Journal articles on the topic 'Authorised user'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Authorised user.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
SAFAVI-NAINI, REIHANEH, HUAXIONG WANG, and DUNCAN S. WONG. "RESILIENT LKH: SECURE MULTICAST KEY DISTRIBUTION SCHEMES." International Journal of Foundations of Computer Science 17, no. 05 (2006): 1205–21. http://dx.doi.org/10.1142/s0129054106004340.
Full textAnwer, Mardin A., Ingo Stengel, and Rina Dinkha Zarro. "User-centered Security for Protecting Patient Privacy for E-health Cloud Computing." Journal of University of Human Development 2, no. 3 (2016): 509. http://dx.doi.org/10.21928/juhd.v2n3y2016.pp509-514.
Full textKarapetyan, Daniel, Andrew J. Parkes, Gregory Gutin, and Andrei Gagarin. "Pattern-Based Approach to the Workflow Satisfiability Problem with User-Independent Constraints." Journal of Artificial Intelligence Research 66 (September 5, 2019): 85–122. http://dx.doi.org/10.1613/jair.1.11339.
Full textSchreuders, Z. Cliffe, Tanya McGill, and Christian Payne. "Towards Usable Application-Oriented Access Controls." International Journal of Information Security and Privacy 6, no. 1 (2012): 57–76. http://dx.doi.org/10.4018/jisp.2012010104.
Full textALmarwani, Reem, Ning Zhang, and James Garside. "An effective, secure and efficient tagging method for integrity protection of outsourced data in a public cloud storage." PLOS ONE 15, no. 11 (2020): e0241236. http://dx.doi.org/10.1371/journal.pone.0241236.
Full textAl-Zubaidie, Mishall, Zhongwei Zhang, and Ji Zhang. "RAMHU: A New Robust Lightweight Scheme for Mutual Users Authentication in Healthcare Applications." Security and Communication Networks 2019 (March 17, 2019): 1–26. http://dx.doi.org/10.1155/2019/3263902.
Full textWen, Yean-Fu, Ko-Yu Hung, Yi-Ting Hwang, and Yeong-Sung Frank Lin. "Sports lottery game prediction system development and evaluation on social networks." Internet Research 26, no. 3 (2016): 758–88. http://dx.doi.org/10.1108/intr-05-2014-0139.
Full textTarp, Sven. "Retskrivningsordbog mellem to stole." HERMES - Journal of Language and Communication in Business 26, no. 50 (2017): 127. http://dx.doi.org/10.7146/hjlcb.v26i50.97828.
Full textGupta, Rajendra. "COMPARISON OF CLASSIFICATION ALGORITHMS TO DETECT PHISHING WEB PAGES USING FEATURE SELECTION AND EXTRACTION." International Journal of Research -GRANTHAALAYAH 4, no. 8 (2016): 118–35. http://dx.doi.org/10.29121/granthaalayah.v4.i8.2016.2570.
Full textMeng, Xiao Ming, and Jian Hua Zhang. "Research on Dynamic Authorization Access Control Strategy Model of Distributed Multi-Organization MIS." Applied Mechanics and Materials 263-266 (December 2012): 1461–66. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.1461.
Full textHales, Alan Arthur, David Cable, Eleanor Crossley, Callum Findlay, and David Anthony Rew. "Design and implementation of the stacked, synchronised and iconographic timeline-structured electronic patient record in a UK NHS Global Digital Exemplar hospital." BMJ Health & Care Informatics 26, no. 1 (2019): e100025. http://dx.doi.org/10.1136/bmjhci-2019-100025.
Full textMaucksch, Christof, Peer M. Aries, Silke Zinke, and Ulf Müller-Ladner. "Patient Satisfaction with the Etanercept Biosimilar SB4 Device, Among Rheumatoid Arthritis and Spondyloarthropathy Patients - A German Observational Study." Open Rheumatology Journal 14, no. 1 (2020): 7–14. http://dx.doi.org/10.2174/1874312902014010007.
Full textBaldwin, Jon A., Asim K. Bag, Sharon L. White, Fathima F. Palot-Manzil, and Janis P. O'Malley. "All You Need to Know as an Authorized User." American Journal of Roentgenology 205, no. 2 (2015): 251–58. http://dx.doi.org/10.2214/ajr.14.13283.
Full textAbdul Halim, N. Z., S. A. Sulaiman, K. Talib, and Z. A. Majeed. "INVESTIGATING THE NATIONAL DIGITAL CADASTRAL DATABASE (NDCDB) DATA HANDLING WITHIN GIS APPLICATIONS." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLII-4/W9 (October 26, 2018): 3–10. http://dx.doi.org/10.5194/isprs-archives-xlii-4-w9-3-2018.
Full textFreeman, Edward H. "Denial of Service to Authorized Computer Users." Information Systems Security 10, no. 3 (2001): 1–5. http://dx.doi.org/10.1201/1086/43316.10.3.20010701/31723.2.
Full textDia, Ousmane Amadou, and Csilla Farkas. "Business Driven User Role Assignment." International Journal of Information Security and Privacy 7, no. 1 (2013): 45–62. http://dx.doi.org/10.4018/jisp.2013010104.
Full textBagnoli, Vicente. "Questions that Have Arisen since the EU Decision on the Whatsapp Acquisition by Facebook." Market and Competition Law Review 3, no. 1 (2019): 15–51. http://dx.doi.org/10.7559/mclawreview.2019.314.
Full textTang, Jie, Bin Zhang, and Umair Akram. "What Drives Authorization in Mobile Applications? A Perspective of Privacy Boundary Management." Information 12, no. 8 (2021): 311. http://dx.doi.org/10.3390/info12080311.
Full textT, Subashri, and Vaidehi V. "Effective Voice Calls Admission for Authorized User in Inter VOIP Network." International Journal of Network Security & Its Applications 2, no. 4 (2010): 213–32. http://dx.doi.org/10.5121/ijnsa.2010.2416.
Full textZhu, Xiaohua, and Kristin R. Eschenfelder. "Social Construction of Authorized Users in the Digital Age." College & Research Libraries 71, no. 6 (2010): 548–68. http://dx.doi.org/10.5860/crl-62r1.
Full textNarayana, Vejendla Lakshman, and Divya Midhunchakkaravarthy. "Secured Resource Allocation for Authorized Users Using Time Specific Blockchain Methodology." International Journal of Safety and Security Engineering 11, no. 2 (2021): 201–5. http://dx.doi.org/10.18280/ijsse.110209.
Full textMa, Weina, Kamran Sartipi, and Duane Bender. "Knowledge-Driven User Behavior Pattern Discovery for System Security Enhancement." International Journal of Software Engineering and Knowledge Engineering 26, no. 03 (2016): 379–404. http://dx.doi.org/10.1142/s0218194016500169.
Full textTustin, R. Don, Barbara Pennington, and Mitch Byrne. "Intrusiveness of Interventions: Ratings by Psychologists." Behaviour Change 11, no. 2 (1994): 94–100. http://dx.doi.org/10.1017/s0813483900004605.
Full textAvery, Robert B., Kenneth P. Brevoort, and Glenn B. Canner. "Credit Where None is Due? Authorized User Account Status and 'Piggybacking Credit'." Finance and Economics Discussion Series 2010, no. 23 (2010): 1–30. http://dx.doi.org/10.17016/feds.2010.23.
Full textBudi P, Ignasius Irawan. "Wireless access point protection from un-authorized user in an office environment." ACMIT Proceedings 1, no. 1 (2019): 90–98. http://dx.doi.org/10.33555/acmit.v1i1.11.
Full textBREVOORT, KENNETH P., ROBERT B. AVERY, and GLENN B. CANNER. "Credit Where None Is Due? Authorized-User Account Status and Piggybacking Credit." Journal of Consumer Affairs 47, no. 3 (2013): 518–47. http://dx.doi.org/10.1111/joca.12020.
Full textBelanger, Richard, Christina Grant, Myriam Côté, et al. "CANADIAN PEDIATRICIANS’ VIEWS AND KNOWLEDGE ABOUT CANNABIS USE FOR MEDICAL PURPOSES AMONG CHILDREN AND ADOLESCENTS." Paediatrics & Child Health 23, suppl_1 (2018): e53-e54. http://dx.doi.org/10.1093/pch/pxy054.134.
Full textWang, Li, Mingshan Xia, and Fazhi Qi. "Security Mechanism for user access to Single SSID WLAN." EPJ Web of Conferences 245 (2020): 07009. http://dx.doi.org/10.1051/epjconf/202024507009.
Full textFeuereisel, J. "Game appreciation in legislative conditions of the Czech Republic." Journal of Forest Science 49, No. 12 (2012): 575–79. http://dx.doi.org/10.17221/4726-jfs.
Full textSkaik, Samer. "Operational problems and solutions of statutory complex adjudication: stakeholders’ perspectives." International Journal of Law in the Built Environment 9, no. 2 (2017): 162–75. http://dx.doi.org/10.1108/ijlbe-03-2017-0009.
Full textLentza-Rizos, Ch. "Insecticides authorized for use on olive trees and the relationship between their registration and residues in olive oil." Grasas y Aceites 47, no. 6 (1996): 392–96. http://dx.doi.org/10.3989/gya.1996.v47.i6.886.
Full textP, Selvi Rajendran, and Rajendran L. "Virtual Bulletin Board using Man-Machine Interface (MMI) for Authorized Users." Indian Journal of Science and Technology 12, no. 34 (2019): 1–6. http://dx.doi.org/10.17485/ijst/2019/v12i34/112683.
Full textBarnett, Barry J. "The Last Farm Bill?" Journal of Agricultural and Applied Economics 46, no. 3 (2014): 311–19. http://dx.doi.org/10.1017/s1074070800030030.
Full textMegha Satyanarayana. "FDA authorizes COVID-19 diagnostic that uses immune cells." C&EN Global Enterprise 99, no. 9 (2021): 11. http://dx.doi.org/10.1021/cen-09909-buscon3.
Full textBesmer, Andrew R., Jason Watson, and M. Shane Banks. "Investigating User Perceptions of Mobile App Privacy." International Journal of Information Security and Privacy 14, no. 4 (2020): 74–91. http://dx.doi.org/10.4018/ijisp.2020100105.
Full textOlivia, Grace. "ANALYSIS OF CONSUMER PURCHASE BEHAVIOR OF NON-AUTHORIZED (NON BPOM) FACE MASK IN INDONESIA LOCAL PRODUCT." Advanced International Journal of Business, Entrepreneurship and SMEs 3, no. 9 (2021): 67–90. http://dx.doi.org/10.35631/aijbes.39006.
Full textBassenyemukasa, Charles S., and Randolph J. Pilc. "Using voice signal analysis to identify authorized users of a telephone system." Journal of the Acoustical Society of America 102, no. 6 (1997): 3253. http://dx.doi.org/10.1121/1.420249.
Full textBose, Chandan. "Identifying ‘authorized users’, identifying kin: negotiating relational worlds through Geographical Indications registration." Contemporary South Asia 29, no. 1 (2021): 97–110. http://dx.doi.org/10.1080/09584935.2021.1884656.
Full textMokrosińska, Dorota. "Tajna polityka – próba uzasadnienia." Civitas. Studia z filozofii polityki 20 (June 30, 2017): 141–60. http://dx.doi.org/10.35757/civ.2017.20.07.
Full textZhu, Jun, Shan Shan Zhu, and Han Sun. "Cooperative Spectrum Sensing Algorithm Based on High Contribution Value of Secondary Users in Cognitive Radio." Applied Mechanics and Materials 556-562 (May 2014): 4536–41. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.4536.
Full textZhang, Yue, Hanlin Zhang, Rong Hao, and Jia Yu. "Authorized identity-based public cloud storage auditing scheme with hierarchical structure for large-scale user groups." China Communications 15, no. 11 (2018): 111–21. http://dx.doi.org/10.1109/cc.2018.8543053.
Full textPhoju, Rabindra, and Krishna Prasad Bhandari. "Management of Internet Bandwidth Implementing CoovaChilli and Free Radius." Journal of Science and Engineering 8 (November 12, 2020): 56–60. http://dx.doi.org/10.3126/jsce.v8i0.32864.
Full textAlharbi, Muhammad H., and Omar H. Alhazmi. "User Authentication Scheme for Internet of Things Using Near-Field Communication." International Journal of Reliability, Quality and Safety Engineering 27, no. 05 (2020): 2040012. http://dx.doi.org/10.1142/s0218539320400124.
Full textChen, Xi Yuan, and Miao Liang Zhu. "A Semantic and Trust Based Framework for RBAC User-Role Assignment." Key Engineering Materials 439-440 (June 2010): 178–82. http://dx.doi.org/10.4028/www.scientific.net/kem.439-440.178.
Full textThanekar, Sachin Arun, K. Subrahmanyam, and A. B. Bagwan. "Effective Job Execution in Hadoop Over Authorized Deduplicated Data." Webology 17, no. 2 (2020): 430–44. http://dx.doi.org/10.14704/web/v17i2/web17043.
Full textLi, Jing, Yong Tang, and Wei Cui. "Storage Technology Research on Three Dimensional Flight Track Based on KML and SQL Server." Applied Mechanics and Materials 421 (September 2013): 717–20. http://dx.doi.org/10.4028/www.scientific.net/amm.421.717.
Full textRayani, Praveen Kumar, Bharath Bhushan, and Vaishali Ravindra Thakare. "Multi-Layer Token Based Authentication Through Honey Password in Fog Computing." International Journal of Fog Computing 1, no. 1 (2018): 50–62. http://dx.doi.org/10.4018/ijfc.2018010104.
Full textBellman, Lina, and Peter Öhman. "Authorised property appraisers’ perceptions of commercial property valuation." Journal of Property Investment & Finance 34, no. 3 (2016): 225–48. http://dx.doi.org/10.1108/jpif-08-2015-0061.
Full textFeilhauer, Thomas, Florian Braun, Katja Faller, et al. "Mobility Choices—An Instrument for Precise Automatized Travel Behavior Detection & Analysis." Sustainability 13, no. 4 (2021): 1912. http://dx.doi.org/10.3390/su13041912.
Full textJaved, Yousra, and Mohamed Shehab. "Look before you Authorize: Using Eye-Tracking to Enforce User Attention towards Application Permissions." Proceedings on Privacy Enhancing Technologies 2017, no. 2 (2017): 23–37. http://dx.doi.org/10.1515/popets-2017-0014.
Full text