Gotowa bibliografia na temat „Authorizations”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Authorizations”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Authorizations"

1

van der Zee, Ivar T., Rick A. Vreman, Lawrence Liberti, and Mario Alanis Garza. "Regulatory reliance pathways during health emergencies: enabling timely authorizations for COVID-19 vaccines in Latin America." Revista Panamericana de Salud Pública 46 (August 30, 2022): 1. http://dx.doi.org/10.26633/rpsp.2022.115.

Pełny tekst źródła
Streszczenie:
Objectives. To map the timing and nature of regulatory reliance pathways used to authorize COVID-19 vaccines in Latin America. Methods. An observational study was conducted assessing the characteristics of all COVID-19 vaccine authorizations in Latin America. For every authorization it was determined whether reliance was used in the authorization process. Subgroups of reference national regulatory authorities (NRAs) and non-reference NRAs were compared. Results. 56 authorizations of 10 different COVID-19 vaccines were identified in 18 countries, of which 25 (44.6%) used reliance and 12 (21.4%)
Style APA, Harvard, Vancouver, ISO itp.
2

Bai, Yun, and Vijay Varadharajan. "Object Oriented Database with Authorization Policies." Fundamenta Informaticae 53, no. 3-4 (2002): 229–50. https://doi.org/10.3233/fun-2002-533-402.

Pełny tekst źródła
Streszczenie:
Authorization specification in object oriented databases is being increasingly investigated recently by many researchers [4,5,7,9,10]. However, most of the work todate suffers from a lack of formal logic semantics to characterize different types of inheritance properties of authorization policies among complex data objects. This paper is to address this issue from a formal logic point of view. In particular, we propose a logic language that has a clear and declarative semantics to specify the structural features of object oriented databases and authorizations associated with complex data objec
Style APA, Harvard, Vancouver, ISO itp.
3

Sharma, Mallika, Annika Gustafson, Barbara Jagels, and Tracy Wong. "Collaboration with commercial payor to eliminate prior authorization." Journal of Clinical Oncology 37, no. 27_suppl (2019): 9. http://dx.doi.org/10.1200/jco.2019.37.27_suppl.9.

Pełny tekst źródła
Streszczenie:
9 Background: For commercial insurance plans, there is often a requirement to obtain prior-authorization for specific services. Prior-authorization though intended to ensure medical necessity, can cause significant delays in patient care and create an unnecessary administrative burden. It often leads to undue anxiety in patients, dissatisfaction among providers and substantial waste in the system. To increase our efficiency and improve patient and provider experience, we partnered with one of our region’s largest commercial payors to eliminate prior-authorization. Methods: A Lean Six-sigma DMA
Style APA, Harvard, Vancouver, ISO itp.
4

Méndez Quincho, Leonor Carmen, Pedro Melitón Ramos Matías, and Oscar Felipe Arce Cruzado. "Diagnóstico del uso del agua y vertimientos de efluentes líquidos en el Perú (2013-2015)." Revista del Instituto de investigación de la Facultad de minas, metalurgia y ciencias geográficas 20, no. 39 (2017): 123–36. https://doi.org/10.15381/iigeo.v20i39.14175.

Pełny tekst źródła
Streszczenie:
In Peru, the management of water use and discharges are regulated by Water National Authority, which gives the right of use and discharging in sustainability conditions and economic retribution. The number of discharging authorizations between 2013 and 2015 was 529; and 21 for reuse. The points of authorized discharging were 686. The total authorized volume for discharging was 1802 hm3. And 16 hm3 for reuse. The sub-sectors that had discharging authorization between 2013 and 2015 were the mining (261 authorizations and 913 hm3 of discharging), fishing (87 authorizations and 24 hm3 of dischargi
Style APA, Harvard, Vancouver, ISO itp.
5

McLaughlin, Rob. "Authorizations for maritime law enforcement operations." International Review of the Red Cross 98, no. 902 (2016): 465–90. http://dx.doi.org/10.1017/s1816383117000340.

Pełny tekst źródła
Streszczenie:
AbstractAlthough there are areas of uncertainty and overlap, authorizations for maritime law enforcement operations are beholden to a different regime from that which governs the conduct of armed conflict at sea. This article seeks to briefly describe five regularly employed authorizations for maritime law enforcement operations at sea: flag State consent, agreed pre-authorization, coastal State jurisdiction, UN Security Council resolutions, and the right of visit.
Style APA, Harvard, Vancouver, ISO itp.
6

Bargeron, Leonce, Alice Bonaime, and Shawn Thomas. "The Timing and Source of Long-Run Returns Following Repurchases." Journal of Financial and Quantitative Analysis 52, no. 2 (2017): 491–517. http://dx.doi.org/10.1017/s0022109017000084.

Pełny tekst źródła
Streszczenie:
This paper investigates the timing and source of anomalous positive long-run abnormal returns following repurchase authorizations. Returns between program authorization and completion announcements are indistinguishable from 0. Abnormal returns occur onlyaftercompletion announcements. Long-run returns are largely attributable to announcement returns at subsequent authorizations and takeover attempts; that is, anomalous post-authorization returns are not persistent drifts but rather step functions. These findings have important implications for prior papers examining this most persistent and wi
Style APA, Harvard, Vancouver, ISO itp.
7

Xu, Yang, Wuqiang Gao, Quanrun Zeng, Guojun Wang, Ju Ren, and Yaoxue Zhang. "A Feasible Fuzzy-Extended Attribute-Based Access Control Technique." Security and Communication Networks 2018 (June 5, 2018): 1–11. http://dx.doi.org/10.1155/2018/6476315.

Pełny tekst źródła
Streszczenie:
Attribute-based access control (ABAC) is a maturing authorization technique with outstanding expressiveness and scalability, which shows its overwhelmingly competitive advantage, especially in complicated dynamic environments. Unfortunately, the absence of a flexible exceptional approval mechanism in ABAC impairs the resource usability and business time efficiency in current practice, which could limit its growth. In this paper, we propose a feasible fuzzy-extended ABAC (FBAC) technique to improve the flexibility in urgent exceptional authorizations and thereby improving the resource usability
Style APA, Harvard, Vancouver, ISO itp.
8

Hofmann, Bjørn. "From consent to authorization." Etikk i praksis - Nordic Journal of Applied Ethics, no. 2 (December 27, 2024): 35–47. https://doi.org/10.5324/eip.v18i2.5965.

Pełny tekst źródła
Streszczenie:
The turn from traditional paternalism and towards patient autonomy has made informed consent a key concept for medical ethics and health legislation. However, informed consent has been attacked for a wide range of shortcomings, both conceptually and theoretically, as well as practically. Vilhjálmur Árnason has suggested an alternative to informed consent, i.e., to give authorizations. Vilhjálmur1 has been supported by other researchers, but the authorization approach has not been elaborated in any greater detail or come to widespread use in bioethics. This article describes and discusses Vilhj
Style APA, Harvard, Vancouver, ISO itp.
9

Vandenberghe, Karolien. "Dual-Use Regulation 2021/821: What’s Old & What’s New in EU Export Control." Global Trade and Customs Journal 16, Issue 9 (2021): 479–88. http://dx.doi.org/10.54648/gtcj2021053.

Pełny tekst źródła
Streszczenie:
Regulation 2021/821 of 20 May 2021, which sets up a European Union (EU) regime for the control of exports, brokering, technical assistance, transit, and transfer of dual-use items, enters into force on 9 September 2021. While the main features of the EU’s dual-use regime remain the same, Regulation 2021/821 introduces some novelties. Export control is extended to technical assistance. Member States are granted more options to use local controls applicable to non-listed items, particularly in the case of cyber-surveillance items being used for repression or serious human rights violations, and
Style APA, Harvard, Vancouver, ISO itp.
10

Bhardwaj, Aarti Sonia, Mark Liu, Sofya Pintova, et al. "Implementation of a streamlined prior authorization process to improve cancer care delivery." Journal of Clinical Oncology 41, no. 16_suppl (2023): 1531. http://dx.doi.org/10.1200/jco.2023.41.16_suppl.1531.

Pełny tekst źródła
Streszczenie:
1531 Background: Prior authorizations (PAs) for systemic cancer treatments are increasingly becoming a barrier to timely quality cancer care delivery. There is an extraordinary administrative burden placed on clinicians to complete peer to peers (P2P) and appeals when authorization specialists are unable to identify appropriate clinical data in the EHRs. This leads to delays in care, staff burnout and loss of revenue. At our tertiary academic cancer center, in partnership with our cancer registry and Epic teams, we propose shifting the clerical work required for intravenous chemotherapy PAs fr
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "Authorizations"

1

Lui, W. C., and 雷永祥. "Flexible authorizations in workflow management systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B42577135.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Lui, W. C. "Flexible authorizations in workflow management systems." Click to view the E-thesis via HKUTO, 2002. http://sunzi.lib.hku.hk/hkuto/record/B42577135.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Firman, Fikri. "Outdoor Small Cell Deployment with Complementary Spectrum Authorizations, Licensed (LSA) and Unlicensed (LAA) : Techno-Economic Analysis." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-207140.

Pełny tekst źródła
Streszczenie:
The significant increase in mobile data traffc has put a considerable load on the wireless mobile networks. In the current highly competitive market, Mobile Network Operators (MNOs) have to strive to provide additional capacityof their network, by also considering the cost factor to make their business sustainable. Along with advances in spectrum-efficient technologies, small cells deployment have provided cost-efficient methods to provide additional capacity for indoor and outdoor subscribers. The gain of better spectrum utilization and opportunistic spectrum access have motivated the deploym
Style APA, Harvard, Vancouver, ISO itp.
4

Ruan, Chun, University of Western Sydney, of Science Technology and Environment College, and School of Computing and Information Technology. "Models for authorization and conflict resolution." THESIS_CSTE_CIT_Ruan_C.xml, 2003. http://handle.uws.edu.au:8081/1959.7/546.

Pełny tekst źródła
Streszczenie:
Access control is a significant issue in any secure computer system. Authorization models provide a formalism and framework for specifying and evaluating access control policies that determine how access is granted and delegated among particular users. The aim of this dissertation is to investigate flexible decentralized authorization model supporting authorization delegation, both positive and negative authorization, and conflict resolution. A graph based authorization framework is proposed which can support authorization delegations and both positive and negative authorizations. In particula
Style APA, Harvard, Vancouver, ISO itp.
5

Pachas, Pérez Diego. "Mining Exploration in Peru: A Brief Scope on the Main Authorizations for the Development of an Exploration Project in Peru." Derecho & Sociedad, 2015. http://repositorio.pucp.edu.pe/index/handle/123456789/118585.

Pełny tekst źródła
Streszczenie:
The purpose of the author in this article is to outline the main licenses regarding mineral exploration and publicize the usual paperwork and contingencies obtaining these permits.It also presents alternatives to traditional procedures, which are more useful in practice to expedite to start of mining exploration activities in Peru.<br>El fin del autor en este artículo es hacer un esbozo de los principales títulos habilitantes para lo referente a la exploración minera, así como dar a conocer los trámites y usuales contingencias que acarrean la obtención de estos permisos. Asimismo, se presentan
Style APA, Harvard, Vancouver, ISO itp.
6

Crampton, Jason Alexis Valentine. "Authorization and antichains." Thesis, Birkbeck (University of London), 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.271717.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Humenn, Polar. "The authorization calculus." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available, full text:, 2008. http://wwwlib.umi.com/cr/syr/main.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Kini, Pranab. "Towards improving the performance of enterprise authorization systems using speculative authorization." Thesis, University of British Columbia, 2010. http://hdl.handle.net/2429/29561.

Pełny tekst źródła
Streszczenie:
With the emergence of tighter corporate policies and government regulations, access control has become an integral part of business requirements in enterprises. The authorization process in enterprise systems follow the request-response model, where a policy enforcement point intercepts application requests, obtains authorization decisions from a remote policy decision point, and enforces those decisions. The two advantages of this model are (1) the separation between the application and authorization logic (2) reduction of authorization policy administration. However, the authorization proces
Style APA, Harvard, Vancouver, ISO itp.
9

Cabarkapa, Dragan. "Authorization Architecture for SWoT." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-134639.

Pełny tekst źródła
Streszczenie:
Social Web of Things (SWoT) is a user centric framework which facilitates interaction between software agents deployed on smart things and in the cloud. Software agents deployed on smart things are remotely accessible, host sensitive resources, and often represent high value targets. SWoT currently does not feature adequate security mechanisms which could protect software agents from unauthorized access. In this thesis, we aim to rectify this deficiency by introducing platform independent, exible, and user centric authorization mechanism inSWoT. We derive requirements and design of abstract au
Style APA, Harvard, Vancouver, ISO itp.
10

Björkenvall, Anton. "Authorization Tool for Usersand Media Archives in WordPress : A Role Based Authorization Plugin." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-371460.

Pełny tekst źródła
Streszczenie:
Access control is the central element of computer security and its principal objectives are to implement secure authentication and authorization in a system. Authentication is the verification that the credentials of a user are valid and authorization is the granting of permissions to a user to access system resources. This thesis describes the design and implementation of an authorization plugin, calledFile Authorization Manager, for WordPress built upon an already existing authentication plugin, called privateContent. Due to various factors mentioned in the thesis the implementation of said
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Książki na temat "Authorizations"

1

Oregon. Dept. of State Lands., ed. Waterway authorizations: Does your use of a waterway require state authorization? Oregon Dept. of State Lands, 2007.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Administration, United States Congress Senate Committee on Rules and. Expenditure authorizations and requirements for Senate committees. U.S. G.P.O., 1986.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Senate, United States Congress. Expenditure authorizations and requirements for Senate committees. U.S. G.P.O., 1988.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Senate, United States Congress. Expenditure authorizations and requirements for Senate committees. U.S. G.P.O., 1988.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Senate, United States Congress. Expenditure authorizations and requirements for Senate committees. U.S. G.P.O., 1993.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Senate, United States Congress. Expenditure authorizations and requirements for Senate committees. U.S. G.P.O., 1994.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

United States. Congress. Senate. Committee on Rules and Administration. Expenditure authorizations and requirements for Senate committees. U.S. G.P.O., 1985.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Lehnert, Volker. Authorizations in SAP software: Design and configuration. Galileo Press, 2010.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

United States. Congress. Senate. Committee on Rules and Administration. Expenditure authorizations and requirements for Senate committees. U.S. G.P.O., 1986.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

United States. Congress. Senate. Expenditure authorizations and requirements for Senate committees. U.S. G.P.O., 1996.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Części książek na temat "Authorizations"

1

De Capitani di Vimercati, Sabrina. "Authorizations." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_810.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

De Capitani di Vimercati, Sabrina. "Authorizations." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_810-2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

De Capitani diVimercati, Sabrina. "Authorizations." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_810.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Jajodia, Sushil, Michiharu Kudo, and V. S. Subrahmanian. "Provisional Authorizations." In Advances in Information Security. Springer US, 2001. http://dx.doi.org/10.1007/978-1-4615-1467-1_8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Arthur, Will, David Challener, and Kenneth Goldman. "Authorizations and Sessions." In A Practical Guide to TPM 2.0. Apress, 2015. http://dx.doi.org/10.1007/978-1-4302-6584-9_13.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Atluri, Vijay, and Heechang Shin. "Geospatial Authorizations, Efficient Enforcement." In Encyclopedia of GIS. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-35973-1_503.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Atluri, Vijay, and Heechang Shin. "Geospatial Authorizations, Efficient Enforcement." In Encyclopedia of GIS. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-23519-6_503-2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Atluri, Vijay, and Heechang Shin. "Geospatial Authorizations, Efficient Enforcement." In Encyclopedia of GIS. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-17885-1_503.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Wang, Hua, and Jinli Cao. "Delegating Revocations and Authorizations." In Business Process Management Workshops. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-78238-4_29.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Grilli, Barbara A., and Theresa G. Webb. "Authorizations, Approvals, and Award." In Strategic Sourcing in the Public Sector. Routledge, 2023. http://dx.doi.org/10.4324/9781003267287-9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Authorizations"

1

Quintero, Vladimir, Cesar Chevel, and Paul Sanmartin-Mendoza. "Health Services Authorizations: Methodology Proposal." In 2024 IEEE Technology and Engineering Management Society (TEMSCON LATAM). IEEE, 2024. http://dx.doi.org/10.1109/temsconlatam61834.2024.10717813.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Cummings, Laura. ""Flagging Out" - The Rise of Non-National Satellite Spectrum Authorizations." In IISL Colloquium on the Law of Outer Space, Held at the 75th International Astronautical Congress (IAC 2024). International Astronautical Federation (IAF), 2024. https://doi.org/10.52202/078384-0005.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Chakarov, Aleks, Jaco Geldenhuys, Matthew Heck, et al. "Formally Verified Cloud-Scale Authorization." In 2025 IEEE/ACM 47th International Conference on Software Engineering (ICSE). IEEE, 2025. https://doi.org/10.1109/icse55347.2025.00166.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Suntaxi, Gabriela, Aboubakr Achraf El Ghazi, and Klemens Böhm. "Mutual Authorizations." In SACMAT '19: The 24th ACM Symposium on Access Control Models and Technologies. ACM, 2019. http://dx.doi.org/10.1145/3322431.3325415.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

A. Maciaszek, Leszek, and Mieczyslaw L. Owoc. "Designing Application Authorizations." In 2001 Informing Science Conference. Informing Science Institute, 2001. http://dx.doi.org/10.28945/2409.

Pełny tekst źródła
Streszczenie:
Information systems must be protected from unauthorized access. Authorization has been studied extensively as the main form ofpreserving the security of databases. Every database management system provides a sophisticated set of options aimed at protecting the database from unauthorized access. An important practical problem is how to take advantage of the database security options to ensure that a user is permitted to access the database through the application program but may not be allowed to access the database directly via database query tools. A related issue is how to extend the user pr
Style APA, Harvard, Vancouver, ISO itp.
6

Basin, David, Samuel J. Burri, and Günter Karjoth. "Optimal workflow-aware authorizations." In the 17th ACM symposium. ACM Press, 2012. http://dx.doi.org/10.1145/2295136.2295154.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Beznosov, Konstantin (Kosta). "Flooding and recycling authorizations." In the 2005 workshop. ACM Press, 2005. http://dx.doi.org/10.1145/1146269.1146285.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

"Semantic Interoperability of Authorizations." In 2nd International Workshop on Security In Information Systems. SciTePress - Science and and Technology Publications, 2004. http://dx.doi.org/10.5220/0002682402690278.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Zhang, Mingsheng, Wu Chen, Yisong Wang, and Mingyi Zhang. "Flexible Authorizations with Logic Program." In 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC). IEEE, 2009. http://dx.doi.org/10.1109/nswctc.2009.9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Bertino, Elisa, Pierangela Samarati, and Sushil Jajodia. "Authorizations in relational database management systems." In the 1st ACM conference. ACM Press, 1993. http://dx.doi.org/10.1145/168588.168605.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Authorizations"

1

Lepinski, M., S. Kent, and D. Kong. A Profile for Route Origin Authorizations (ROAs). RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6482.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Snijders, J., B. Maddison, M. Lepinski, D. Kong, and S. Kent. A Profile for Route Origin Authorizations (ROAs). RFC Editor, 2024. http://dx.doi.org/10.17487/rfc9582.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Yan, Z., R. Bush, G. Geng, T. de Kock, and J. Yao. Avoiding Route Origin Authorizations (ROAs) Containing Multiple IP Prefixes. RFC Editor, 2023. http://dx.doi.org/10.17487/rfc9455.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Schilling, Duane T. Assessment of CINC Authorizations to CINC Requirements (ACAR) (Follow-On). Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada411947.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Huston, G., and G. Michaelson. Validation of Route Origination Using the Resource Certificate Public Key Infrastructure (PKI) and Route Origin Authorizations (ROAs). RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6483.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

DAUTEL, W. A. FFTF Authorization Agreement. Office of Scientific and Technical Information (OSTI), 2000. http://dx.doi.org/10.2172/804751.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Vollbrecht, J., P. Calhoun, S. Farrell, et al. AAA Authorization Framework. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2904.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Farrell, S., J. Vollbrecht, P. Calhoun, et al. AAA Authorization Requirements. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2906.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Rosenberg, J. Presence Authorization Rules. RFC Editor, 2007. http://dx.doi.org/10.17487/rfc5025.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

DAUTEL, W. A. FFTF Authorization Agreement. Office of Scientific and Technical Information (OSTI), 2000. http://dx.doi.org/10.2172/801319.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!