Authorization

View this topic in
Authorization (also spelt Authorisation) is the function of specifying access rights to resources, which is related to information security and computer security in general and to access control in particular. (Wikipedia.org)






Conferences related to Authorization

Back to Top

2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC)

IWCMC 2018 will target a wide spectrum of the state-of-the-art as well as emerging topics pertaining to wireless networks, wireless sensors, vehicular communications, and mobile computing.


2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC)

IEEE CCNC 2018 will present the latest developments and technical solutions in the areas of home networking, consumer networking, enabling technologies (such as middleware) and novel applications and services. The conference will include a peer-reviewed program of technical sessions, special sessions, business application sessions, tutorials, and demonstration sessions


2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)

The conference aims at bringing together researchers and practitioners in the world working on trusted computing and communications, with regard to trust, security, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks, and providing a forum to present and discuss emerging ideas and trends in this highly challenging research field


2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)

NTMS'2018 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals to present their state-of-the-art research and development in these interesting areas. The event will be combined with tutorial sessions and workshops. Tutorials will precede the main program, aiming at the dissemination of mature knowledge and technology advances in the field.

  • 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS)

    NTMS'2016 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals to present their state-of-the-art research and development in these interesting areas. The event will be combined with tutorial sessions and workshops. Tutorials will precede the main program, aiming at the dissemination of mature knowledge and technology advances in the field.

  • 2015 7th International Conference on New Technologies, Mobility and Security (NTMS)

    NTMS'2015 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals to present their state-of-the-art research and development in these interesting areas. The event will be combined with tutorial sessions and workshops. Tutorials will precede the main program, aiming at the dissemination of mature knowledge and technology advances in the field.

  • 2014 6th International Conference on New Technologies, Mobility and Security (NTMS)

    NTMS'2014 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals to present their state-of-the-art research and development in these interesting areas.

  • 2012 5th International Conference on New Technologies, Mobility and Security (NTMS)

    NTMS'2012 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce

  • 2011 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS)

    NTMS'2011 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals to present their state-of-the-art research and development in these interesting areas.

  • 2009 3rd International Conference on New Technologies, Mobility and Security (NTMS)

    New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce

  • 2008 New Technologies, Mobility and Security (NTMS)

    NTMS'2008 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals to present their state-of-the-art research and development in these interesting areas. The event will be combined with tutorial sessions and workshops. Tutorials will precede the main program, aiming at the dissemination of mature knowledge and t


2018 IEEE 22nd International Conference on ComputerSupported Cooperative Work in Design (CSCWD)

Collaboration technologies and applications to the design of processes, products, systems, and services in industries and societies. Application domains include aerospace, automotive, manufacturing, construction, logistics, transportation, power and energy, healthcare, infrastructure, administration, social networks, and entertainment.


More Conferences

Periodicals related to Authorization

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Broadcasting, IEEE Transactions on

Broadcast technology, including devices, equipment, techniques, and systems related to broadcast technology, including the production, distribution, transmission, and propagation aspects.


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computers, IEEE Transactions on

Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...


More Periodicals

Most published Xplore authors for Authorization

Back to Top

Xplore Articles related to Authorization

Back to Top

Resilient Delegation Revocation with Precedence for Predecessors Is NP-Complete

[{u'author_order': 1, u'full_name': u'Marcos Cramer'}, {u'author_order': 2, u'full_name': u'Pieter Van Hertum'}, {u'author_order': 3, u'full_name': u'Ruben Lapauw'}, {u'author_order': 4, u'full_name': u'Ingmar Dasseville'}, {u'author_order': 5, u'full_name': u'Marc Denecker'}] 2016 IEEE 29th Computer Security Foundations Symposium (CSF), None

In ownership-based access control frameworks with the possibility of delegating permissions and administrative rights, chains of delegated accesses will form. There are different ways to treat these delegation chains when revoking rights, which give rise to different revocation schemes. One possibility studied in the literature is to revoke rights by issuing negative authorizations, meant to ensure that the revocation is ...


Indirect Authorization Topologies for Grid Access Control

[{u'author_order': 1, u'affiliation': u'Institute for Development and Research in Banking Technology, Masab Tank, Hyderabad-500 057, A.P, INDIA', u'full_name': u'G. Geethakumari'}, {u'author_order': 2, u'affiliation': u'University of Hyderabad, Hyderabad 500 046, Andhra Pradesh, INDIA', u'full_name': u'Atul Negi'}, {u'author_order': 3, u'affiliation': u'University of Hyderabad, Hyderabad 500 046, Andhra Pradesh, INDIA', u'full_name': u'V N Sastry'}] Information Technology, 2006. ICIT '06. 9th International Conference on, None

Delegation is an indirect authorization technique used in grids. Existing grid delegation mechanisms rely on authentication. We propose an indirect authorization approach for grids using role delegation. This method suggests four different interconnection topologies for the grid access control components for inter-domain as well as intra-domain role delegation.


A Calculus for Flow-Limited Authorization

[{u'author_order': 1, u'full_name': u'Owen Arden'}, {u'author_order': 2, u'full_name': u'Andrew C. Myers'}] 2016 IEEE 29th Computer Security Foundations Symposium (CSF), None

Real-world applications routinely make authorization decisions based on dynamic computation. Reasoning about dynamically computed authority is challenging. Integrity of the system might be compromised if attackers can improperly influence the authorizing computation. Confidentiality can also be compromised by authorization, since authorization decisions are often based on sensitive data such as membership lists and passwords. Previous formal models for authorization do ...


Modeling and Controlling Downgrading Operations in Information Systems

[{u'author_order': 1, u'affiliation': u'LUSSI Dept., Univ. Europeenne de Bretagne, Rennes, France', u'full_name': u'Julien A. Thomas'}, {u'author_order': 2, u'affiliation': u'LUSSI Dept., Univ. Europeenne de Bretagne, Rennes, France', u'full_name': u'Nora Cuppens-Boulahia'}, {u'author_order': 3, u'affiliation': u'LUSSI Dept., Univ. Europeenne de Bretagne, Rennes, France', u'full_name': u'Frederic Cuppens'}] 2009 Fifth International Conference on Signal Image Technology and Internet Based Systems, None

In existing systems, information are protected by security models that control the accesses to the information, depending on their security level. In such systems, allowing accesses that were previously denied by diminishing the security level of the information is called downgrading. Controlling this downgrade of sensitive information is an important issue in computer security, as it requires the definition of ...


Semantic Comparison of Security Policies: From Access Control Policies to Flow Properties

[{u'author_order': 1, u'affiliation': u'LIP6, Univ. Pierre & Marie Curie, Paris, France', u'full_name': u'Mathieu Jaume'}] 2012 IEEE Symposium on Security and Privacy Workshops, None

This paper introduces two generic mechanisms allowing to compare security policies from a semantical point of view. First, a notion of embedding is defined in order to compare policies over a common domain. Then, interpretations of security policies are introduced in order to consider their properties over arbitrary domains. Thus, combining interpretations and embeddings allows to compare policies expressed over ...


More Xplore Articles

Educational Resources on Authorization

Back to Top

eLearning

No eLearning Articles are currently tagged "Authorization"

IEEE-USA E-Books

  • Identity and Access Management

    Cloud computing is transforming the way in which organizations and individuals access computing resources and applications and do their business. However, such factors as privacy, security, and trust are increasingly becoming major concerns for organizations and consumers using cloud services. Such concerns remain critical whether the cloud services provided are stand-alone applications (SaaS), platforms for application development (PaaS), or IT infrastructures (IaaS) such as networks, servers, or storage on demand. One of the key security areas, the management of identities and their access to resources, is becoming more complex. It requires a more unified approach to both internal and external users, in traditional as well as cloud environments. This chapter elaborates on the essence of identity and access management (IAM) and why effective IAM is an important requirement for ensuring security, privacy, and trust in a cloud computing environment. It also outlines the current status of IAM in the cloud, discusses the challenges that IAM brings to the cloud, and highlights considerations for users when deploying and using cloud computing.

  • OAuth Standard for User Authorization of Cloud Services

    The IETF OAuth specification is an open Web standard that enables secure authorization for applications running on various kinds of platforms. Using OAuth, third-party client applications may access protected resources on the cloud or elsewhere without the resource owner being required to supply user credentials such as an identity and password. In order to achieve authorization, OAuth specifies the use of a token that enables validated access to a resource. OAuth can effectively be combined with an identity- management system such as OpenID to concurrently provide both authorization and authentication functions. The original version 1.0 of the OAuth protocol relied upon the exchange of client-side signatures, while the new version 2.0 relies upon a bearer token scheme. The new protocol is designed to be simpler to implement and supports new application contexts, but introduces its own new challenges.

  • Distributed Access Control in Cloud Computing Systems

    With the tremendous increase in the number of distributed applications, the issue of distributed access control has become an important research topic for both academia and industry. In distributed computing environments like cloud computing or service computing, authentication and authorization are the two important functions to be performed, to make sure that unauthorized users do not access distributed system components. An effective access control mechanism is an essential security component as far as protecting the confidentiality, integrity, and availability (CIA) of information hosted in the cloud is concerned. An effective access control mechanism implemented in the cloud domain should be scalable, reliable, and robust and it should provide required features and procedures for identity provisioning, deprovisioning, authentication, authorization, accounting, and auditing. In this chapter, we discuss the issue of distributed access control, major features and functionalities, access control policies and models, distributed access control architecture for multicloud environments, trust, and identity management in cloud computing environments. Related work shows some of the major research activities in the area of distributed access control considering the advantages and disadvantages of the approaches that have been adopted. We conclude this chapter by discussing a few research issues in the area of distributed access control in the cloud environment.

  • The Presence Service in the IMS

    This chapter contains sections titled: The Foundation of Services Presence Architecture in the IMS Presence Publication Watcher Subscription Watcher Information and Authorization of Watchers Presence Optimizations OMA Extensions to PIDF

  • Secure Access and Interworking in IMS

    This chapter contains sections titled: Access Security in IMS Network Security in IMS

  • The Presence and List Management Enablers

    This chapter contains sections titled: Presence - What is it? A Constructionist View of Presence Architectures The OMA Presence Model and Specifications A Deployment Example - Deploying Presence and XDM Enablers in an IMS or MMD environment Impact of Specifications on the Industry Specifications Evolution and Future Direction Summary

  • Security in the IMS

    This chapter contains sections titled: Access Security Network Security

  • Security

    This chapter contains sections titled: Description of the Problems General Approach to Solutions Security in UMTS Security in a WLAN Security Computer Networks Discussion Summary

  • Service Configuration on the Internet

    This chapter contains sections titled: The XML Configuration Access Protocol (XCAP) An Overview of XML HTTP URIs that Identify XCAP Resources XCAP Operations Entity Tags and Conditional Operations Subscriptions to Changes in XML Documents XML Patch Operations

  • AAA on the Internet

    This chapter contains sections titled: Authentication, Authorization, and Accounting AAA Framework on the Internet The Diameter Protocol



Standards related to Authorization

Back to Top

IEEE Standard for Local and metropolitan area networks - Secure Device Identity

This standard specifies unique per-device identifiers (DevID) and the management and cryptographic binding of a device to its identifiers, the relationship between an initially installed identity and subsequent locally significant identities, and interfaces and methods for use of DevIDs with existing and new provisioning and authentication protocols.


IEEE Standard for Local and metropolitan area networks--Port-Based Network Access Control

For the purpose of providing compatible authentication, authorization, and cryptographic key agreement mechanisms to support secure communication between devices connected by IEEE 802ᆴ Local Area Networks (LANs), this standard a) Specifies a general method for provision of port-based network access control. b) Specifies protocols that establish secure associations for IEEE Std 802.1AEル MAC Security. c) Facilitates the use of industry ...