). IEEE, 2020. http://dx.doi.org/10.1109/wcsp49889.2020.9299810.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yuan, Baoli. "Research on the Security Management Method of Cloud Computing Authorized User Based on Anonymous OTP." In 2015 5th International Conference on Computer Sciences and Automation Engineering (ICCSAE 2015). Atlantis Press, 2016. http://dx.doi.org/10.2991/iccsae-15.2016.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sue, Chuan-ching, Chao-yang Lee, Jen-fa Huang, Yao-tang Chang, and Deng-sheng Wang. "A Robust Design of Reconfigurable Encoder and Decoder Against Un-authorized Users in Optical CDMA Networks." In TENCON 2005 - 2005 IEEE Region 10 Conference. IEEE, 2005. http://dx.doi.org/10.1109/tencon.2005.301071.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Brown, Jeremy M., and Geoffrey P. Timms. "Mitigating Madness: How We Authenticate and Authorize Users to Deliver Databases in a Contractually Complicated Context." In Charleston Library Conference. Purdue University Press, 2016. http://dx.doi.org/10.5703/1288284316326.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Trager, Erin C. "Where We Are Now: The U.S. Federal Regulatory Framework for Alternative Energy on the OCS." In ASME 2009 28th International Conference on Ocean, Offshore and Arctic Engineering. ASMEDC, 2009. http://dx.doi.org/10.1115/omae2009-80154.

Full text
Abstract:
Section 388 of the Energy Policy Act of 2005 (EPAct) amended the Outer Continental Shelf Lands Act (OCSLA) to grant the U.S. Department of the Interior (USDOI) discretionary authority to issue leases, easements, or rights-of-way for activities on the Outer Continental Shelf (OCS) that produce or support production, transportation, or transmission of energy from sources other than oil and gas, except for where activities are already otherwise authorized in other applicable law (e.g., the Deepwater Port Act of 1974 (33 U.S.C. 1501 et seq.), the Ocean Thermal Energy Conversion Act of 1980 (42 U.S
APA, Harvard, Vancouver, ISO, and other styles
9

Cable, Christopher P. "SR-102 Package Replacement." In ASME 2019 Pressure Vessels & Piping Conference. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/pvp2019-94068.

Full text
Abstract:
Abstract The SR-101 Reservoir Package was placed into service in the early 1990s to ship various configurations of pressurized gas bottles. The SR-101 replacement, the SR-102, is a performance based Department of Transportation (DOT) package designed for shipping currently authorized compressed gases. This paper presents the design, fabrication, and testing processes used to produce the requisite Safety Analysis Report (SAR) that will provide the basis for package certification.
APA, Harvard, Vancouver, ISO, and other styles
10

Kanchan, Nikita. "Fuzzy-Logic based Selection and Switching of Channels in Cognitive-Radio Networks." In International Conference on Women Researchers in Electronics and Computing. AIJR Publisher, 2021. http://dx.doi.org/10.21467/proceedings.114.73.

Full text
Abstract:
In Wireless-Communication, quick increments of cell phones furthermore, the heterogeneous condition have expanded the prerequisite for extra spect-rum for information transmiss-ion. It is past the domain of imagination to allocate new bands to all networks, which is the explanation behind product-ive utilizat-ion of the adequately available spect-rum is the interest of the day. Cognitive-radio (CR) development is a promising response for compelling range use, where Cognitive-Radio devices, or optional clients (SUs), can keenly utilize void areas open in the authorized channels. Secondary-Users
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Authorised user"

1

Rogers, Lisa. United States Air Force I.M.P.A.C. Cardholder Training, Module 1 - Authorized and Unauthorized Uses of I.M.P.A.C. Defense Technical Information Center, 1998. http://dx.doi.org/10.21236/ada348857.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Devany, R., and T. Utterback. Authorized Limit Evaluation of Spent Granular Activated Carbon Used for Vapor-Phase Remediation at the Lawrence Livermore National Laboratory Livermore, California. Office of Scientific and Technical Information (OSTI), 2007. http://dx.doi.org/10.2172/902251.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wescott, K. L., J. E. May, H. R. Moore, and D. L. Brunner. A Preliminary Review of U.S. Forest Service Business Practices To Authorize Special Uses, Including Energy Infrastructure Projects, on National Forest System Lands. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1375454.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Komba, Aneth, and Richard Shukia. Accountability Relationships in 3Rs Curriculum Reform Implementation: Implication for Pupils’ Acquisition of Literacy and Numeracy Skills in Tanzania’s Primary Schools. Research on Improving Systems of Education (RISE), 2021. http://dx.doi.org/10.35489/bsg-rise-wp_2021/065.

Full text
Abstract:
This study responded to one key research question: What are the accountability relationships between the actors in implementing the 3Rs curriculum reform? A qualitative research approach informed the study, using key informant interviews, focus group discussion and document review. The data were analysed using thematic and content analysis. The study established that the key actors in implementing the 3Rs curriculum are the government institutions and the development partners. These actors provide teaching, learning materials and support in the provision of in-service teacher training. Yet, th
APA, Harvard, Vancouver, ISO, and other styles
5

Bedford, Philip, Alexis Long, Thomas Long, Erin Milliken, Lauren Thomas, and Alexis Yelvington. Legal Mechanisms for Mitigating Flood Impacts in Texas Coastal Communities. Edited by Gabriel Eckstein. Texas A&M University School of Law Program in Natural Resources Systems, 2019. http://dx.doi.org/10.37419/eenrs.mitigatingfloodimpactstx.

Full text
Abstract:
Flooding is a major source of concern for Texas’ coastal communities. It affects the quality of infrastructure, the lives of citizens, and the ecological systems upon which coastal communities in Texas rely. To plan for and mitigate the impacts of flooding, Texas coastal communities may implement land use tools such as zoning, drainage utility systems, eminent domain, exactions, and easements. Additionally, these communities can benefit from understanding how flooding affects water quality and the tools available to restore water bodies to healthy water quality levels. Finally, implementing ad
APA, Harvard, Vancouver, ISO, and other styles
6

Payment Systems Report - June of 2020. Banco de la República de Colombia, 2021. http://dx.doi.org/10.32468/rept-sist-pag.eng.2020.

Full text
Abstract:
With its annual Payment Systems Report, Banco de la República offers a complete overview of the infrastructure of Colombia’s financial market. Each edition of the report has four objectives: 1) to publicize a consolidated account of how the figures for payment infrastructures have evolved with respect to both financial assets and goods and services; 2) to summarize the issues that are being debated internationally and are of interest to the industry that provides payment clearing and settlement services; 3) to offer the public an explanation of the ideas and concepts behind retail-value paymen
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!