Keywords: مجوز; Access management; Authentication; Authorization; Cloud computing; Security; Web services;
مقالات ISI مجوز (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: مجوز; Authorization; Certificateless public key encryption; Key escrow; Equality test;
Keywords: مجوز; Electrical and electronic products; Refurbished products; Authorization; Secondary market; Consumers' preference; Third party reseller;
Keywords: مجوز; Usable security; Passwords analytics; Password security; Authorization; Authentication;
Keywords: مجوز; Identification; Authentication; Authorization; Federated access control; Identity and access management; Internet of Things;
Keywords: مجوز; Electronic health records; long-term electronic records management; cumulatively notarized signature; authentication; authorization;
A two-dimensional knowledge authorization evaluation method enabling inter-enterprise knowledge sharing
Keywords: مجوز; Virtual enterprise; Authorization; Knowledge sharing; Ontology; Fuzzy logic;
Keywords: مجوز; Searchable encryption; Secure keyword search; Authorization; Provable security; Database system management;
Keywords: مجوز; Workflow; Task execution; Authorization; Performance analysis;
Keywords: مجوز; Authorization; Semantic mediator system; Semantic web; RDF; OWL; Semantic repositories
Keywords: مجوز; Authorization; Chemicals; Safety; Handling; Storage; Disposal;
Keywords: مجوز; Security risks; Authorization; Social networks; Social Network Services (SNS); Social pervasive applications; Neuro-fuzzy systems;
Keywords: مجوز; Privacy preserving; Petri-net; Cohesion; Authorization; Multi-agents; Web service
Keywords: مجوز; Remanufacturing; Third-party remanufacturer; Outsourcing remanufacturing; Authorization; Consumer surplus; Social welfare; Environment impact
Keywords: مجوز; Network of information; Information centric networks; Formal methods; Authentication; Authorization
Keywords: مجوز; Authorization; Authorization framework; Trust; Power; Optical networking; AAA;
Keywords: مجوز; Security engineering; Software engineering; Security patterns; Authorization; Access control; Distributed systems; Distributed systems security; Security solution frames
Keywords: مجوز; Biosimilar; Extrapolation; Tumor necrosis factor alpha; Infliximab; Authorization; Safety
Keywords: مجوز; Security; Authorization; Workflow; Resource management
Keywords: مجوز; Medical device regulation; Authorization; Reimbursement; Evidence requirements; HTA/health technology assessment
Keywords: مجوز; Semantic access control; Authorization; RFID; Ontology; Pervasive healthcare
Keywords: مجوز; Certificate; Authentication; Authorization; Protocols; Trust; Wholesale banking
Keywords: مجوز; Self-adaptation; Authorization; Policy management; Identity management; Autonomic security; RBAC; ABAC; SAML; PERMIS
Keywords: مجوز; Usage Control; Cloud Security; Authorization; OpenNebula; XACML
Performance Analysis of End-to-End Security Schemes in Healthcare IoT
Keywords: مجوز; Smart Home; Hospital; Cryptographic Key Generation; Bio-Electrical Signal; Authentication; Authorization; End-to-End Security;
XSACd-Cross-domain resource sharing & access control for smart environments
Keywords: مجوز; Access control; Authorization; Web Services; Service-oriented architectures; Ubiquitous computing;
An Empirical Study of US Environmental Federalism: RCRA Enforcement From 1998 to 2011
Keywords: مجوز; Authorization; Enforcement; Environmental federalism; Environmental law; Resource and Recovery Conservation Act;
ACROSS: A generic framework for attribute-based access control with distributed policies for virtual organizations
Keywords: مجوز; Virtual organization; Identity and access management; Authentication; Authorization; Attribute-based access control;
Effective and Scalable Data Access Control in Onedata Large Scale Distributed Virtual File System
Keywords: مجوز; big data; open data; data management; authorization; security;
Elimination of policy conflict to improve the PDP evaluation performance
Keywords: مجوز; XACML; Authorization; Access control; Policy conflict; Policy Decision Point (PDP); Evaluation performance;
Habilitation des pathologistes pour l'évaluation du pourcentage de cellules tumorales lors du contrôle morphologique avant extraction d'acides nucléiques
Keywords: مجوز; Habilitation; Norme NF EN ISO 15189; Pourcentage de cellules tumorales; Accréditation; Authorization; NF EN ISO 15189 standard; Tumor cells percentage; Accreditation;
Attribute-based authorization for structured Peer-to-Peer (P2P) networks
Keywords: مجوز; Authorization; P2P security; Attribute Certificates;
OSCAR: Object security architecture for the Internet of Things
Keywords: مجوز; Communication security; Internet of Things; Object security; DTLS; Authorization; End-to-end security
Decision Diagrams for XACML Policy Evaluation and Management
Keywords: مجوز; Access control; Authorization; Policy evaluation; Decision diagram; Interval partition processing; XACML;
An RFID solution for enhancing inpatient medication safety with real-time verifiable grouping-proof
Keywords: مجوز; RFID; Grouping-proof; Medication safety; Authorization; Security
Analyzing the security of Windows 7 and Linux for cloud computing
Keywords: مجوز; Cloud computing; Operating system security; Privacy; Security; Authorization; Authentication
Integration of the OAuth and Web Service family security standards
Keywords: مجوز; Security Token Service; Authentication; Authorization; WS-Security; OAuth; GEMBus
A capability-based security approach to manage access control in the Internet of Things
Keywords: مجوز; Capability based access control; Internet of Things; Authorization; Rights revocation; Rights delegation
Problems of capacity, consent and confidentiality
Keywords: مجوز; trust; mutual respect; voluntariness; disclosure; understanding; decision; authorization; privacy; capacity; consent; confidentiality
Extensible access control markup language integrated with Semantic Web technologies
Keywords: مجوز; XACML; Semantic Web; Ontology; SWRL; Authorization
Evaluation of the Pattern-based method for Secure Development (PbSD): A controlled experiment
Keywords: مجوز; Database design; Model driven development; Secure software development; Authorization; Security patterns; Controlled experiment
A methodology for integrating access control policies within database development
Keywords: مجوز; Authorization; Access control; Database design; Security patterns; Domain analysis; FOOM; ADOM; UML; Security
Modeling and analyzing the impact of authorization on workflow executions
Keywords: مجوز; Modeling; Authorization; Workflow; RBAC
Who Doesn’t Authorize the Linking of Survey and Administrative Health Data? A General Population-based Investigation
Keywords: مجوز; Authorization; Community Surveys; HIPAA (Health Insurance Portability and Accountability Act); Personal Health Records; Survey MethodsHAF, HIPAA authorization form; HIPAA, Health Insurance Portability and Accountability Act; REP, Rochester Epidemiology Pr
The design of RFID access control protocol using the strategy of indefinite-index and challenge-response
Keywords: مجوز; RFID; Access control; Authentication; Authorization; Security
Formal description of the SWIFT identity management framework
Keywords: مجوز; Identity aggregation; Security analysis; Cross-layer; Authentication; Authorization
Providing EAP-based Kerberos pre-authentication and advanced authorization for network federations
Keywords: مجوز; AAA; Authentication; Authorization; EAP; Kerberos; SAML; XACML
Incentives to innovate and social harm: Laissez-faire, authorization or penalties?
Keywords: مجوز; D73; K21; K42; L51Innovation; Liability for harm; Safety regulation; Authorization
Semantic-based authorization architecture for Grid
Keywords: مجوز; Globus security; Authorization; Semantic web; Policy conflict analysis
Dynamic deployment of context-aware access control policies for constrained security devices
Keywords: مجوز; IT security; Network security; Authorization; OrBAC