Academic literature on the topic 'Authorised user'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Authorised user.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Authorised user"
SAFAVI-NAINI, REIHANEH, HUAXIONG WANG, and DUNCAN S. WONG. "RESILIENT LKH: SECURE MULTICAST KEY DISTRIBUTION SCHEMES." International Journal of Foundations of Computer Science 17, no. 05 (2006): 1205–21. http://dx.doi.org/10.1142/s0129054106004340.
Full textAnwer, Mardin A., Ingo Stengel, and Rina Dinkha Zarro. "User-centered Security for Protecting Patient Privacy for E-health Cloud Computing." Journal of University of Human Development 2, no. 3 (2016): 509. http://dx.doi.org/10.21928/juhd.v2n3y2016.pp509-514.
Full textKarapetyan, Daniel, Andrew J. Parkes, Gregory Gutin, and Andrei Gagarin. "Pattern-Based Approach to the Workflow Satisfiability Problem with User-Independent Constraints." Journal of Artificial Intelligence Research 66 (September 5, 2019): 85–122. http://dx.doi.org/10.1613/jair.1.11339.
Full textSchreuders, Z. Cliffe, Tanya McGill, and Christian Payne. "Towards Usable Application-Oriented Access Controls." International Journal of Information Security and Privacy 6, no. 1 (2012): 57–76. http://dx.doi.org/10.4018/jisp.2012010104.
Full textALmarwani, Reem, Ning Zhang, and James Garside. "An effective, secure and efficient tagging method for integrity protection of outsourced data in a public cloud storage." PLOS ONE 15, no. 11 (2020): e0241236. http://dx.doi.org/10.1371/journal.pone.0241236.
Full textAl-Zubaidie, Mishall, Zhongwei Zhang, and Ji Zhang. "RAMHU: A New Robust Lightweight Scheme for Mutual Users Authentication in Healthcare Applications." Security and Communication Networks 2019 (March 17, 2019): 1–26. http://dx.doi.org/10.1155/2019/3263902.
Full textWen, Yean-Fu, Ko-Yu Hung, Yi-Ting Hwang, and Yeong-Sung Frank Lin. "Sports lottery game prediction system development and evaluation on social networks." Internet Research 26, no. 3 (2016): 758–88. http://dx.doi.org/10.1108/intr-05-2014-0139.
Full textTarp, Sven. "Retskrivningsordbog mellem to stole." HERMES - Journal of Language and Communication in Business 26, no. 50 (2017): 127. http://dx.doi.org/10.7146/hjlcb.v26i50.97828.
Full textGupta, Rajendra. "COMPARISON OF CLASSIFICATION ALGORITHMS TO DETECT PHISHING WEB PAGES USING FEATURE SELECTION AND EXTRACTION." International Journal of Research -GRANTHAALAYAH 4, no. 8 (2016): 118–35. http://dx.doi.org/10.29121/granthaalayah.v4.i8.2016.2570.
Full textMeng, Xiao Ming, and Jian Hua Zhang. "Research on Dynamic Authorization Access Control Strategy Model of Distributed Multi-Organization MIS." Applied Mechanics and Materials 263-266 (December 2012): 1461–66. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.1461.
Full textDissertations / Theses on the topic "Authorised user"
Adeka, Muhammad I., Simon J. Shepherd, Raed A. Abd-Alhameed, and N. A. S. Ahmed. "A Versatile and Ubiquitous Secret Sharing: A cloud data repository secure access." 2015. http://hdl.handle.net/10454/11481.
Full textColeman, Anita Sundaram. "Comments on Eschenfelder's What is an Authorized Use?" 2006. http://hdl.handle.net/10150/106309.
Full textZhu, Xiaohua, and Kristin R. Eschenfelder. "Who is an Authorized User?: Analyzing Socio-Technical Access Regimes for Licensed Digital Resources." 2007. http://hdl.handle.net/10150/106379.
Full text王月鳳. "An Analysis of the Idioms Used in the Authorized Versions of Native Languages in Elementary Schools." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/15798147824194998083.
Full textLI, CHIH TSAN, and 李政燦. "Destruction Fire Operation —A Study on the Compensation Responsibility of Authorized Use and of Objects." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/12905567126963773214.
Full textEschenfelder, Kristin R. "What is an Authorized Use? The Social Construction of Access and Use Rights Restrictions in Licensed Scholarly Digital Resources Protected by Technological Protection Measures." 2006. http://hdl.handle.net/10150/106488.
Full textDalbello, Marija. "Commentary on Kristin Eschenfelder's, What is an Authorized Use? The Social Construction of Access and Use Rights Restrictions in Licensed Scholarly Digital Resources Protected by Technological Protection Measures." 2006. http://hdl.handle.net/10150/105611.
Full textBooks on the topic "Authorised user"
GOVERNMENT, US. An Act to Authorize the Bureau of Reclamation to Conduct Certain Feasibility Studies to Augment Water Supplies for the Klamath Project, Oregon and California, and for Other Purposes. U.S. G.P.O., 2000.
Find full textUnited States. Congress. Senate. Committee on Labor and Human Resources. User fees for the Food and Drug Administration: Hearing of the Committee on Labor and Human Resources, United States Senate, One Hundred Second session, on examining proposed legislation to authorize the Food and Drug Administration to charge user fees to prescription drug manufacturers to increase resources to improve the review time on drug applications, September 22, 1992. U.S. G.P.O., 1992.
Find full textRecreation fees: Hearing before the Committee on Energy and Natural Resources, United States Senate, One Hundred Seventh Congress, second session on S. 2473, to enhance the Recreational Fee Demonstration Program for the National Park Service, and for other purposes; S. 2607, to authorize the Secretary of the Interior and the Secretary of Agriculture to collect recreation fees on federal lands, and for other purposes, June 19, 2002. U.S. G.P.O., 2003.
Find full textMcGrath, Gavin Basil. A textual commentary on the Greek received text of the New Testament: Being the Greek text used in the authorized version also known as the King James version also known as the authorized (King James) version also known as the King James Bible also known as the Saint James version. Gavin Basil McGrath, 2010.
Find full textResources, United States Congress Senate Committee on Energy and Natural. To authorize and direct the Secretary of the Interior to terminate a reservation of use and occupancy at the Buffalo National River, and for other purposes: Report (to accompany S. 996). U.S. G.P.O., 1991.
Find full textUnited States. Congress. Senate. Select Committee on Indian Affairs. Amending the act of October 19, 1984 (Public Law 98-530; 98 Stat. 2698), to authorize certain uses of water by the Ak-Chin Indian Community, Arizona: Report (to accompany S. 2507). U.S. G.P.O., 1992.
Find full textResources, United States Congress House Committee on. Amending Public Law 99-338 to authorize the continued use of certain lands within the Sequoia National Park by portions of an existing hydroelectric project: Report (to accompany H.R. 3932) (including cost estimate of the Congressional Budget Office). U.S. G.P.O., 2004.
Find full textResources, United States Congress House Committee on. Amending Public Law 99-338 to authorize the continued use of certain lands within the Sequoia National Park by portions of an existing hydroelectric project: Report (to accompany H.R. 3932) (including cost estimate of the Congressional Budget Office). U.S. G.P.O., 2004.
Find full textUnited States. Congress. House. Committee on Resources. Amending Public Law 99-338 to authorize the continued use of certain lands within the Sequoia National Park by portions of an existing hydroelectric project: Report (to accompany H.R. 3932) (including cost estimate of the Congressional Budget Office). U.S. G.P.O., 2004.
Find full textResources, United States Congress House Committee on. Amending Public Law 99-338 to authorize the continued use of certain lands within the Sequoia National Park by portions of an existing hydroelectric project: Report (to accompany H.R. 3932) (including cost estimate of the Congressional Budget Office). U.S. G.P.O., 2004.
Find full textBook chapters on the topic "Authorised user"
Slamanig, Daniel. "Efficient Schemes for Anonymous Yet Authorized and Bounded Use of Cloud Resources." In Selected Areas in Cryptography. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28496-0_5.
Full textGupta, Bharat, Deepak Arora, and Vishal Jha. "An Anomaly Based Approach for Intrusion Detection by Authorized Users in Database Systems." In Information Systems, Technology and Management. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12035-0_35.
Full textMardan, Azat. "Using Sessions and OAuth to Authorize and Authenticate Users in Node.js Apps." In Practical Node.js. Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6596-2_6.
Full textNoor, Norzailawati Mohd, and Mazlan Hashim. "Modeling Un-authorized Land Use Sprawl with Integrated Remote Sensing-GIS Technique and Cellular Automata." In Computational Science and Its Applications – ICCSA 2009. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02454-2_12.
Full textAugusto, Alexandre B., and Manuel E. Correia. "A Secure and Dynamic Mobile Identity Wallet Authorization Architecture Based on a XMPP Messaging Infrastructure." In Innovations in XML Applications and Metadata Management. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2669-0.ch002.
Full textKarapapa, Stavroula. "Implicitly Authorized Uses." In Defences to Copyright Infringement. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198795636.003.0005.
Full textMettler, Fred A., and Milton J. Guiberteau. "Authorized User and Radioisotope Safety Issues." In Essentials of Nuclear Medicine and Molecular Imaging. Elsevier, 2019. http://dx.doi.org/10.1016/b978-0-323-48319-3.00013-4.
Full textMettler, Fred A., and Milton J. Guiberteau. "Authorized User and Radioisotope Safety Issues." In Essentials of Nuclear Medicine Imaging. Elsevier, 2012. http://dx.doi.org/10.1016/b978-1-4557-0104-9.00013-5.
Full textGalbraith, John Kenneth, and James K. Galbraith. "An Instrument of Revolution." In Money. Princeton University Press, 2017. http://dx.doi.org/10.23943/princeton/9780691171661.003.0006.
Full textR, Kedar, Kaviraj A, Manish R, Niteesh B, and Suthir S. "Authorized Vehicle Recognition System." In Intelligent Systems and Computer Technology. IOS Press, 2020. http://dx.doi.org/10.3233/apc200190.
Full textConference papers on the topic "Authorised user"
Basnet, Shubhekshya, Beeshanga Abewardana Jayawickrama, Ying He, and Eryk Dutkiewicz. "Fairness Aware Resource Allocation for Average Capacity Maximisation in General Authorized Access User." In 2018 IEEE 88th Vehicular Technology Conference (VTC-Fall). IEEE, 2018. http://dx.doi.org/10.1109/vtcfall.2018.8690573.
Full textKarasek, Daniel Y., Jeehyeong Kim, Victor Youdom Kemmoe, Md Zakirul Alam Bhuiyan, Sunghyun Cho, and Junggab Son. "SuperB: Superior Behavior-based Anomaly Detection Defining Authorized Users’ Traffic Patterns." In 2020 29th International Conference on Computer Communications and Networks (ICCCN). IEEE, 2020. http://dx.doi.org/10.1109/icccn49398.2020.9209657.
Full textArun, M., S. Balamurali, Bharat S. Rawal, Qiang Duan, R. Lakshmana Kumar, and Balusamy Balamurugan. "Mutual Authentication and Authorized Data Access Between Fog and User Based on Blockchain Technology." In IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, 2020. http://dx.doi.org/10.1109/infocomwkshps50562.2020.9162915.
Full textFang, Hao, Tao Zhang, Yueming Cai, Linyuan Zhang, and Hao Wu. "Detection Schemes of Illegal Spectrum Access Behaviors in Multiple Authorized Users Scenario." In 2020 International Conference on Wireless Communications and Signal Processing (WCSP). IEEE, 2020. http://dx.doi.org/10.1109/wcsp49889.2020.9299810.
Full textYuan, Baoli. "Research on the Security Management Method of Cloud Computing Authorized User Based on Anonymous OTP." In 2015 5th International Conference on Computer Sciences and Automation Engineering (ICCSAE 2015). Atlantis Press, 2016. http://dx.doi.org/10.2991/iccsae-15.2016.1.
Full textSue, Chuan-ching, Chao-yang Lee, Jen-fa Huang, Yao-tang Chang, and Deng-sheng Wang. "A Robust Design of Reconfigurable Encoder and Decoder Against Un-authorized Users in Optical CDMA Networks." In TENCON 2005 - 2005 IEEE Region 10 Conference. IEEE, 2005. http://dx.doi.org/10.1109/tencon.2005.301071.
Full textBrown, Jeremy M., and Geoffrey P. Timms. "Mitigating Madness: How We Authenticate and Authorize Users to Deliver Databases in a Contractually Complicated Context." In Charleston Library Conference. Purdue University Press, 2016. http://dx.doi.org/10.5703/1288284316326.
Full textTrager, Erin C. "Where We Are Now: The U.S. Federal Regulatory Framework for Alternative Energy on the OCS." In ASME 2009 28th International Conference on Ocean, Offshore and Arctic Engineering. ASMEDC, 2009. http://dx.doi.org/10.1115/omae2009-80154.
Full textCable, Christopher P. "SR-102 Package Replacement." In ASME 2019 Pressure Vessels & Piping Conference. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/pvp2019-94068.
Full textKanchan, Nikita. "Fuzzy-Logic based Selection and Switching of Channels in Cognitive-Radio Networks." In International Conference on Women Researchers in Electronics and Computing. AIJR Publisher, 2021. http://dx.doi.org/10.21467/proceedings.114.73.
Full textReports on the topic "Authorised user"
Rogers, Lisa. United States Air Force I.M.P.A.C. Cardholder Training, Module 1 - Authorized and Unauthorized Uses of I.M.P.A.C. Defense Technical Information Center, 1998. http://dx.doi.org/10.21236/ada348857.
Full textDevany, R., and T. Utterback. Authorized Limit Evaluation of Spent Granular Activated Carbon Used for Vapor-Phase Remediation at the Lawrence Livermore National Laboratory Livermore, California. Office of Scientific and Technical Information (OSTI), 2007. http://dx.doi.org/10.2172/902251.
Full textWescott, K. L., J. E. May, H. R. Moore, and D. L. Brunner. A Preliminary Review of U.S. Forest Service Business Practices To Authorize Special Uses, Including Energy Infrastructure Projects, on National Forest System Lands. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1375454.
Full textKomba, Aneth, and Richard Shukia. Accountability Relationships in 3Rs Curriculum Reform Implementation: Implication for Pupils’ Acquisition of Literacy and Numeracy Skills in Tanzania’s Primary Schools. Research on Improving Systems of Education (RISE), 2021. http://dx.doi.org/10.35489/bsg-rise-wp_2021/065.
Full textBedford, Philip, Alexis Long, Thomas Long, Erin Milliken, Lauren Thomas, and Alexis Yelvington. Legal Mechanisms for Mitigating Flood Impacts in Texas Coastal Communities. Edited by Gabriel Eckstein. Texas A&M University School of Law Program in Natural Resources Systems, 2019. http://dx.doi.org/10.37419/eenrs.mitigatingfloodimpactstx.
Full textPayment Systems Report - June of 2020. Banco de la República de Colombia, 2021. http://dx.doi.org/10.32468/rept-sist-pag.eng.2020.
Full text