Gotowa bibliografia na temat „Authorizations”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Authorizations”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Authorizations"
van der Zee, Ivar T., Rick A. Vreman, Lawrence Liberti, and Mario Alanis Garza. "Regulatory reliance pathways during health emergencies: enabling timely authorizations for COVID-19 vaccines in Latin America." Revista Panamericana de Salud Pública 46 (August 30, 2022): 1. http://dx.doi.org/10.26633/rpsp.2022.115.
Pełny tekst źródłaBai, Yun, and Vijay Varadharajan. "Object Oriented Database with Authorization Policies." Fundamenta Informaticae 53, no. 3-4 (2002): 229–50. https://doi.org/10.3233/fun-2002-533-402.
Pełny tekst źródłaSharma, Mallika, Annika Gustafson, Barbara Jagels, and Tracy Wong. "Collaboration with commercial payor to eliminate prior authorization." Journal of Clinical Oncology 37, no. 27_suppl (2019): 9. http://dx.doi.org/10.1200/jco.2019.37.27_suppl.9.
Pełny tekst źródłaMéndez Quincho, Leonor Carmen, Pedro Melitón Ramos Matías, and Oscar Felipe Arce Cruzado. "Diagnóstico del uso del agua y vertimientos de efluentes líquidos en el Perú (2013-2015)." Revista del Instituto de investigación de la Facultad de minas, metalurgia y ciencias geográficas 20, no. 39 (2017): 123–36. https://doi.org/10.15381/iigeo.v20i39.14175.
Pełny tekst źródłaMcLaughlin, Rob. "Authorizations for maritime law enforcement operations." International Review of the Red Cross 98, no. 902 (2016): 465–90. http://dx.doi.org/10.1017/s1816383117000340.
Pełny tekst źródłaBargeron, Leonce, Alice Bonaime, and Shawn Thomas. "The Timing and Source of Long-Run Returns Following Repurchases." Journal of Financial and Quantitative Analysis 52, no. 2 (2017): 491–517. http://dx.doi.org/10.1017/s0022109017000084.
Pełny tekst źródłaXu, Yang, Wuqiang Gao, Quanrun Zeng, Guojun Wang, Ju Ren, and Yaoxue Zhang. "A Feasible Fuzzy-Extended Attribute-Based Access Control Technique." Security and Communication Networks 2018 (June 5, 2018): 1–11. http://dx.doi.org/10.1155/2018/6476315.
Pełny tekst źródłaHofmann, Bjørn. "From consent to authorization." Etikk i praksis - Nordic Journal of Applied Ethics, no. 2 (December 27, 2024): 35–47. https://doi.org/10.5324/eip.v18i2.5965.
Pełny tekst źródłaVandenberghe, Karolien. "Dual-Use Regulation 2021/821: What’s Old & What’s New in EU Export Control." Global Trade and Customs Journal 16, Issue 9 (2021): 479–88. http://dx.doi.org/10.54648/gtcj2021053.
Pełny tekst źródłaBhardwaj, Aarti Sonia, Mark Liu, Sofya Pintova, et al. "Implementation of a streamlined prior authorization process to improve cancer care delivery." Journal of Clinical Oncology 41, no. 16_suppl (2023): 1531. http://dx.doi.org/10.1200/jco.2023.41.16_suppl.1531.
Pełny tekst źródłaRozprawy doktorskie na temat "Authorizations"
Lui, W. C., and 雷永祥. "Flexible authorizations in workflow management systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B42577135.
Pełny tekst źródłaLui, W. C. "Flexible authorizations in workflow management systems." Click to view the E-thesis via HKUTO, 2002. http://sunzi.lib.hku.hk/hkuto/record/B42577135.
Pełny tekst źródłaFirman, Fikri. "Outdoor Small Cell Deployment with Complementary Spectrum Authorizations, Licensed (LSA) and Unlicensed (LAA) : Techno-Economic Analysis." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-207140.
Pełny tekst źródłaRuan, Chun, University of Western Sydney, of Science Technology and Environment College, and School of Computing and Information Technology. "Models for authorization and conflict resolution." THESIS_CSTE_CIT_Ruan_C.xml, 2003. http://handle.uws.edu.au:8081/1959.7/546.
Pełny tekst źródłaPachas, Pérez Diego. "Mining Exploration in Peru: A Brief Scope on the Main Authorizations for the Development of an Exploration Project in Peru." Derecho & Sociedad, 2015. http://repositorio.pucp.edu.pe/index/handle/123456789/118585.
Pełny tekst źródłaCrampton, Jason Alexis Valentine. "Authorization and antichains." Thesis, Birkbeck (University of London), 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.271717.
Pełny tekst źródłaHumenn, Polar. "The authorization calculus." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available, full text:, 2008. http://wwwlib.umi.com/cr/syr/main.
Pełny tekst źródłaKini, Pranab. "Towards improving the performance of enterprise authorization systems using speculative authorization." Thesis, University of British Columbia, 2010. http://hdl.handle.net/2429/29561.
Pełny tekst źródłaCabarkapa, Dragan. "Authorization Architecture for SWoT." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-134639.
Pełny tekst źródłaBjörkenvall, Anton. "Authorization Tool for Usersand Media Archives in WordPress : A Role Based Authorization Plugin." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-371460.
Pełny tekst źródłaKsiążki na temat "Authorizations"
Oregon. Dept. of State Lands., ed. Waterway authorizations: Does your use of a waterway require state authorization? Oregon Dept. of State Lands, 2007.
Znajdź pełny tekst źródłaAdministration, United States Congress Senate Committee on Rules and. Expenditure authorizations and requirements for Senate committees. U.S. G.P.O., 1986.
Znajdź pełny tekst źródłaSenate, United States Congress. Expenditure authorizations and requirements for Senate committees. U.S. G.P.O., 1988.
Znajdź pełny tekst źródłaSenate, United States Congress. Expenditure authorizations and requirements for Senate committees. U.S. G.P.O., 1988.
Znajdź pełny tekst źródłaSenate, United States Congress. Expenditure authorizations and requirements for Senate committees. U.S. G.P.O., 1993.
Znajdź pełny tekst źródłaSenate, United States Congress. Expenditure authorizations and requirements for Senate committees. U.S. G.P.O., 1994.
Znajdź pełny tekst źródłaUnited States. Congress. Senate. Committee on Rules and Administration. Expenditure authorizations and requirements for Senate committees. U.S. G.P.O., 1985.
Znajdź pełny tekst źródłaLehnert, Volker. Authorizations in SAP software: Design and configuration. Galileo Press, 2010.
Znajdź pełny tekst źródłaUnited States. Congress. Senate. Committee on Rules and Administration. Expenditure authorizations and requirements for Senate committees. U.S. G.P.O., 1986.
Znajdź pełny tekst źródłaUnited States. Congress. Senate. Expenditure authorizations and requirements for Senate committees. U.S. G.P.O., 1996.
Znajdź pełny tekst źródłaCzęści książek na temat "Authorizations"
De Capitani di Vimercati, Sabrina. "Authorizations." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_810.
Pełny tekst źródłaDe Capitani di Vimercati, Sabrina. "Authorizations." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_810-2.
Pełny tekst źródłaDe Capitani diVimercati, Sabrina. "Authorizations." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_810.
Pełny tekst źródłaJajodia, Sushil, Michiharu Kudo, and V. S. Subrahmanian. "Provisional Authorizations." In Advances in Information Security. Springer US, 2001. http://dx.doi.org/10.1007/978-1-4615-1467-1_8.
Pełny tekst źródłaArthur, Will, David Challener, and Kenneth Goldman. "Authorizations and Sessions." In A Practical Guide to TPM 2.0. Apress, 2015. http://dx.doi.org/10.1007/978-1-4302-6584-9_13.
Pełny tekst źródłaAtluri, Vijay, and Heechang Shin. "Geospatial Authorizations, Efficient Enforcement." In Encyclopedia of GIS. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-35973-1_503.
Pełny tekst źródłaAtluri, Vijay, and Heechang Shin. "Geospatial Authorizations, Efficient Enforcement." In Encyclopedia of GIS. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-23519-6_503-2.
Pełny tekst źródłaAtluri, Vijay, and Heechang Shin. "Geospatial Authorizations, Efficient Enforcement." In Encyclopedia of GIS. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-17885-1_503.
Pełny tekst źródłaWang, Hua, and Jinli Cao. "Delegating Revocations and Authorizations." In Business Process Management Workshops. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-78238-4_29.
Pełny tekst źródłaGrilli, Barbara A., and Theresa G. Webb. "Authorizations, Approvals, and Award." In Strategic Sourcing in the Public Sector. Routledge, 2023. http://dx.doi.org/10.4324/9781003267287-9.
Pełny tekst źródłaStreszczenia konferencji na temat "Authorizations"
Quintero, Vladimir, Cesar Chevel, and Paul Sanmartin-Mendoza. "Health Services Authorizations: Methodology Proposal." In 2024 IEEE Technology and Engineering Management Society (TEMSCON LATAM). IEEE, 2024. http://dx.doi.org/10.1109/temsconlatam61834.2024.10717813.
Pełny tekst źródłaCummings, Laura. ""Flagging Out" - The Rise of Non-National Satellite Spectrum Authorizations." In IISL Colloquium on the Law of Outer Space, Held at the 75th International Astronautical Congress (IAC 2024). International Astronautical Federation (IAF), 2024. https://doi.org/10.52202/078384-0005.
Pełny tekst źródłaChakarov, Aleks, Jaco Geldenhuys, Matthew Heck, et al. "Formally Verified Cloud-Scale Authorization." In 2025 IEEE/ACM 47th International Conference on Software Engineering (ICSE). IEEE, 2025. https://doi.org/10.1109/icse55347.2025.00166.
Pełny tekst źródłaSuntaxi, Gabriela, Aboubakr Achraf El Ghazi, and Klemens Böhm. "Mutual Authorizations." In SACMAT '19: The 24th ACM Symposium on Access Control Models and Technologies. ACM, 2019. http://dx.doi.org/10.1145/3322431.3325415.
Pełny tekst źródłaA. Maciaszek, Leszek, and Mieczyslaw L. Owoc. "Designing Application Authorizations." In 2001 Informing Science Conference. Informing Science Institute, 2001. http://dx.doi.org/10.28945/2409.
Pełny tekst źródłaBasin, David, Samuel J. Burri, and Günter Karjoth. "Optimal workflow-aware authorizations." In the 17th ACM symposium. ACM Press, 2012. http://dx.doi.org/10.1145/2295136.2295154.
Pełny tekst źródłaBeznosov, Konstantin (Kosta). "Flooding and recycling authorizations." In the 2005 workshop. ACM Press, 2005. http://dx.doi.org/10.1145/1146269.1146285.
Pełny tekst źródła"Semantic Interoperability of Authorizations." In 2nd International Workshop on Security In Information Systems. SciTePress - Science and and Technology Publications, 2004. http://dx.doi.org/10.5220/0002682402690278.
Pełny tekst źródłaZhang, Mingsheng, Wu Chen, Yisong Wang, and Mingyi Zhang. "Flexible Authorizations with Logic Program." In 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC). IEEE, 2009. http://dx.doi.org/10.1109/nswctc.2009.9.
Pełny tekst źródłaBertino, Elisa, Pierangela Samarati, and Sushil Jajodia. "Authorizations in relational database management systems." In the 1st ACM conference. ACM Press, 1993. http://dx.doi.org/10.1145/168588.168605.
Pełny tekst źródłaRaporty organizacyjne na temat "Authorizations"
Lepinski, M., S. Kent, and D. Kong. A Profile for Route Origin Authorizations (ROAs). RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6482.
Pełny tekst źródłaSnijders, J., B. Maddison, M. Lepinski, D. Kong, and S. Kent. A Profile for Route Origin Authorizations (ROAs). RFC Editor, 2024. http://dx.doi.org/10.17487/rfc9582.
Pełny tekst źródłaYan, Z., R. Bush, G. Geng, T. de Kock, and J. Yao. Avoiding Route Origin Authorizations (ROAs) Containing Multiple IP Prefixes. RFC Editor, 2023. http://dx.doi.org/10.17487/rfc9455.
Pełny tekst źródłaSchilling, Duane T. Assessment of CINC Authorizations to CINC Requirements (ACAR) (Follow-On). Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada411947.
Pełny tekst źródłaHuston, G., and G. Michaelson. Validation of Route Origination Using the Resource Certificate Public Key Infrastructure (PKI) and Route Origin Authorizations (ROAs). RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6483.
Pełny tekst źródłaDAUTEL, W. A. FFTF Authorization Agreement. Office of Scientific and Technical Information (OSTI), 2000. http://dx.doi.org/10.2172/804751.
Pełny tekst źródłaVollbrecht, J., P. Calhoun, S. Farrell, et al. AAA Authorization Framework. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2904.
Pełny tekst źródłaFarrell, S., J. Vollbrecht, P. Calhoun, et al. AAA Authorization Requirements. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2906.
Pełny tekst źródłaRosenberg, J. Presence Authorization Rules. RFC Editor, 2007. http://dx.doi.org/10.17487/rfc5025.
Pełny tekst źródłaDAUTEL, W. A. FFTF Authorization Agreement. Office of Scientific and Technical Information (OSTI), 2000. http://dx.doi.org/10.2172/801319.
Pełny tekst źródła