Authorization

View this topic in
Authorization (also spelt Authorisation) is the function of specifying access rights to resources, which is related to information security and computer security in general and to access control in particular. (Wikipedia.org)






Conferences related to Authorization

Back to Top

2013 15th International Conference on Advanced Communication Technology (ICACT)

Technology, standard, service, architecture, strategy, and policy in newly emerging systems and a variety of applications in the area of communications. ICACT2013 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communications technologies.


2013 9th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)

Over the last two decades, many organizations and individuals have relied on electronic collaboration between distributed teams of humans, computer applications, and/or autonomous robots to achieve higher productivity and produce joint products that would have been impossible to develop without the contributions of multiple collaborators. Technology has evolved from standalone tools, to open systems supporting collaboration in multi-organizational settings, and from general purpose tools to specialized collaboration grids. Future collaboration solutions that fully realize the promises of electronic collaboration require advancements in networking, technology and systems, user interfaces and interaction paradigms, and interoperation with application-specific components and tools. The Ninth International Conference on Collaborative Computing (CollaborateCom 2012) will continue to serve as a premier international forum.

  • 2012 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)

    Over the last two decades, many organizations and individuals have relied on electronic collaboration between distributed teams of humans, computer applications, and/or autonomous robots to achieve higher productivity and produce joint products that would have been impossible to develop without the contributions of multiple collaborators. Technology has evolved from standalone tools, to open systems supporting collaboration in multi-organizational settings, and from general purpose tools to specialized collaboration grids. Future collaboration solutions that fully realize the promises of electronic collaboration require advancements in networking, technology and systems, user interfaces and interaction paradigms, and interoperation with application-specific components and tools. The Eight International Conference on Collaborative Computing (CollaborateCom 2011) will continue to serve as a premier international forum for discussion among academic and industrial researchers and practitioners.

  • 2011 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)

    Over the last two decades, many organizations and individuals have relied on electronic collaboration between distributed teams of humans, computer applications, and/or autonomous robots to achieve higher productivity and produce joint products that would have been impossible to develop without the contributions of multiple collaborators. Technology has evolved from standalone tools, to open systems supporting collaboration in multi-organizational settings, and from general purpose tools to specialized collaboration grids. Future collaboration solutions that fully realize the promises of electronic collaboration require advancements in networking, technology and systems, user interfaces and interaction paradigms, and interoperation with application-specific components and tools.

  • 2010 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)

    Focus on all aspect related to collaborative systems, networks and technologies.

  • 2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)

    - Architectures, protocols, and enabling technologies for collaborative computing networks and systems - Autonomic computing and quality of services in collaborative networks, systems, and applications - Collaboration in pervasive computing applications - Collaborative e-education, e-learning, and collaborative computing in large scale digital libraries - Collaborative mobile networks and infrastructures - Collaborative technologies for fast creation and deployment of new mobile services - Collaborati


2013 IEEE International Conference on Data Engineering (ICDE 2013)

The annual IEEE International Conference on Data Engineering (ICDE) addresses research issues in designing, building, managing, and evaluating advanced data-intensive systems and applications. It is a leading forum for researchers, practitioners, developers, and users to explore cutting-edge ideas and to exchange techniques, tools, and experiences.


2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS)

The CRiSIS conference is dedicated to security issues in Internet-related applications, networks and systems. Its goal is to offer an effective forum for computer and network security researchers from industry, academia and government to meet, exchange ideas and present advances on Internet-related security threats and vulnerabilities, and on the solutions that are needed to counter them. CRiSIS aims to establish and maintain its presence in the security conference calendar as a quality venue with focus on internet-related risks.

  • 2011 6th International Conference on Risks and Security of Internet and Systems (CRiSIS)

    The CRiSIS conference addresses security issues in Internet-related applications, networks and systems. Main topics include risk analysis, attacks to networks and system survivability, security models, security mechanisms and privacy enhancing technologies, and web security. CRiSIS welcomes theoretical and practical research results from domains including banking, e-government, e-health and critical infrastructures.

  • 2010 5th International Conference on Risks and Security of Internet and Systems (CRISIS)

    The International Conference on Risks and Security of Internet and Systems 2010 will be the 5th in a series dedicated to security issues in Internet-related applications, networks and systems. In recent years, the Internet has become essential for the exchange of information between user groups and organizations from different backgrounds and with different needs and objectives. These users are exposed to increasing risks regarding security and privacy, due to the development of more and more sophisticated

  • 2009 Fourth International Conference on Risks and Security of Internet and Systems (CRiSIS 2009)

    CRiSIS'09 will be the 4th in a series dedicated to security issues in Internet-related applications, networks and systems. The topics addressed by CRiSIS range from the analysis of risks, attacks to networks and system survivability, passing through security models, security mechanisms and privacy enhancing technologies.


2011 11th International Conference on Hybrid Intelligent Systems (HIS 2011)

The objectives of HIS 2011 are: to increase the awareness of the research community of the broad spectrum of hybrid techniques, to bring together AI researchers from around the world to present their cutting-edge results, to discuss the current trends in HIS research, to develop a collective vision of future opportunities, to establish international collaborative opportunities, and as a result to advance the state of the art of the field.

  • 2010 10th International Conference on Hybrid Intelligent Systems (HIS 2010)

    Hybridization of intelligent systems is a promising research field of computational intelligence focusing on synergistic combinations of multiple approaches to develop the next generation of intelligent systems. A fundamental stimulus to the investigations of Hybrid Intelligent Systems (HIS) is the awareness that combined approaches will be necessary if the remaining tough problems in Artificial Intelligence are to be solved. Join the feast of Hybrid Computational Intelligence researchers! Neural c

  • 2009 9th International Conference on Hybrid Intelligent Systems (HIS 2009)

    Hybridization of intelligent systems is a promising research field of computational intelligence focusing on synergistic combinations of multiple approaches to develop the next generation of intelligent systems. The objectives of HIS 2009 are to bring world-wide AI researchers together to present their cutting-edge results, to develop a collective vision of future opportunities, to establish international collaborative opportunities, and as a result to advance the state of the art in AI fields.


More Conferences

Periodicals related to Authorization

Back to Top

Dependable and Secure Computing, IEEE Transactions on

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance. These areas include but are not limited to: System Design: architecture for secure and fault-tolerant systems; trusted/survivable computing; intrusion and error tolerance, detection and recovery; fault- and intrusion-tolerant middleware; firewall and network technologies; system management ...


Parallel and Distributed Systems, IEEE Transactions on

IEEE Transactions on Parallel and Distributed Systems (TPDS) is published monthly. Topic areas include, but are not limited to the following: a) architectures: design, analysis, and implementation of multiple-processor systems (including multi-processors, multicomputers, and networks); impact of VLSI on system design; interprocessor communications; b) software: parallel languages and compilers; scheduling and task partitioning; databases, operating systems, and programming environments for ...




Xplore Articles related to Authorization

Back to Top

An Access Control Architecture for Context-Risk-Aware Access Control: Architectural Design and Performance Evaluation

Ali Ahmed; Ning Zhang 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies, 2010

Risk assessment plays a significant role in Decision Support Systems (DSS). Recently, there have been efforts to exploit the potential of linking risk assessment to security provisioning to provide risk-aware security services. One of these efforts is the Context-Risk-Aware Access Control (CRAAC) model that links requesters' access privileges to the risk level in the underlying access environment in the context ...


Evaluation of the use of computational intelligence techniques in medical claim processes of a health insurance company

Flávio Araújo; Lailson Moraes; André Santana; Pedro Santos Neto; Paulo Adeodato; Érico Leão Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems, 2013

Brazil has one of the largest private healthcare markets in the world. However, it appears that many indicators of our health insurance companies (including consultations, tests, hospitalizations, etc.) are well above the established international standards. This indicates that many appointments and tests are being carried out without need, generating unnecessary costs on businesses and making the service offered more expensive. ...


CABA: Continuous Authentication Based on BioAura

Arsalan Mosenia; SUSMITA SUR-KOLAY; Anand Raghunathan; Niraj K. Jha IEEE Transactions on Computers, 2016

Most computer systems authenticate users only once at the time of initial login, which can lead to security concerns. Continuous authentication has been explored as an approach for alleviating such concerns. Previous methods for continuous authentication primarily use biometrics, e.g., fingerprint and face recognition, or behaviometrics, e.g., key stroke patterns. We describe CABA, a novel continuous authentication system that is ...


An OAuth based authentication mechanism for IoT networks

Shamini Emerson; Young-Kyu Choi; Dong-Yeop Hwang; Kang-Seok Kim; Ki-Hyung Kim 2015 International Conference on Information and Communication Technology Convergence (ICTC), 2015

Internet of things (IoT) has rapidly become one of the most familiar and perhaps most discussed topic on the research field. The attention for the Internet of Things is mainly due to the new connected products intended to bring greater efficiencies and simplicity to life. Variety of IoT applications lead to equally wide variety of security issues. In this paper, ...


Authenticated access for IPv6 supported mobility

P. Engelstad; T. Haslestad; F. Paint Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003, 2003

Hierarchical mobile IPv6 (HMIPv6) is a protocol that enhances mobile IPv6 (MIPv6) with faster handovers. Neither HMIPv6 nor MIPv6 provides ways to authenticate roaming mobile nodes, although visited networks will need to check if mobile nodes can be authorized access. A solution is required before MIPv6 can be commonly deployed. Mechanisms to integrate mobile IPv4 and the diameter protocol for ...


More Xplore Articles

Educational Resources on Authorization

Back to Top

eLearning

An Access Control Architecture for Context-Risk-Aware Access Control: Architectural Design and Performance Evaluation

Ali Ahmed; Ning Zhang 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies, 2010

Risk assessment plays a significant role in Decision Support Systems (DSS). Recently, there have been efforts to exploit the potential of linking risk assessment to security provisioning to provide risk-aware security services. One of these efforts is the Context-Risk-Aware Access Control (CRAAC) model that links requesters' access privileges to the risk level in the underlying access environment in the context ...


Evaluation of the use of computational intelligence techniques in medical claim processes of a health insurance company

Flávio Araújo; Lailson Moraes; André Santana; Pedro Santos Neto; Paulo Adeodato; Érico Leão Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems, 2013

Brazil has one of the largest private healthcare markets in the world. However, it appears that many indicators of our health insurance companies (including consultations, tests, hospitalizations, etc.) are well above the established international standards. This indicates that many appointments and tests are being carried out without need, generating unnecessary costs on businesses and making the service offered more expensive. ...


CABA: Continuous Authentication Based on BioAura

Arsalan Mosenia; SUSMITA SUR-KOLAY; Anand Raghunathan; Niraj K. Jha IEEE Transactions on Computers, 2016

Most computer systems authenticate users only once at the time of initial login, which can lead to security concerns. Continuous authentication has been explored as an approach for alleviating such concerns. Previous methods for continuous authentication primarily use biometrics, e.g., fingerprint and face recognition, or behaviometrics, e.g., key stroke patterns. We describe CABA, a novel continuous authentication system that is ...


An OAuth based authentication mechanism for IoT networks

Shamini Emerson; Young-Kyu Choi; Dong-Yeop Hwang; Kang-Seok Kim; Ki-Hyung Kim 2015 International Conference on Information and Communication Technology Convergence (ICTC), 2015

Internet of things (IoT) has rapidly become one of the most familiar and perhaps most discussed topic on the research field. The attention for the Internet of Things is mainly due to the new connected products intended to bring greater efficiencies and simplicity to life. Variety of IoT applications lead to equally wide variety of security issues. In this paper, ...


Authenticated access for IPv6 supported mobility

P. Engelstad; T. Haslestad; F. Paint Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003, 2003

Hierarchical mobile IPv6 (HMIPv6) is a protocol that enhances mobile IPv6 (MIPv6) with faster handovers. Neither HMIPv6 nor MIPv6 provides ways to authenticate roaming mobile nodes, although visited networks will need to check if mobile nodes can be authorized access. A solution is required before MIPv6 can be commonly deployed. Mechanisms to integrate mobile IPv4 and the diameter protocol for ...


More eLearning Resources

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Authorization"

IEEE-USA E-Books

  • The End of the Beginning

    Much of the business transacted on the Web today takes place through information exchanges made possible by using documents as interfaces. For example, what seems to be a simple purchase from an online bookstore actually involves at least three different business collaborations -- between the customer and the online catalog to select a book; between the bookstore and a credit card authorization service to verify and charge the customer's account; and between the bookstore and the delivery service with instructions for picking up and delivering the book to the customer. Document engineering is needed to analyze, design, and implement these Internet information exchanges. This book is an introduction to the emerging field of document engineering.The authors, both leaders in the development of document engineering and other e-commerce initiatives, analyze document exchanges from a variety of perspectives. Taking a qualitative view, they look at patterns of document exchanges as components of business models; looking at documents in more detail, they describe techniques for analyzing individual transaction patterns and the role they play in the overall business process. They describe techniques for analyzing, designing, and encoding document models, including XML, and discuss the techniques and architectures that make XML a unifying technology for the next generation of e-business applications. Finally, they go beyond document models to consider management and strategic issues -- the business model, or the vision, that the information exchanged in these documents serves.

  • Notes

    Much of the business transacted on the Web today takes place through information exchanges made possible by using documents as interfaces. For example, what seems to be a simple purchase from an online bookstore actually involves at least three different business collaborations -- between the customer and the online catalog to select a book; between the bookstore and a credit card authorization service to verify and charge the customer's account; and between the bookstore and the delivery service with instructions for picking up and delivering the book to the customer. Document engineering is needed to analyze, design, and implement these Internet information exchanges. This book is an introduction to the emerging field of document engineering.The authors, both leaders in the development of document engineering and other e-commerce initiatives, analyze document exchanges from a variety of perspectives. Taking a qualitative view, they look at patterns of document exchanges as components of business models; looking at documents in more detail, they describe techniques for analyzing individual transaction patterns and the role they play in the overall business process. They describe techniques for analyzing, designing, and encoding document models, including XML, and discuss the techniques and architectures that make XML a unifying technology for the next generation of e-business applications. Finally, they go beyond document models to consider management and strategic issues -- the business model, or the vision, that the information exchanged in these documents serves.

  • Glossary

    Much of the business transacted on the Web today takes place through information exchanges made possible by using documents as interfaces. For example, what seems to be a simple purchase from an online bookstore actually involves at least three different business collaborations -- between the customer and the online catalog to select a book; between the bookstore and a credit card authorization service to verify and charge the customer's account; and between the bookstore and the delivery service with instructions for picking up and delivering the book to the customer. Document engineering is needed to analyze, design, and implement these Internet information exchanges. This book is an introduction to the emerging field of document engineering.The authors, both leaders in the development of document engineering and other e-commerce initiatives, analyze document exchanges from a variety of perspectives. Taking a qualitative view, they look at patterns of document exchanges as components of business models; looking at documents in more detail, they describe techniques for analyzing individual transaction patterns and the role they play in the overall business process. They describe techniques for analyzing, designing, and encoding document models, including XML, and discuss the techniques and architectures that make XML a unifying technology for the next generation of e-business applications. Finally, they go beyond document models to consider management and strategic issues -- the business model, or the vision, that the information exchanged in these documents serves.

  • OAuth Standard for User Authorization of Cloud Services

    The IETF OAuth specification is an open Web standard that enables secure authorization for applications running on various kinds of platforms. Using OAuth, third-party client applications may access protected resources on the cloud or elsewhere without the resource owner being required to supply user credentials such as an identity and password. In order to achieve authorization, OAuth specifies the use of a token that enables validated access to a resource. OAuth can effectively be combined with an identity- management system such as OpenID to concurrently provide both authorization and authentication functions. The original version 1.0 of the OAuth protocol relied upon the exchange of client-side signatures, while the new version 2.0 relies upon a bearer token scheme. The new protocol is designed to be simpler to implement and supports new application contexts, but introduces its own new challenges.

  • A Secure Update Mechanism for Internet of Things Devices

    This chapter proposes a mechanism for securely updating IoT devices across networks and devices of any form factor or function. While not an exhaustive list, several of the problems are administering devices, proper authentication and authorization, securing communications, and firmware security. The chapter addresses updating IoT devices which is an essential part of IoT security. It defines an update as either updating both the operating system and application or just either the application or operating system running on an IoT device. The chapter addresses performing updates to IoT devices in a manner that is secure, and is also based on security standards that the IoT device will need to implement to carry out its functions. The goal of this secure update mechanism is to make recommendations that would cause minimal increases in processing and memory requirements so that it could be used by IoT devices running on constrained platforms and on constrained networks.

  • Index

    Much of the business transacted on the Web today takes place through information exchanges made possible by using documents as interfaces. For example, what seems to be a simple purchase from an online bookstore actually involves at least three different business collaborations -- between the customer and the online catalog to select a book; between the bookstore and a credit card authorization service to verify and charge the customer's account; and between the bookstore and the delivery service with instructions for picking up and delivering the book to the customer. Document engineering is needed to analyze, design, and implement these Internet information exchanges. This book is an introduction to the emerging field of document engineering.The authors, both leaders in the development of document engineering and other e-commerce initiatives, analyze document exchanges from a variety of perspectives. Taking a qualitative view, they look at patterns of document exchanges as components of business models; looking at documents in more detail, they describe techniques for analyzing individual transaction patterns and the role they play in the overall business process. They describe techniques for analyzing, designing, and encoding document models, including XML, and discuss the techniques and architectures that make XML a unifying technology for the next generation of e-business applications. Finally, they go beyond document models to consider management and strategic issues -- the business model, or the vision, that the information exchanged in these documents serves.

  • SECURITY SYSTEMS DESIGN??-??DESIGNING NETWORK SECURITY

    This chapter first examines protocol layers 1,2, and 3 of the available security mechanisms and explores their deployment possibilities within networking protocols. Network Physical layer media types include: metallic or fiber-optic cables/wires used for interconnecting network elements; radio frequency signals transmitted through air used for wireless communications; or visible, or invisible, laser light signals transmitted through air or water. Within the Data Link layer, the encountered security devices are IEEE 802.1x, IEEE 802. 1ae and IEEE 802.11 WPA and 802.11i. The chapter then considers the security capabilities, uses, and deficiencies for each of these technologies. Next, it covers the advantages and limitations of providing security at the Network layer, via the IP security (IPsec) framework of protocols, for secure channel establishment. Finally, the filtering and inspection of packets are discussed as forms of network and host access control (authorization).

  • Security Systems Design - Designing Network Security

    This chapter contains sections titled: Introduction Security Design for Protocol Layer 1 Layer 2 - Data Link Security Mechanisms Security Design for Protocol Layer 3 IP Packet Authorization and Access Control Chapter Summary Further Reading and Resources Questions Exercises

  • Distributed Access Control in Cloud Computing Systems

    With the tremendous increase in the number of distributed applications, the issue of distributed access control has become an important research topic for both academia and industry. In distributed computing environments like cloud computing or service computing, authentication and authorization are the two important functions to be performed, to make sure that unauthorized users do not access distributed system components. An effective access control mechanism is an essential security component as far as protecting the confidentiality, integrity, and availability (CIA) of information hosted in the cloud is concerned. An effective access control mechanism implemented in the cloud domain should be scalable, reliable, and robust and it should provide required features and procedures for identity provisioning, deprovisioning, authentication, authorization, accounting, and auditing. In this chapter, we discuss the issue of distributed access control, major features and functionalities, access control policies and models, distributed access control architecture for multicloud environments, trust, and identity management in cloud computing environments. Related work shows some of the major research activities in the area of distributed access control considering the advantages and disadvantages of the approaches that have been adopted. We conclude this chapter by discussing a few research issues in the area of distributed access control in the cloud environment.

  • IPv6 Deployment Drivers

    Supporting an ongoing worldwide web presence is a key consideration for IPv6 deployment. In addition to IPv4/IPv6 Internet ubiquity, a class of emerging applications that leverage IPv6 features promises to revolutionize daily life. Deploying IPv6 requires analysis of your current IPv4 network, scoping IPv6 deployment, identifying upgrades or modifications to network equipment, applications or end user devices, and managing the project to completion. This chapter talks about the basic authorization process, which requires a basic definition of the goals, scope, plan, costs, and benefits of IPv6 deployment.



Standards related to Authorization

Back to Top

No standards are currently tagged "Authorization"