Literatura científica selecionada sobre o tema "Authorizations"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Authorizations".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Authorizations"
van der Zee, Ivar T., Rick A. Vreman, Lawrence Liberti, and Mario Alanis Garza. "Regulatory reliance pathways during health emergencies: enabling timely authorizations for COVID-19 vaccines in Latin America." Revista Panamericana de Salud Pública 46 (August 30, 2022): 1. http://dx.doi.org/10.26633/rpsp.2022.115.
Texto completo da fonteBai, Yun, and Vijay Varadharajan. "Object Oriented Database with Authorization Policies." Fundamenta Informaticae 53, no. 3-4 (2002): 229–50. https://doi.org/10.3233/fun-2002-533-402.
Texto completo da fonteSharma, Mallika, Annika Gustafson, Barbara Jagels, and Tracy Wong. "Collaboration with commercial payor to eliminate prior authorization." Journal of Clinical Oncology 37, no. 27_suppl (2019): 9. http://dx.doi.org/10.1200/jco.2019.37.27_suppl.9.
Texto completo da fonteMéndez Quincho, Leonor Carmen, Pedro Melitón Ramos Matías, and Oscar Felipe Arce Cruzado. "Diagnóstico del uso del agua y vertimientos de efluentes líquidos en el Perú (2013-2015)." Revista del Instituto de investigación de la Facultad de minas, metalurgia y ciencias geográficas 20, no. 39 (2017): 123–36. https://doi.org/10.15381/iigeo.v20i39.14175.
Texto completo da fonteMcLaughlin, Rob. "Authorizations for maritime law enforcement operations." International Review of the Red Cross 98, no. 902 (2016): 465–90. http://dx.doi.org/10.1017/s1816383117000340.
Texto completo da fonteBargeron, Leonce, Alice Bonaime, and Shawn Thomas. "The Timing and Source of Long-Run Returns Following Repurchases." Journal of Financial and Quantitative Analysis 52, no. 2 (2017): 491–517. http://dx.doi.org/10.1017/s0022109017000084.
Texto completo da fonteXu, Yang, Wuqiang Gao, Quanrun Zeng, Guojun Wang, Ju Ren, and Yaoxue Zhang. "A Feasible Fuzzy-Extended Attribute-Based Access Control Technique." Security and Communication Networks 2018 (June 5, 2018): 1–11. http://dx.doi.org/10.1155/2018/6476315.
Texto completo da fonteHofmann, Bjørn. "From consent to authorization." Etikk i praksis - Nordic Journal of Applied Ethics, no. 2 (December 27, 2024): 35–47. https://doi.org/10.5324/eip.v18i2.5965.
Texto completo da fonteVandenberghe, Karolien. "Dual-Use Regulation 2021/821: What’s Old & What’s New in EU Export Control." Global Trade and Customs Journal 16, Issue 9 (2021): 479–88. http://dx.doi.org/10.54648/gtcj2021053.
Texto completo da fonteBhardwaj, Aarti Sonia, Mark Liu, Sofya Pintova, et al. "Implementation of a streamlined prior authorization process to improve cancer care delivery." Journal of Clinical Oncology 41, no. 16_suppl (2023): 1531. http://dx.doi.org/10.1200/jco.2023.41.16_suppl.1531.
Texto completo da fonteTeses / dissertações sobre o assunto "Authorizations"
Lui, W. C., and 雷永祥. "Flexible authorizations in workflow management systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B42577135.
Texto completo da fonteLui, W. C. "Flexible authorizations in workflow management systems." Click to view the E-thesis via HKUTO, 2002. http://sunzi.lib.hku.hk/hkuto/record/B42577135.
Texto completo da fonteFirman, Fikri. "Outdoor Small Cell Deployment with Complementary Spectrum Authorizations, Licensed (LSA) and Unlicensed (LAA) : Techno-Economic Analysis." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-207140.
Texto completo da fonteRuan, Chun, University of Western Sydney, of Science Technology and Environment College, and School of Computing and Information Technology. "Models for authorization and conflict resolution." THESIS_CSTE_CIT_Ruan_C.xml, 2003. http://handle.uws.edu.au:8081/1959.7/546.
Texto completo da fontePachas, Pérez Diego. "Mining Exploration in Peru: A Brief Scope on the Main Authorizations for the Development of an Exploration Project in Peru." Derecho & Sociedad, 2015. http://repositorio.pucp.edu.pe/index/handle/123456789/118585.
Texto completo da fonteCrampton, Jason Alexis Valentine. "Authorization and antichains." Thesis, Birkbeck (University of London), 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.271717.
Texto completo da fonteHumenn, Polar. "The authorization calculus." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available, full text:, 2008. http://wwwlib.umi.com/cr/syr/main.
Texto completo da fonteKini, Pranab. "Towards improving the performance of enterprise authorization systems using speculative authorization." Thesis, University of British Columbia, 2010. http://hdl.handle.net/2429/29561.
Texto completo da fonteCabarkapa, Dragan. "Authorization Architecture for SWoT." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-134639.
Texto completo da fonteBjörkenvall, Anton. "Authorization Tool for Usersand Media Archives in WordPress : A Role Based Authorization Plugin." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-371460.
Texto completo da fonteLivros sobre o assunto "Authorizations"
Oregon. Dept. of State Lands., ed. Waterway authorizations: Does your use of a waterway require state authorization? Oregon Dept. of State Lands, 2007.
Encontre o texto completo da fonteAdministration, United States Congress Senate Committee on Rules and. Expenditure authorizations and requirements for Senate committees. U.S. G.P.O., 1986.
Encontre o texto completo da fonteSenate, United States Congress. Expenditure authorizations and requirements for Senate committees. U.S. G.P.O., 1988.
Encontre o texto completo da fonteSenate, United States Congress. Expenditure authorizations and requirements for Senate committees. U.S. G.P.O., 1988.
Encontre o texto completo da fonteSenate, United States Congress. Expenditure authorizations and requirements for Senate committees. U.S. G.P.O., 1993.
Encontre o texto completo da fonteSenate, United States Congress. Expenditure authorizations and requirements for Senate committees. U.S. G.P.O., 1994.
Encontre o texto completo da fonteUnited States. Congress. Senate. Committee on Rules and Administration. Expenditure authorizations and requirements for Senate committees. U.S. G.P.O., 1985.
Encontre o texto completo da fonteLehnert, Volker. Authorizations in SAP software: Design and configuration. Galileo Press, 2010.
Encontre o texto completo da fonteUnited States. Congress. Senate. Committee on Rules and Administration. Expenditure authorizations and requirements for Senate committees. U.S. G.P.O., 1986.
Encontre o texto completo da fonteUnited States. Congress. Senate. Expenditure authorizations and requirements for Senate committees. U.S. G.P.O., 1996.
Encontre o texto completo da fonteCapítulos de livros sobre o assunto "Authorizations"
De Capitani di Vimercati, Sabrina. "Authorizations." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_810.
Texto completo da fonteDe Capitani di Vimercati, Sabrina. "Authorizations." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_810-2.
Texto completo da fonteDe Capitani diVimercati, Sabrina. "Authorizations." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_810.
Texto completo da fonteJajodia, Sushil, Michiharu Kudo, and V. S. Subrahmanian. "Provisional Authorizations." In Advances in Information Security. Springer US, 2001. http://dx.doi.org/10.1007/978-1-4615-1467-1_8.
Texto completo da fonteArthur, Will, David Challener, and Kenneth Goldman. "Authorizations and Sessions." In A Practical Guide to TPM 2.0. Apress, 2015. http://dx.doi.org/10.1007/978-1-4302-6584-9_13.
Texto completo da fonteAtluri, Vijay, and Heechang Shin. "Geospatial Authorizations, Efficient Enforcement." In Encyclopedia of GIS. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-35973-1_503.
Texto completo da fonteAtluri, Vijay, and Heechang Shin. "Geospatial Authorizations, Efficient Enforcement." In Encyclopedia of GIS. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-23519-6_503-2.
Texto completo da fonteAtluri, Vijay, and Heechang Shin. "Geospatial Authorizations, Efficient Enforcement." In Encyclopedia of GIS. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-17885-1_503.
Texto completo da fonteWang, Hua, and Jinli Cao. "Delegating Revocations and Authorizations." In Business Process Management Workshops. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-78238-4_29.
Texto completo da fonteGrilli, Barbara A., and Theresa G. Webb. "Authorizations, Approvals, and Award." In Strategic Sourcing in the Public Sector. Routledge, 2023. http://dx.doi.org/10.4324/9781003267287-9.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Authorizations"
Quintero, Vladimir, Cesar Chevel, and Paul Sanmartin-Mendoza. "Health Services Authorizations: Methodology Proposal." In 2024 IEEE Technology and Engineering Management Society (TEMSCON LATAM). IEEE, 2024. http://dx.doi.org/10.1109/temsconlatam61834.2024.10717813.
Texto completo da fonteCummings, Laura. ""Flagging Out" - The Rise of Non-National Satellite Spectrum Authorizations." In IISL Colloquium on the Law of Outer Space, Held at the 75th International Astronautical Congress (IAC 2024). International Astronautical Federation (IAF), 2024. https://doi.org/10.52202/078384-0005.
Texto completo da fonteChakarov, Aleks, Jaco Geldenhuys, Matthew Heck, et al. "Formally Verified Cloud-Scale Authorization." In 2025 IEEE/ACM 47th International Conference on Software Engineering (ICSE). IEEE, 2025. https://doi.org/10.1109/icse55347.2025.00166.
Texto completo da fonteSuntaxi, Gabriela, Aboubakr Achraf El Ghazi, and Klemens Böhm. "Mutual Authorizations." In SACMAT '19: The 24th ACM Symposium on Access Control Models and Technologies. ACM, 2019. http://dx.doi.org/10.1145/3322431.3325415.
Texto completo da fonteA. Maciaszek, Leszek, and Mieczyslaw L. Owoc. "Designing Application Authorizations." In 2001 Informing Science Conference. Informing Science Institute, 2001. http://dx.doi.org/10.28945/2409.
Texto completo da fonteBasin, David, Samuel J. Burri, and Günter Karjoth. "Optimal workflow-aware authorizations." In the 17th ACM symposium. ACM Press, 2012. http://dx.doi.org/10.1145/2295136.2295154.
Texto completo da fonteBeznosov, Konstantin (Kosta). "Flooding and recycling authorizations." In the 2005 workshop. ACM Press, 2005. http://dx.doi.org/10.1145/1146269.1146285.
Texto completo da fonte"Semantic Interoperability of Authorizations." In 2nd International Workshop on Security In Information Systems. SciTePress - Science and and Technology Publications, 2004. http://dx.doi.org/10.5220/0002682402690278.
Texto completo da fonteZhang, Mingsheng, Wu Chen, Yisong Wang, and Mingyi Zhang. "Flexible Authorizations with Logic Program." In 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC). IEEE, 2009. http://dx.doi.org/10.1109/nswctc.2009.9.
Texto completo da fonteBertino, Elisa, Pierangela Samarati, and Sushil Jajodia. "Authorizations in relational database management systems." In the 1st ACM conference. ACM Press, 1993. http://dx.doi.org/10.1145/168588.168605.
Texto completo da fonteRelatórios de organizações sobre o assunto "Authorizations"
Lepinski, M., S. Kent, and D. Kong. A Profile for Route Origin Authorizations (ROAs). RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6482.
Texto completo da fonteSnijders, J., B. Maddison, M. Lepinski, D. Kong, and S. Kent. A Profile for Route Origin Authorizations (ROAs). RFC Editor, 2024. http://dx.doi.org/10.17487/rfc9582.
Texto completo da fonteYan, Z., R. Bush, G. Geng, T. de Kock, and J. Yao. Avoiding Route Origin Authorizations (ROAs) Containing Multiple IP Prefixes. RFC Editor, 2023. http://dx.doi.org/10.17487/rfc9455.
Texto completo da fonteSchilling, Duane T. Assessment of CINC Authorizations to CINC Requirements (ACAR) (Follow-On). Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada411947.
Texto completo da fonteHuston, G., and G. Michaelson. Validation of Route Origination Using the Resource Certificate Public Key Infrastructure (PKI) and Route Origin Authorizations (ROAs). RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6483.
Texto completo da fonteDAUTEL, W. A. FFTF Authorization Agreement. Office of Scientific and Technical Information (OSTI), 2000. http://dx.doi.org/10.2172/804751.
Texto completo da fonteVollbrecht, J., P. Calhoun, S. Farrell, et al. AAA Authorization Framework. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2904.
Texto completo da fonteFarrell, S., J. Vollbrecht, P. Calhoun, et al. AAA Authorization Requirements. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2906.
Texto completo da fonteRosenberg, J. Presence Authorization Rules. RFC Editor, 2007. http://dx.doi.org/10.17487/rfc5025.
Texto completo da fonteDAUTEL, W. A. FFTF Authorization Agreement. Office of Scientific and Technical Information (OSTI), 2000. http://dx.doi.org/10.2172/801319.
Texto completo da fonte