Journal articles on the topic 'Authorization Policie'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Authorization Policie.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Xu, Yang, Wuqiang Gao, Quanrun Zeng, Guojun Wang, Ju Ren, and Yaoxue Zhang. "A Feasible Fuzzy-Extended Attribute-Based Access Control Technique." Security and Communication Networks 2018 (June 5, 2018): 1–11. http://dx.doi.org/10.1155/2018/6476315.
Full textSciberras, Josette, Raymond Zammit, and Patricia Vella Bonanno. "The European framework for intellectual property rights for biological medicines." Generics and Biosimilars Initiative Journal 10, no. 4 (December 15, 2021): 172–83. http://dx.doi.org/10.5639/gabij.2021.1004.022.
Full textBai, Yun, and Vijay Varadharajan. "On transformation of authorization policies." Data & Knowledge Engineering 45, no. 3 (June 2003): 333–57. http://dx.doi.org/10.1016/s0169-023x(02)00194-5.
Full textSabri, Khair Eddin. "An Algebraic Model to Analyze Role-Based Access Control Policies." Modern Applied Science 12, no. 10 (September 12, 2018): 50. http://dx.doi.org/10.5539/mas.v12n10p50.
Full textWANG, Qiang, Qiao LIU, and Zhi-guang QIN. "Change impact analysis in authorization policies." Journal of Computer Applications 31, no. 1 (March 21, 2011): 115–17. http://dx.doi.org/10.3724/sp.j.1087.2011.00115.
Full textFournet, Cédric, Andrew D. Gordon, and Sergio Maffeis. "A type discipline for authorization policies." ACM Transactions on Programming Languages and Systems 29, no. 5 (August 2, 2007): 25. http://dx.doi.org/10.1145/1275497.1275500.
Full textLi, Pei Wu. "The Research of Temporal-Based Authorization for Group-Centric Secure Information Sharing." Advanced Materials Research 143-144 (October 2010): 1223–27. http://dx.doi.org/10.4028/www.scientific.net/amr.143-144.1223.
Full textIyer, Padmavathi, and Amirreza Masoumzadeh. "Learning Relationship-Based Access Control Policies from Black-Box Systems." ACM Transactions on Privacy and Security 25, no. 3 (August 31, 2022): 1–36. http://dx.doi.org/10.1145/3517121.
Full textSchwartz, Aaron L., Troyen A. Brennan, Dorothea J. Verbrugge, and Joseph P. Newhouse. "Measuring the Scope of Prior Authorization Policies." JAMA Health Forum 2, no. 5 (May 28, 2021): e210859. http://dx.doi.org/10.1001/jamahealthforum.2021.0859.
Full textBecker, Moritz Y., and Sebastian Nanz. "A logic for state-modifying authorization policies." ACM Transactions on Information and System Security 13, no. 3 (July 2010): 1–28. http://dx.doi.org/10.1145/1805974.1805976.
Full textBasile, Cataldo, Daniele Canavese, Christian Pitscheider, Antonio Lioy, and Fulvio Valenza. "Assessing network authorization policies via reachability analysis." Computers & Electrical Engineering 64 (November 2017): 110–31. http://dx.doi.org/10.1016/j.compeleceng.2017.02.019.
Full textVan Maldegem, Koen. "The Biocidal Products Directive." European Energy and Environmental Law Review 7, Issue 10 (October 1, 1998): 261–68. http://dx.doi.org/10.54648/eelr1998042.
Full textGhiselli, A., L. Magnoni, F. Stagni, and Z. Riccardo. "Enriched namespace to support content-aware authorization policies." Journal of Physics: Conference Series 119, no. 6 (July 1, 2008): 062031. http://dx.doi.org/10.1088/1742-6596/119/6/062031.
Full textGenitsaridi, Irini, Antonis Bikakis, and Grigoris Antoniou. "DEAL." International Journal of Ambient Computing and Intelligence 3, no. 4 (October 2011): 9–24. http://dx.doi.org/10.4018/jaci.2011100102.
Full textFeješ, Ištvan. "The pre-trial procedure and authorizations of the police." Glasnik Advokatske komore Vojvodine 74, no. 9-10 (2002): 285–89. http://dx.doi.org/10.5937/gakv0210285f.
Full textProtiére, Christel, Rachel Baker, Dominique Genre, Anthony Goncalves, and Patrice Viens. "Marketing Authorization Procedures for Advanced Cancer Drugs: Exploring the Views of Patients, Oncologists, Healthcare Decision Makers, and Citizens in France." Medical Decision Making 37, no. 5 (February 15, 2017): 555–66. http://dx.doi.org/10.1177/0272989x17691953.
Full textHulkower, Rachel L., Meghan Kelley, Lindsay K. Cloud, and Susanna N. Visser. "Medicaid Prior Authorization Policies for Medication Treatment of Attention-Deficit/Hyperactivity Disorder in Young Children, United States, 2015." Public Health Reports 132, no. 6 (October 26, 2017): 654–59. http://dx.doi.org/10.1177/0033354917735548.
Full textTrojer, Thomas, Basel Katt, Ruth Breu, Thomas Schabetsberger, and Richard Mair. "Managing Privacy and Effectiveness of Patient-Administered Authorization Policies." International Journal of Computational Models and Algorithms in Medicine 3, no. 2 (April 2012): 43–62. http://dx.doi.org/10.4018/jcmam.2012040103.
Full textCh. Yarmaki and V. Yarmaki. "POLICE SUPERVISION OF RELEASES FROM PRISON." International Academy Journal Web of Scholar, no. 5(35) (May 31, 2019): 55–58. http://dx.doi.org/10.31435/rsglobal_wos/31052019/6506.
Full textHenderson, Nadine, Phill O'Neill, and Martina Garau. "PP106 Twenty Years Of Orphan Medicines Regulation: Have Treatments Reached Patients In Need Across Europe And Canada?" International Journal of Technology Assessment in Health Care 37, S1 (December 2021): 19. http://dx.doi.org/10.1017/s0266462321001124.
Full textRathod, Yagnik A. "An access control and authorization model with Open stack cloud for Smart Grid." ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal 9, no. 3 (November 4, 2020): 69–87. http://dx.doi.org/10.14201/adcaij2020936987.
Full textMa, Chen-hua, Guo-dong Lu, and Jiong Qiu. "Conflict detection and resolution for authorization policies in workflow systems." Journal of Zhejiang University-SCIENCE A 10, no. 8 (August 2009): 1082–92. http://dx.doi.org/10.1631/jzus.a0820366.
Full textFischer, Michael A., Hailu Cheng, Sebastian Schneeweiss, Jerry Avorn, and Daniel H. Solomon. "Prior Authorization Policies for Selective Cyclooxygenase-2 Inhibitors in Medicaid." Medical Care 44, no. 7 (July 2006): 658–63. http://dx.doi.org/10.1097/01.mlr.0000218775.04675.fd.
Full textSchmid, Ian, Mehmet Burcu, and Julie M. Zito. "Medicaid Prior Authorization Policies for Pediatric Use of Antipsychotic Medications." JAMA 313, no. 9 (March 3, 2015): 966. http://dx.doi.org/10.1001/jama.2015.0763.
Full textPatel, Monaliben, Debora S. Bruno, Lauren McCaulley, and Piyush Srivastava. "Decreasing the number of authorization denials in an academic medical oncology practice." Journal of Clinical Oncology 38, no. 29_suppl (October 10, 2020): 212. http://dx.doi.org/10.1200/jco.2020.38.29_suppl.212.
Full textSun, Wei, Hui Su, and Hongbing Liu. "Role-Engineering Optimization with Cardinality Constraints and User-Oriented Mutually Exclusive Constraints." Information 10, no. 11 (November 4, 2019): 342. http://dx.doi.org/10.3390/info10110342.
Full textNarotama, Indra, and Lathifah Hanim. "Investigation Action Against Children Who Are Circulating Pharmaceuticals Stocks That Does Not Have Permission In Jurisdictions Police Resort (Polres) Kudus." Jurnal Daulat Hukum 2, no. 1 (March 15, 2019): 45. http://dx.doi.org/10.30659/jdh.v2i1.4205.
Full textGiglione, Giada, Anna Annibaldi, Antonio Iaccarino, Roberto Capancioni, Giorgio Borghini, Fiorenzo Ciabattoni, Silvia Illuminati, Giandomenico Pace, Francesco Memmola, and Gianni Giantomassi. "An Integrated Web-Based GIS Platform for the Environmental Monitoring of Industrial Emissions: Preliminary Results of the Project." Applied Sciences 12, no. 7 (March 25, 2022): 3369. http://dx.doi.org/10.3390/app12073369.
Full textNaci, Huseyin, Robin Forrest, Mike Zhai, Amanda R. Stofesky, and Aaron S. Kesselheim. "Characteristics of Prior Authorization Policies for New Drugs in Medicare Part D." JAMA Health Forum 4, no. 2 (February 24, 2023): e225610. http://dx.doi.org/10.1001/jamahealthforum.2022.5610.
Full textBai, Yun, and Khaled M. Khan. "Ell Secure Information System Using Modal Logic Technique." International Journal of Secure Software Engineering 2, no. 2 (April 2011): 65–76. http://dx.doi.org/10.4018/jsse.2011040104.
Full textHenry, Kevin Lawrence. "Heretical Discourses in Post-Katrina Charter School Applications." American Educational Research Journal 56, no. 6 (June 19, 2019): 2609–43. http://dx.doi.org/10.3102/0002831219853811.
Full textLi, Biao, Yong Geng, Xiqiang Xia, Dan Qiao, and Hao Wang. "Comparatively Analyzing the Impact of Government Subsidy and Carbon Tax Policy on Authorized Remanufacturing." International Journal of Environmental Research and Public Health 18, no. 16 (August 5, 2021): 8293. http://dx.doi.org/10.3390/ijerph18168293.
Full textGonzalez, Richard, Firouzan “Fred” Massoomi, and William Neff. "Emergency-use authorization of peramivir." American Journal of Health-System Pharmacy 66, no. 24 (December 15, 2009): 2162–63. http://dx.doi.org/10.2146/ajhp090584.
Full textMahar, Uzma, Muhammad Aleem, and Ehtesham Zahoor. "TTECCDU: a blockchain-based approach for expressive authorization management." PeerJ Computer Science 9 (February 20, 2023): e1212. http://dx.doi.org/10.7717/peerj-cs.1212.
Full textHunter, Grace, Jennifer Schneider, and Sophie Pinkard. "Prior Authorization And Overuse Of Imaging." Health Affairs 31, no. 12 (December 2012): 2830. http://dx.doi.org/10.1377/hlthaff.2012.1236.
Full textHenry, Kevin Lawrence. "“The Price of Disaster”: The Charter School Authorization Process in Post-Katrina New Orleans." Educational Policy 35, no. 2 (February 23, 2021): 235–58. http://dx.doi.org/10.1177/0895904820988202.
Full textHulaj, Murat. "General Tasks and Authorizations of Poice Inpreliminary Procedure in Kosova." European Journal of Social Sciences Education and Research 2, no. 1 (December 30, 2014): 286. http://dx.doi.org/10.26417/ejser.v2i1.p286-290.
Full textBAI, YUN, and YAN ZHANG. "ARTIFICIAL INTELLIGENCE IN DATABASE SECURITY." International Journal of Pattern Recognition and Artificial Intelligence 18, no. 01 (February 2004): 3–17. http://dx.doi.org/10.1142/s0218001404003022.
Full textElrakaiby, Yehia, Frédéric Cuppens, and Nora Cuppens-Boulahia. "An Integrated Approach for the Enforcement of Contextual Permissions and Pre-Obligations." International Journal of Mobile Computing and Multimedia Communications 3, no. 2 (April 2011): 33–51. http://dx.doi.org/10.4018/jmcmc.2011040103.
Full textLU, Jianfeng, Ruixuan LI, Jinwei HU, and Dewu XU. "Static Enforcement of Static Separation-of-Duty Policies in Usage Control Authorization Models." IEICE Transactions on Communications E95.B, no. 5 (2012): 1508–18. http://dx.doi.org/10.1587/transcom.e95.b.1508.
Full textStokan, Eric J. "Accounting for State Authorization in Local Economic Development Policy Usage." State and Local Government Review 50, no. 1 (October 5, 2017): 24–36. http://dx.doi.org/10.1177/0160323x17728780.
Full textLuong, Thanh-Nhan, Hanh-Phuc Nguyen, and Ninh-Thuan Truong. "VeRA: Verifying RBAC and Authorization Constraints Models of Web Applications." International Journal of Software Engineering and Knowledge Engineering 31, no. 05 (May 2021): 655–75. http://dx.doi.org/10.1142/s0218194021500182.
Full textForrester, Caroline. "Benefits of Prior Authorizations." Journal of Managed Care & Specialty Pharmacy 26, no. 7 (July 2020): 820–22. http://dx.doi.org/10.18553/jmcp.2020.26.7.820.
Full textRosenson, Beth A. "Against Their Apparent Self-Interest: The Authorization of Independent State Legislative Ethics Commissions, 1973–96." State Politics & Policy Quarterly 3, no. 1 (March 2003): 42–65. http://dx.doi.org/10.1177/153244000300300103.
Full textZhang, Ai Juan, Cheng Ji, and Jian Wang. "Security Policy Conflict Detection for Distributed System." Advanced Materials Research 282-283 (July 2011): 173–76. http://dx.doi.org/10.4028/www.scientific.net/amr.282-283.173.
Full textBalaban, Edward P. "Prior Authorization: This Will Take Time." Journal of Oncology Practice 14, no. 8 (August 2018): 455–56. http://dx.doi.org/10.1200/jop.18.00303.
Full textNewcomer, Lee N., Richard Weininger, and Robert W. Carlson. "Transforming Prior Authorization to Decision Support." Journal of Oncology Practice 13, no. 1 (January 2017): e57-e61. http://dx.doi.org/10.1200/jop.2016.015198.
Full textPinilla-Dominguez, Pilar, Huseyin Naci, Leeza Osipenko, and Elias Mossialos. "NICE's evaluations of medicines authorized by EMA with conditional marketing authorization or under exceptional circumstances." International Journal of Technology Assessment in Health Care 36, no. 4 (June 25, 2020): 426–33. http://dx.doi.org/10.1017/s0266462320000355.
Full textAbraham, Amanda J., Christina M. Andrews, Samantha J. Harris, Melissa M. Westlake, and Colleen M. Grogan. "Coverage and Prior Authorization Policies for Medications for Opioid Use Disorder in Medicaid Managed Care." JAMA Health Forum 3, no. 11 (November 4, 2022): e224001. http://dx.doi.org/10.1001/jamahealthforum.2022.4001.
Full textAbouzaid, Safiya, Eric Jutkowitz, Kathy A. Foley, Laura T. Pizzi, Edward Kim, and Jay Bates. "Economic Impact of Prior Authorization Policies for Atypical Antipsychotics in the Treatment of Schizophrenia." Population Health Management 13, no. 5 (October 2010): 247–54. http://dx.doi.org/10.1089/pop.2009.0063.
Full text