Authorization

View this topic in
Authorization (also spelt Authorisation) is the function of specifying access rights to resources, which is related to information security and computer security in general and to access control in particular. (Wikipedia.org)






Conferences related to Authorization

Back to Top

2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC)

IWCMC 2018 will target a wide spectrum of the state-of-the-art as well as emerging topics pertaining to wireless networks, wireless sensors, vehicular communications, and mobile computing.


2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC)

IEEE CCNC 2018 will present the latest developments and technical solutions in the areas of home networking, consumer networking, enabling technologies (such as middleware) and novel applications and services. The conference will include a peer-reviewed program of technical sessions, special sessions, business application sessions, tutorials, and demonstration sessions


2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)

The conference aims at bringing together researchers and practitioners in the world working on trusted computing and communications, with regard to trust, security, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks, and providing a forum to present and discuss emerging ideas and trends in this highly challenging research field


2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)

NTMS'2018 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals to present their state-of-the-art research and development in these interesting areas. The event will be combined with tutorial sessions and workshops. Tutorials will precede the main program, aiming at the dissemination of mature knowledge and technology advances in the field.

  • 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS)

    NTMS'2016 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals to present their state-of-the-art research and development in these interesting areas. The event will be combined with tutorial sessions and workshops. Tutorials will precede the main program, aiming at the dissemination of mature knowledge and technology advances in the field.

  • 2015 7th International Conference on New Technologies, Mobility and Security (NTMS)

    NTMS'2015 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals to present their state-of-the-art research and development in these interesting areas. The event will be combined with tutorial sessions and workshops. Tutorials will precede the main program, aiming at the dissemination of mature knowledge and technology advances in the field.

  • 2014 6th International Conference on New Technologies, Mobility and Security (NTMS)

    NTMS'2014 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals to present their state-of-the-art research and development in these interesting areas.

  • 2012 5th International Conference on New Technologies, Mobility and Security (NTMS)

    NTMS'2012 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce

  • 2011 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS)

    NTMS'2011 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals to present their state-of-the-art research and development in these interesting areas.

  • 2009 3rd International Conference on New Technologies, Mobility and Security (NTMS)

    New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce

  • 2008 New Technologies, Mobility and Security (NTMS)

    NTMS'2008 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals to present their state-of-the-art research and development in these interesting areas. The event will be combined with tutorial sessions and workshops. Tutorials will precede the main program, aiming at the dissemination of mature knowledge and t


2018 IEEE 22nd International Conference on ComputerSupported Cooperative Work in Design (CSCWD)

Collaboration technologies and applications to the design of processes, products, systems, and services in industries and societies. Application domains include aerospace, automotive, manufacturing, construction, logistics, transportation, power and energy, healthcare, infrastructure, administration, social networks, and entertainment.


More Conferences

Periodicals related to Authorization

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Broadcasting, IEEE Transactions on

Broadcast technology, including devices, equipment, techniques, and systems related to broadcast technology, including the production, distribution, transmission, and propagation aspects.


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computers, IEEE Transactions on

Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...


More Periodicals

Most published Xplore authors for Authorization

Back to Top

Xplore Articles related to Authorization

Back to Top

A Boundary-Based Access Control Model for Sensitive Information

[{u'author_order': 1, u'affiliation': u'709th Res. Inst., China Shipbuilding Ind. Corp., Wuhan, China', u'full_name': u'Mu Xiaojun'}] 2009 International Forum on Information Technology and Applications, None

Sensitive information is one of core competence concerning with the development of the enterprise business. Tremendous pressure on today's enterprises to achieve and sustain competitive advantage has led to heightened efforts to protect sensitive information. Many enterprises have recognized that the key to sensitive information management improvement lies in the better access control model. In this paper, we present a ...


Specifying application-level security in workflow systems

[{u'author_order': 1, u'affiliation': u'Dept. of Comput. Sci., Rand Afrikaans Univ., Johannesburg, South Africa', u'full_name': u'M. S. Olivier'}, {u'author_order': 2, u'full_name': u'R. P. van de Riet'}, {u'author_order': 3, u'full_name': u'E. Gudes'}] Proceedings Ninth International Workshop on Database and Expert Systems Applications (Cat. No.98EX130), None

A workflow process involves the execution of a set of related activities over time to perform a specific task. Security requires that such activities may only be performed by authorised subjects. In order to enforce such requirements, access to the underlying data objects has to be controlled. We refer to such access control as level 1 access control. In addition, ...


A rights managing model in learning resource distribution

[{u'author_order': 1, u'affiliation': u'Dept. of Electron. & Inf. Eng., Huazhong Univ. of Sci. & Technol., China', u'full_name': u'Cheng Wenqing'}, {u'author_order': 2, u'affiliation': u'Dept. of Electron. & Inf. Eng., Huazhong Univ. of Sci. & Technol., China', u'full_name': u'Deng Wanting'}, {u'author_order': 3, u'affiliation': u'Dept. of Electron. & Inf. Eng., Huazhong Univ. of Sci. & Technol., China', u'full_name': u'Wu Di'}] 2005 6th International Conference on Information Technology Based Higher Education and Training, None

In this paper, we present a rights managing model to establish rights management in learning resource distribution, and elaborate how it facilitates the rights delegation, which is very common in e-learning. The rights managing model covers both the basic aspects in digital rights management and the characteristic points in learning resource distribution. Important issues of rights delegation and secondary license ...


Graph-based delegation authorization in workflow

[{u'author_order': 1, u'affiliation': u'R&D Center of CAD/CAM technology Shenyang Ligong University, China', u'full_name': u'Yonghe Wei'}] 2009 Chinese Control and Decision Conference, None

Using graph transformation as a formalism to specify access control has several advantages, from the intuition provided by the visual aspect to the precise semantics and the systematic verification of constraints. Graph transformations provide a uniform and precise framework for the specification of access control policies. After reviewing the basic notations of graph transformation, this article presents specification formalisms for ...


Privacy enhanced access control by SPKI

[{u'author_order': 1, u'affiliation': u'Dept. of Inf. Sci., Tokyo Univ., Japan', u'full_name': u'T. Saito'}, {u'author_order': 2, u'full_name': u'K. Umesawa'}, {u'author_order': 3, u'full_name': u'H. G. Okuno'}] Proceedings Seventh International Conference on Parallel and Distributed Systems: Workshops, None

In Internet and electronic commerce applications, a user may want to access servers as anonymous with an authorized certificate. In this paper, such privacy-enhanced service scheme is presented by using Simple Public Key Infrastructure (SPKI). A certificate of SPKI carries as few information on clients as possible compared to a certificate of PKIX (Public Key Infrastructure with X.509). After obtaining ...


More Xplore Articles

Educational Resources on Authorization

Back to Top

eLearning

No eLearning Articles are currently tagged "Authorization"

IEEE-USA E-Books

  • AAA on the Internet

    This chapter contains sections titled: Authentication, Authorization, and Accounting AAA Framework on the Internet The Diameter Protocol

  • AAA in the IMS

    This chapter contains sections titled: Authentication and Authorization in the IMS The _Cx _ and _Dx _ Interfaces The _Sh_ Interface Accounting

  • Security

    This chapter contains sections titled: Description of the Problems General Approach to Solutions Security in UMTS Security in a WLAN Security Computer Networks Discussion Summary

  • Key Management in 802.16e

    This chapter contains sections titled: Introduction Privacy Key Management Protocol PKM Version PKM Version Vulnerabilities and Countermeasures Comparisons with 802.11/UMTS Summary References

  • The Presence and List Management Enablers

    This chapter contains sections titled: Presence - What is it? A Constructionist View of Presence Architectures The OMA Presence Model and Specifications A Deployment Example - Deploying Presence and XDM Enablers in an IMS or MMD environment Impact of Specifications on the Industry Specifications Evolution and Future Direction Summary

  • The Diameter Protocol

    This chapter contains sections titled: Learning from RADIUS Deficiencies Diameter: Main Characteristics Protocol Details Diameter Network Access Application (NASREQ) Diameter Credit Control Application Diameter in NGN/IMS Architecture for QoS Control References

  • Service Configuration in the IMS

    This chapter contains sections titled: XDM architecture Downloading an XML Document, Attribute, or Element Directory Retrieval Data Search with XDM Subscribing to Changes in XML Documents

  • Proximity Services

    This chapter provides a detailed description of proximity services as specified in 3GPP. "Proximity Services" (ProSe) refers to services that can be provided to devices when they are in close proximity to each other. The chapter provides also an overview of discovery models, modes, procedures, and direct communication procedures that are specified in 3GPP Release 12. It also provides insights into how Proximity Services can be supported in the LTE network and LTE device.

  • Policy Control

    This chapter contains sections titled: Description of the Problems Policy Control in Computer Networks Policy Control in UMTS Discussion Summary

  • Operating Environment Security

    This chapter contains sections titled: Core Framework Security Requirements



Standards related to Authorization

Back to Top

IEEE Standard for Local and metropolitan area networks - Secure Device Identity

This standard specifies unique per-device identifiers (DevID) and the management and cryptographic binding of a device to its identifiers, the relationship between an initially installed identity and subsequent locally significant identities, and interfaces and methods for use of DevIDs with existing and new provisioning and authentication protocols.


IEEE Standard for Local and metropolitan area networks--Port-Based Network Access Control

For the purpose of providing compatible authentication, authorization, and cryptographic key agreement mechanisms to support secure communication between devices connected by IEEE 802ᆴ Local Area Networks (LANs), this standard a) Specifies a general method for provision of port-based network access control. b) Specifies protocols that establish secure associations for IEEE Std 802.1AEル MAC Security. c) Facilitates the use of industry ...