Academic literature on the topic 'Authorizations'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Authorizations.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Authorizations"
van der Zee, Ivar T., Rick A. Vreman, Lawrence Liberti, and Mario Alanis Garza. "Regulatory reliance pathways during health emergencies: enabling timely authorizations for COVID-19 vaccines in Latin America." Revista Panamericana de Salud Pública 46 (August 30, 2022): 1. http://dx.doi.org/10.26633/rpsp.2022.115.
Full textBai, Yun, and Vijay Varadharajan. "Object Oriented Database with Authorization Policies." Fundamenta Informaticae 53, no. 3-4 (January 2002): 229–50. https://doi.org/10.3233/fun-2002-533-402.
Full textSharma, Mallika, Annika Gustafson, Barbara Jagels, and Tracy Wong. "Collaboration with commercial payor to eliminate prior authorization." Journal of Clinical Oncology 37, no. 27_suppl (September 20, 2019): 9. http://dx.doi.org/10.1200/jco.2019.37.27_suppl.9.
Full textMéndez Quincho, Leonor Carmen, Pedro Melitón Ramos Matías, and Oscar Felipe Arce Cruzado. "Diagnóstico del uso del agua y vertimientos de efluentes líquidos en el Perú (2013-2015)." Revista del Instituto de investigación de la Facultad de minas, metalurgia y ciencias geográficas 20, no. 39 (July 15, 2017): 123–36. https://doi.org/10.15381/iigeo.v20i39.14175.
Full textMcLaughlin, Rob. "Authorizations for maritime law enforcement operations." International Review of the Red Cross 98, no. 902 (August 2016): 465–90. http://dx.doi.org/10.1017/s1816383117000340.
Full textBargeron, Leonce, Alice Bonaime, and Shawn Thomas. "The Timing and Source of Long-Run Returns Following Repurchases." Journal of Financial and Quantitative Analysis 52, no. 2 (April 2017): 491–517. http://dx.doi.org/10.1017/s0022109017000084.
Full textXu, Yang, Wuqiang Gao, Quanrun Zeng, Guojun Wang, Ju Ren, and Yaoxue Zhang. "A Feasible Fuzzy-Extended Attribute-Based Access Control Technique." Security and Communication Networks 2018 (June 5, 2018): 1–11. http://dx.doi.org/10.1155/2018/6476315.
Full textHofmann, Bjørn. "From consent to authorization." Etikk i praksis - Nordic Journal of Applied Ethics, no. 2 (December 27, 2024): 35–47. https://doi.org/10.5324/eip.v18i2.5965.
Full textVandenberghe, Karolien. "Dual-Use Regulation 2021/821: What’s Old & What’s New in EU Export Control." Global Trade and Customs Journal 16, Issue 9 (September 1, 2021): 479–88. http://dx.doi.org/10.54648/gtcj2021053.
Full textBhardwaj, Aarti Sonia, Mark Liu, Sofya Pintova, Chanda Williams, Jennifer Liggins, Haydee Soto, Daniel Favre, Alana Noble-Kirk, and Cardinale B. Smith. "Implementation of a streamlined prior authorization process to improve cancer care delivery." Journal of Clinical Oncology 41, no. 16_suppl (June 1, 2023): 1531. http://dx.doi.org/10.1200/jco.2023.41.16_suppl.1531.
Full textDissertations / Theses on the topic "Authorizations"
Lui, W. C., and 雷永祥. "Flexible authorizations in workflow management systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B42577135.
Full textLui, W. C. "Flexible authorizations in workflow management systems." Click to view the E-thesis via HKUTO, 2002. http://sunzi.lib.hku.hk/hkuto/record/B42577135.
Full textFirman, Fikri. "Outdoor Small Cell Deployment with Complementary Spectrum Authorizations, Licensed (LSA) and Unlicensed (LAA) : Techno-Economic Analysis." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-207140.
Full textRuan, Chun, University of Western Sydney, of Science Technology and Environment College, and School of Computing and Information Technology. "Models for authorization and conflict resolution." THESIS_CSTE_CIT_Ruan_C.xml, 2003. http://handle.uws.edu.au:8081/1959.7/546.
Full textPachas, Pérez Diego. "Mining Exploration in Peru: A Brief Scope on the Main Authorizations for the Development of an Exploration Project in Peru." Derecho & Sociedad, 2015. http://repositorio.pucp.edu.pe/index/handle/123456789/118585.
Full textCrampton, Jason Alexis Valentine. "Authorization and antichains." Thesis, Birkbeck (University of London), 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.271717.
Full textHumenn, Polar. "The authorization calculus." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available, full text:, 2008. http://wwwlib.umi.com/cr/syr/main.
Full textKini, Pranab. "Towards improving the performance of enterprise authorization systems using speculative authorization." Thesis, University of British Columbia, 2010. http://hdl.handle.net/2429/29561.
Full textCabarkapa, Dragan. "Authorization Architecture for SWoT." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-134639.
Full textBjörkenvall, Anton. "Authorization Tool for Usersand Media Archives in WordPress : A Role Based Authorization Plugin." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-371460.
Full textBooks on the topic "Authorizations"
Oregon. Dept. of State Lands., ed. Waterway authorizations: Does your use of a waterway require state authorization? [Salem, Or.]: Oregon Dept. of State Lands, 2007.
Find full textAdministration, United States Congress Senate Committee on Rules and. Expenditure authorizations and requirements for Senate committees. Washington: U.S. G.P.O., 1986.
Find full textSenate, United States Congress. Expenditure authorizations and requirements for Senate committees. Washington: U.S. G.P.O., 1988.
Find full textSenate, United States Congress. Expenditure authorizations and requirements for Senate committees. Washington: U.S. G.P.O., 1988.
Find full textSenate, United States Congress. Expenditure authorizations and requirements for Senate committees. Washington: U.S. G.P.O., 1993.
Find full textSenate, United States Congress. Expenditure authorizations and requirements for Senate committees. Washington: U.S. G.P.O., 1994.
Find full textUnited States. Congress. Senate. Committee on Rules and Administration. Expenditure authorizations and requirements for Senate committees. Washington: U.S. G.P.O., 1985.
Find full textLehnert, Volker. Authorizations in SAP software: Design and configuration. Boston: Galileo Press, 2010.
Find full textUnited States. Congress. Senate. Committee on Rules and Administration. Expenditure authorizations and requirements for Senate committees. Washington: U.S. G.P.O., 1986.
Find full textUnited States. Congress. Senate. Expenditure authorizations and requirements for Senate committees. Washington: U.S. G.P.O., 1996.
Find full textBook chapters on the topic "Authorizations"
De Capitani di Vimercati, Sabrina. "Authorizations." In Encyclopedia of Cryptography and Security, 65–68. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_810.
Full textDe Capitani di Vimercati, Sabrina. "Authorizations." In Encyclopedia of Cryptography, Security and Privacy, 1–4. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_810-2.
Full textDe Capitani diVimercati, Sabrina. "Authorizations." In Encyclopedia of Cryptography, Security and Privacy, 168–71. Cham: Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_810.
Full textJajodia, Sushil, Michiharu Kudo, and V. S. Subrahmanian. "Provisional Authorizations." In Advances in Information Security, 133–59. Boston, MA: Springer US, 2001. http://dx.doi.org/10.1007/978-1-4615-1467-1_8.
Full textArthur, Will, David Challener, and Kenneth Goldman. "Authorizations and Sessions." In A Practical Guide to TPM 2.0, 163–216. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4302-6584-9_13.
Full textAtluri, Vijay, and Heechang Shin. "Geospatial Authorizations, Efficient Enforcement." In Encyclopedia of GIS, 379–85. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-35973-1_503.
Full textAtluri, Vijay, and Heechang Shin. "Geospatial Authorizations, Efficient Enforcement." In Encyclopedia of GIS, 1–9. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-23519-6_503-2.
Full textAtluri, Vijay, and Heechang Shin. "Geospatial Authorizations, Efficient Enforcement." In Encyclopedia of GIS, 730–38. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-17885-1_503.
Full textWang, Hua, and Jinli Cao. "Delegating Revocations and Authorizations." In Business Process Management Workshops, 294–305. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-78238-4_29.
Full textGrilli, Barbara A., and Theresa G. Webb. "Authorizations, Approvals, and Award." In Strategic Sourcing in the Public Sector, 129–42. New York: Routledge, 2023. http://dx.doi.org/10.4324/9781003267287-9.
Full textConference papers on the topic "Authorizations"
Quintero, Vladimir, Cesar Chevel, and Paul Sanmartin-Mendoza. "Health Services Authorizations: Methodology Proposal." In 2024 IEEE Technology and Engineering Management Society (TEMSCON LATAM), 1–6. IEEE, 2024. http://dx.doi.org/10.1109/temsconlatam61834.2024.10717813.
Full textCummings, Laura. ""Flagging Out" - The Rise of Non-National Satellite Spectrum Authorizations." In IISL Colloquium on the Law of Outer Space, Held at the 75th International Astronautical Congress (IAC 2024), 39–40. Paris, France: International Astronautical Federation (IAF), 2024. https://doi.org/10.52202/078384-0005.
Full textSuntaxi, Gabriela, Aboubakr Achraf El Ghazi, and Klemens Böhm. "Mutual Authorizations." In SACMAT '19: The 24th ACM Symposium on Access Control Models and Technologies. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3322431.3325415.
Full textA. Maciaszek, Leszek, and Mieczyslaw L. Owoc. "Designing Application Authorizations." In 2001 Informing Science Conference. Informing Science Institute, 2001. http://dx.doi.org/10.28945/2409.
Full textBasin, David, Samuel J. Burri, and Günter Karjoth. "Optimal workflow-aware authorizations." In the 17th ACM symposium. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2295136.2295154.
Full textBeznosov, Konstantin (Kosta). "Flooding and recycling authorizations." In the 2005 workshop. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1146269.1146285.
Full text"Semantic Interoperability of Authorizations." In 2nd International Workshop on Security In Information Systems. SciTePress - Science and and Technology Publications, 2004. http://dx.doi.org/10.5220/0002682402690278.
Full textZhang, Mingsheng, Wu Chen, Yisong Wang, and Mingyi Zhang. "Flexible Authorizations with Logic Program." In 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC). IEEE, 2009. http://dx.doi.org/10.1109/nswctc.2009.9.
Full textBertino, Elisa, Pierangela Samarati, and Sushil Jajodia. "Authorizations in relational database management systems." In the 1st ACM conference. New York, New York, USA: ACM Press, 1993. http://dx.doi.org/10.1145/168588.168605.
Full textStubblefield, William A., and Karen S. Rogers. "The social life of engineering authorizations." In the conference. New York, New York, USA: ACM Press, 2000. http://dx.doi.org/10.1145/347642.347655.
Full textReports on the topic "Authorizations"
Lepinski, M., S. Kent, and D. Kong. A Profile for Route Origin Authorizations (ROAs). RFC Editor, February 2012. http://dx.doi.org/10.17487/rfc6482.
Full textSnijders, J., B. Maddison, M. Lepinski, D. Kong, and S. Kent. A Profile for Route Origin Authorizations (ROAs). RFC Editor, May 2024. http://dx.doi.org/10.17487/rfc9582.
Full textYan, Z., R. Bush, G. Geng, T. de Kock, and J. Yao. Avoiding Route Origin Authorizations (ROAs) Containing Multiple IP Prefixes. RFC Editor, August 2023. http://dx.doi.org/10.17487/rfc9455.
Full textSchilling, Duane T. Assessment of CINC Authorizations to CINC Requirements (ACAR) (Follow-On). Fort Belvoir, VA: Defense Technical Information Center, March 2001. http://dx.doi.org/10.21236/ada411947.
Full textHuston, G., and G. Michaelson. Validation of Route Origination Using the Resource Certificate Public Key Infrastructure (PKI) and Route Origin Authorizations (ROAs). RFC Editor, February 2012. http://dx.doi.org/10.17487/rfc6483.
Full textDAUTEL, W. A. FFTF Authorization Agreement. Office of Scientific and Technical Information (OSTI), September 2000. http://dx.doi.org/10.2172/804751.
Full textVollbrecht, J., P. Calhoun, S. Farrell, L. Gommans, G. Gross, B. de, C. de, M. Holdrege, and D. Spence. AAA Authorization Framework. RFC Editor, August 2000. http://dx.doi.org/10.17487/rfc2904.
Full textFarrell, S., J. Vollbrecht, P. Calhoun, L. Gommans, G. Gross, B. de, C. de, M. Holdrege, and D. Spence. AAA Authorization Requirements. RFC Editor, August 2000. http://dx.doi.org/10.17487/rfc2906.
Full textRosenberg, J. Presence Authorization Rules. RFC Editor, December 2007. http://dx.doi.org/10.17487/rfc5025.
Full textDAUTEL, W. A. FFTF Authorization Agreement. Office of Scientific and Technical Information (OSTI), February 2000. http://dx.doi.org/10.2172/801319.
Full text