Authorization

View this topic in
Authorization (also spelt Authorisation) is the function of specifying access rights to resources, which is related to information security and computer security in general and to access control in particular. (Wikipedia.org)






Conferences related to Authorization

Back to Top

2013 15th International Conference on Advanced Communication Technology (ICACT)

Technology, standard, service, architecture, strategy, and policy in newly emerging systems and a variety of applications in the area of communications. ICACT2013 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communications technologies.


2013 9th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)

Over the last two decades, many organizations and individuals have relied on electronic collaboration between distributed teams of humans, computer applications, and/or autonomous robots to achieve higher productivity and produce joint products that would have been impossible to develop without the contributions of multiple collaborators. Technology has evolved from standalone tools, to open systems supporting collaboration in multi-organizational settings, and from general purpose tools to specialized collaboration grids. Future collaboration solutions that fully realize the promises of electronic collaboration require advancements in networking, technology and systems, user interfaces and interaction paradigms, and interoperation with application-specific components and tools. The Ninth International Conference on Collaborative Computing (CollaborateCom 2012) will continue to serve as a premier international forum.

  • 2012 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)

    Over the last two decades, many organizations and individuals have relied on electronic collaboration between distributed teams of humans, computer applications, and/or autonomous robots to achieve higher productivity and produce joint products that would have been impossible to develop without the contributions of multiple collaborators. Technology has evolved from standalone tools, to open systems supporting collaboration in multi-organizational settings, and from general purpose tools to specialized collaboration grids. Future collaboration solutions that fully realize the promises of electronic collaboration require advancements in networking, technology and systems, user interfaces and interaction paradigms, and interoperation with application-specific components and tools. The Eight International Conference on Collaborative Computing (CollaborateCom 2011) will continue to serve as a premier international forum for discussion among academic and industrial researchers and practitioners.

  • 2011 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)

    Over the last two decades, many organizations and individuals have relied on electronic collaboration between distributed teams of humans, computer applications, and/or autonomous robots to achieve higher productivity and produce joint products that would have been impossible to develop without the contributions of multiple collaborators. Technology has evolved from standalone tools, to open systems supporting collaboration in multi-organizational settings, and from general purpose tools to specialized collaboration grids. Future collaboration solutions that fully realize the promises of electronic collaboration require advancements in networking, technology and systems, user interfaces and interaction paradigms, and interoperation with application-specific components and tools.

  • 2010 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)

    Focus on all aspect related to collaborative systems, networks and technologies.

  • 2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)

    - Architectures, protocols, and enabling technologies for collaborative computing networks and systems - Autonomic computing and quality of services in collaborative networks, systems, and applications - Collaboration in pervasive computing applications - Collaborative e-education, e-learning, and collaborative computing in large scale digital libraries - Collaborative mobile networks and infrastructures - Collaborative technologies for fast creation and deployment of new mobile services - Collaborati


2013 IEEE International Conference on Data Engineering (ICDE 2013)

The annual IEEE International Conference on Data Engineering (ICDE) addresses research issues in designing, building, managing, and evaluating advanced data-intensive systems and applications. It is a leading forum for researchers, practitioners, developers, and users to explore cutting-edge ideas and to exchange techniques, tools, and experiences.


2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS)

The CRiSIS conference is dedicated to security issues in Internet-related applications, networks and systems. Its goal is to offer an effective forum for computer and network security researchers from industry, academia and government to meet, exchange ideas and present advances on Internet-related security threats and vulnerabilities, and on the solutions that are needed to counter them. CRiSIS aims to establish and maintain its presence in the security conference calendar as a quality venue with focus on internet-related risks.

  • 2011 6th International Conference on Risks and Security of Internet and Systems (CRiSIS)

    The CRiSIS conference addresses security issues in Internet-related applications, networks and systems. Main topics include risk analysis, attacks to networks and system survivability, security models, security mechanisms and privacy enhancing technologies, and web security. CRiSIS welcomes theoretical and practical research results from domains including banking, e-government, e-health and critical infrastructures.

  • 2010 5th International Conference on Risks and Security of Internet and Systems (CRISIS)

    The International Conference on Risks and Security of Internet and Systems 2010 will be the 5th in a series dedicated to security issues in Internet-related applications, networks and systems. In recent years, the Internet has become essential for the exchange of information between user groups and organizations from different backgrounds and with different needs and objectives. These users are exposed to increasing risks regarding security and privacy, due to the development of more and more sophisticated

  • 2009 Fourth International Conference on Risks and Security of Internet and Systems (CRiSIS 2009)

    CRiSIS'09 will be the 4th in a series dedicated to security issues in Internet-related applications, networks and systems. The topics addressed by CRiSIS range from the analysis of risks, attacks to networks and system survivability, passing through security models, security mechanisms and privacy enhancing technologies.


2011 11th International Conference on Hybrid Intelligent Systems (HIS 2011)

The objectives of HIS 2011 are: to increase the awareness of the research community of the broad spectrum of hybrid techniques, to bring together AI researchers from around the world to present their cutting-edge results, to discuss the current trends in HIS research, to develop a collective vision of future opportunities, to establish international collaborative opportunities, and as a result to advance the state of the art of the field.

  • 2010 10th International Conference on Hybrid Intelligent Systems (HIS 2010)

    Hybridization of intelligent systems is a promising research field of computational intelligence focusing on synergistic combinations of multiple approaches to develop the next generation of intelligent systems. A fundamental stimulus to the investigations of Hybrid Intelligent Systems (HIS) is the awareness that combined approaches will be necessary if the remaining tough problems in Artificial Intelligence are to be solved. Join the feast of Hybrid Computational Intelligence researchers! Neural c

  • 2009 9th International Conference on Hybrid Intelligent Systems (HIS 2009)

    Hybridization of intelligent systems is a promising research field of computational intelligence focusing on synergistic combinations of multiple approaches to develop the next generation of intelligent systems. The objectives of HIS 2009 are to bring world-wide AI researchers together to present their cutting-edge results, to develop a collective vision of future opportunities, to establish international collaborative opportunities, and as a result to advance the state of the art in AI fields.


More Conferences

Periodicals related to Authorization

Back to Top

Dependable and Secure Computing, IEEE Transactions on

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance. These areas include but are not limited to: System Design: architecture for secure and fault-tolerant systems; trusted/survivable computing; intrusion and error tolerance, detection and recovery; fault- and intrusion-tolerant middleware; firewall and network technologies; system management ...


Parallel and Distributed Systems, IEEE Transactions on

IEEE Transactions on Parallel and Distributed Systems (TPDS) is published monthly. Topic areas include, but are not limited to the following: a) architectures: design, analysis, and implementation of multiple-processor systems (including multi-processors, multicomputers, and networks); impact of VLSI on system design; interprocessor communications; b) software: parallel languages and compilers; scheduling and task partitioning; databases, operating systems, and programming environments for ...




Xplore Articles related to Authorization

Back to Top

Network Distribution of Remote Sensing Images Based on Multi-rank Security

Jin Liu; Zhengquan Xu; Jing Sun; Xiaojun Liu; Zhe Wu 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, 2009

With the development of remote sensing technology and network, a wide range of space information civilian use make remote sensing images security more and more attention. On the basis of the characteristics of large amount of remote sensing data but real-time transmission or access, a scheme of authorizing the use of remote sensing images based on multi-rank security through Internet ...


A Model Checking Method to Verify BPEL4People Processes

Fenye Bao; Li Zhang 2008 IEEE Symposium on Advanced Management of Information for Globalized Enterprises (AMIGE), 2008

WS-BPEL extension for people (BPEL4People) introduces human activity to Web Services Business Process Execution Language (WS-BPEL/BPEL). It's crucial to ensure the correctness and consistency of business process with constraints. Some works have been done on the verification of BPEL processes, but there are fewer works on the verification of BPEL4People processes. In this paper, we propose a model checking method ...


SAML Based Unified Access Control Model for Inter-platform Educational Resources

Chaowang Shang; Zongkai Yang; Qingtang Liu; Chengling Zhao 2008 International Conference on Computer Science and Software Engineering, 2008

The construction and effective application of net based educational resources are of great importance for e-learning. SOA (service oriented architecture) enables the reuse and share of net based educational resources by publishing the resources as web services. However, frequent identity authentications in resources access among different providers take up overfull system resources and lower the implementation efficiency. We propose a ...


An identity authentication system based on mobile phone token

Peng Kunyu; Zheng Jiande; Yang Jing 2009 IEEE International Conference on Network Infrastructure and Digital Content, 2009

Authentication is a mechanism to establish proof of identities. Traditional password authentication could not provide enough security for the information system when it faces the most modern means of attack. The problem could be solved by taking token authentication, but as a new authentication system, it is difficult connecting with existed authentication systems, especially in the authorized access control system. ...


Trust Management Framework for Efficient Service Provisioning in Dynamic Distributed Computing Environments

Malamati Louta; Angelos Michalas 2008 Third International Conference on Internet and Web Applications and Services, 2008

In dynamic distributed computing environments, system entities may be classified into two main categories that are, in principle, in conflict. These are the Service Resource Requestors (SRRs) wishing to use services and/or exploit resources offered by the other system entities and the Service Resource Providers (SRPs) that offer the services/resources requested. Seeking for the maximisation of their welfare, while achieving ...


More Xplore Articles

Educational Resources on Authorization

Back to Top

eLearning

Network Distribution of Remote Sensing Images Based on Multi-rank Security

Jin Liu; Zhengquan Xu; Jing Sun; Xiaojun Liu; Zhe Wu 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, 2009

With the development of remote sensing technology and network, a wide range of space information civilian use make remote sensing images security more and more attention. On the basis of the characteristics of large amount of remote sensing data but real-time transmission or access, a scheme of authorizing the use of remote sensing images based on multi-rank security through Internet ...


A Model Checking Method to Verify BPEL4People Processes

Fenye Bao; Li Zhang 2008 IEEE Symposium on Advanced Management of Information for Globalized Enterprises (AMIGE), 2008

WS-BPEL extension for people (BPEL4People) introduces human activity to Web Services Business Process Execution Language (WS-BPEL/BPEL). It's crucial to ensure the correctness and consistency of business process with constraints. Some works have been done on the verification of BPEL processes, but there are fewer works on the verification of BPEL4People processes. In this paper, we propose a model checking method ...


SAML Based Unified Access Control Model for Inter-platform Educational Resources

Chaowang Shang; Zongkai Yang; Qingtang Liu; Chengling Zhao 2008 International Conference on Computer Science and Software Engineering, 2008

The construction and effective application of net based educational resources are of great importance for e-learning. SOA (service oriented architecture) enables the reuse and share of net based educational resources by publishing the resources as web services. However, frequent identity authentications in resources access among different providers take up overfull system resources and lower the implementation efficiency. We propose a ...


An identity authentication system based on mobile phone token

Peng Kunyu; Zheng Jiande; Yang Jing 2009 IEEE International Conference on Network Infrastructure and Digital Content, 2009

Authentication is a mechanism to establish proof of identities. Traditional password authentication could not provide enough security for the information system when it faces the most modern means of attack. The problem could be solved by taking token authentication, but as a new authentication system, it is difficult connecting with existed authentication systems, especially in the authorized access control system. ...


Trust Management Framework for Efficient Service Provisioning in Dynamic Distributed Computing Environments

Malamati Louta; Angelos Michalas 2008 Third International Conference on Internet and Web Applications and Services, 2008

In dynamic distributed computing environments, system entities may be classified into two main categories that are, in principle, in conflict. These are the Service Resource Requestors (SRRs) wishing to use services and/or exploit resources offered by the other system entities and the Service Resource Providers (SRPs) that offer the services/resources requested. Seeking for the maximisation of their welfare, while achieving ...


More eLearning Resources

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Authorization"

IEEE-USA E-Books

  • Foundations

    Much of the business transacted on the Web today takes place through information exchanges made possible by using documents as interfaces. For example, what seems to be a simple purchase from an online bookstore actually involves at least three different business collaborations -- between the customer and the online catalog to select a book; between the bookstore and a credit card authorization service to verify and charge the customer's account; and between the bookstore and the delivery service with instructions for picking up and delivering the book to the customer. Document engineering is needed to analyze, design, and implement these Internet information exchanges. This book is an introduction to the emerging field of document engineering.The authors, both leaders in the development of document engineering and other e-commerce initiatives, analyze document exchanges from a variety of perspectives. Taking a qualitative view, they look at patterns of document exchanges as components of business models; looking at documents in more detail, they describe techniques for analyzing individual transaction patterns and the role they play in the overall business process. They describe techniques for analyzing, designing, and encoding document models, including XML, and discuss the techniques and architectures that make XML a unifying technology for the next generation of e-business applications. Finally, they go beyond document models to consider management and strategic issues -- the business model, or the vision, that the information exchanged in these documents serves.

  • GENERAL COMPUTER SECURITY ARCHITECTURE

    This chapter considers security capabilities within computing and communications devices. It considers the software that resides next to the hardware and controls the use of system resources by applications. The networking subsystem supported by the element software is responsible for the confidentiality and integrity of information transferred among elements, for the authentication of elements to one another, and for user authentication and access control in distributed systems. The chapter focuses on the element security software components, primarily for the kernel, security contexts, security-critical functions, and operating system (OS) implementations. OS implementations structured to use the common kernel interface to obtain basic services should be able to be closely controlled from an authorization perspective relatively easily since most hardware dependencies will be visible only in the kernel and the device drivers. Physical and administrative security mechanisms are the first lines of defense used to achieve security objectives.

  • Notes

    Much of the business transacted on the Web today takes place through information exchanges made possible by using documents as interfaces. For example, what seems to be a simple purchase from an online bookstore actually involves at least three different business collaborations -- between the customer and the online catalog to select a book; between the bookstore and a credit card authorization service to verify and charge the customer's account; and between the bookstore and the delivery service with instructions for picking up and delivering the book to the customer. Document engineering is needed to analyze, design, and implement these Internet information exchanges. This book is an introduction to the emerging field of document engineering.The authors, both leaders in the development of document engineering and other e-commerce initiatives, analyze document exchanges from a variety of perspectives. Taking a qualitative view, they look at patterns of document exchanges as components of business models; looking at documents in more detail, they describe techniques for analyzing individual transaction patterns and the role they play in the overall business process. They describe techniques for analyzing, designing, and encoding document models, including XML, and discuss the techniques and architectures that make XML a unifying technology for the next generation of e-business applications. Finally, they go beyond document models to consider management and strategic issues -- the business model, or the vision, that the information exchanged in these documents serves.

  • No title

    Increasingly our critical infrastructures are reliant on computers. We see examples of such infrastructures in several domains, including medical, power, telecommunications, and finance. Although automation has advantages, increased reliance on computers exposes our critical infrastructures to a wider variety and higher likelihood of accidental failures and malicious attacks. Disruption of services caused by such undesired events can have catastrophic effects, such as disruption of essential services and huge financial losses. The increased reliance of critical services on our cyberinfrastructure and the dire consequences of security breaches have highlighted the importance of information security. Authorization, security protocols, and software security are three central areas in security in which there have been significant advances in developing systematic foundations and analysis methods that work for practical systems. This book provides an introduction to this work, covering rep esentative approaches, illustrated by examples, and providing pointers to additional work in the area. Table of Contents: Introduction / Foundations / Detecting Buffer Overruns Using Static Analysis / Analyzing Security Policies / Analyzing Security Protocols

  • SECURITY SYSTEMS DESIGN??-??DESIGNING NETWORK SECURITY

    This chapter first examines protocol layers 1,2, and 3 of the available security mechanisms and explores their deployment possibilities within networking protocols. Network Physical layer media types include: metallic or fiber-optic cables/wires used for interconnecting network elements; radio frequency signals transmitted through air used for wireless communications; or visible, or invisible, laser light signals transmitted through air or water. Within the Data Link layer, the encountered security devices are IEEE 802.1x, IEEE 802. 1ae and IEEE 802.11 WPA and 802.11i. The chapter then considers the security capabilities, uses, and deficiencies for each of these technologies. Next, it covers the advantages and limitations of providing security at the Network layer, via the IP security (IPsec) framework of protocols, for secure channel establishment. Finally, the filtering and inspection of packets are discussed as forms of network and host access control (authorization).

  • Glossary

    Much of the business transacted on the Web today takes place through information exchanges made possible by using documents as interfaces. For example, what seems to be a simple purchase from an online bookstore actually involves at least three different business collaborations -- between the customer and the online catalog to select a book; between the bookstore and a credit card authorization service to verify and charge the customer's account; and between the bookstore and the delivery service with instructions for picking up and delivering the book to the customer. Document engineering is needed to analyze, design, and implement these Internet information exchanges. This book is an introduction to the emerging field of document engineering.The authors, both leaders in the development of document engineering and other e-commerce initiatives, analyze document exchanges from a variety of perspectives. Taking a qualitative view, they look at patterns of document exchanges as components of business models; looking at documents in more detail, they describe techniques for analyzing individual transaction patterns and the role they play in the overall business process. They describe techniques for analyzing, designing, and encoding document models, including XML, and discuss the techniques and architectures that make XML a unifying technology for the next generation of e-business applications. Finally, they go beyond document models to consider management and strategic issues -- the business model, or the vision, that the information exchanged in these documents serves.

  • Index

    Much of the business transacted on the Web today takes place through information exchanges made possible by using documents as interfaces. For example, what seems to be a simple purchase from an online bookstore actually involves at least three different business collaborations -- between the customer and the online catalog to select a book; between the bookstore and a credit card authorization service to verify and charge the customer's account; and between the bookstore and the delivery service with instructions for picking up and delivering the book to the customer. Document engineering is needed to analyze, design, and implement these Internet information exchanges. This book is an introduction to the emerging field of document engineering.The authors, both leaders in the development of document engineering and other e-commerce initiatives, analyze document exchanges from a variety of perspectives. Taking a qualitative view, they look at patterns of document exchanges as components of business models; looking at documents in more detail, they describe techniques for analyzing individual transaction patterns and the role they play in the overall business process. They describe techniques for analyzing, designing, and encoding document models, including XML, and discuss the techniques and architectures that make XML a unifying technology for the next generation of e-business applications. Finally, they go beyond document models to consider management and strategic issues -- the business model, or the vision, that the information exchanged in these documents serves.

  • The End of the Beginning

    Much of the business transacted on the Web today takes place through information exchanges made possible by using documents as interfaces. For example, what seems to be a simple purchase from an online bookstore actually involves at least three different business collaborations -- between the customer and the online catalog to select a book; between the bookstore and a credit card authorization service to verify and charge the customer's account; and between the bookstore and the delivery service with instructions for picking up and delivering the book to the customer. Document engineering is needed to analyze, design, and implement these Internet information exchanges. This book is an introduction to the emerging field of document engineering.The authors, both leaders in the development of document engineering and other e-commerce initiatives, analyze document exchanges from a variety of perspectives. Taking a qualitative view, they look at patterns of document exchanges as components of business models; looking at documents in more detail, they describe techniques for analyzing individual transaction patterns and the role they play in the overall business process. They describe techniques for analyzing, designing, and encoding document models, including XML, and discuss the techniques and architectures that make XML a unifying technology for the next generation of e-business applications. Finally, they go beyond document models to consider management and strategic issues -- the business model, or the vision, that the information exchanged in these documents serves.

  • A Secure Update Mechanism for Internet of Things Devices

    This chapter proposes a mechanism for securely updating IoT devices across networks and devices of any form factor or function. While not an exhaustive list, several of the problems are administering devices, proper authentication and authorization, securing communications, and firmware security. The chapter addresses updating IoT devices which is an essential part of IoT security. It defines an update as either updating both the operating system and application or just either the application or operating system running on an IoT device. The chapter addresses performing updates to IoT devices in a manner that is secure, and is also based on security standards that the IoT device will need to implement to carry out its functions. The goal of this secure update mechanism is to make recommendations that would cause minimal increases in processing and memory requirements so that it could be used by IoT devices running on constrained platforms and on constrained networks.

  • IPv6 Deployment Drivers

    Supporting an ongoing worldwide web presence is a key consideration for IPv6 deployment. In addition to IPv4/IPv6 Internet ubiquity, a class of emerging applications that leverage IPv6 features promises to revolutionize daily life. Deploying IPv6 requires analysis of your current IPv4 network, scoping IPv6 deployment, identifying upgrades or modifications to network equipment, applications or end user devices, and managing the project to completion. This chapter talks about the basic authorization process, which requires a basic definition of the goals, scope, plan, costs, and benefits of IPv6 deployment.



Standards related to Authorization

Back to Top

No standards are currently tagged "Authorization"