To see the other types of publications on this topic, follow the link: Authorizations.

Journal articles on the topic 'Authorizations'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Authorizations.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

van der Zee, Ivar T., Rick A. Vreman, Lawrence Liberti, and Mario Alanis Garza. "Regulatory reliance pathways during health emergencies: enabling timely authorizations for COVID-19 vaccines in Latin America." Revista Panamericana de Salud Pública 46 (August 30, 2022): 1. http://dx.doi.org/10.26633/rpsp.2022.115.

Full text
Abstract:
Objectives. To map the timing and nature of regulatory reliance pathways used to authorize COVID-19 vaccines in Latin America. Methods. An observational study was conducted assessing the characteristics of all COVID-19 vaccine authorizations in Latin America. For every authorization it was determined whether reliance was used in the authorization process. Subgroups of reference national regulatory authorities (NRAs) and non-reference NRAs were compared. Results. 56 authorizations of 10 different COVID-19 vaccines were identified in 18 countries, of which 25 (44.6%) used reliance and 12 (21.4%) did not. For the remaining 19 (33.0%) it was not possible to determine whether reliance was used. Reference agencies used reliance less often (40% of authorizations with a known pathway) compared to non-reference agencies (100%). The median review time was just 15 days and does not meaningfully differ between reliance and non-reliance authorizations. Conclusions. This study demonstrated that for these vaccines, despite reliance pathways being associated with numerous rapid authorizations, independent authorization review times were not considerably longer than reliance reviews; reliance pathways were not a prerequisite for rapid authorization. Nevertheless, reliance pathways provided rapid authorizations in response to the COVID-19 emergency.
APA, Harvard, Vancouver, ISO, and other styles
2

Sharma, Mallika, Annika Gustafson, Barbara Jagels, and Tracy Wong. "Collaboration with commercial payor to eliminate prior authorization." Journal of Clinical Oncology 37, no. 27_suppl (September 20, 2019): 9. http://dx.doi.org/10.1200/jco.2019.37.27_suppl.9.

Full text
Abstract:
9 Background: For commercial insurance plans, there is often a requirement to obtain prior-authorization for specific services. Prior-authorization though intended to ensure medical necessity, can cause significant delays in patient care and create an unnecessary administrative burden. It often leads to undue anxiety in patients, dissatisfaction among providers and substantial waste in the system. To increase our efficiency and improve patient and provider experience, we partnered with one of our region’s largest commercial payors to eliminate prior-authorization. Methods: A Lean Six-sigma DMAIC approach was adopted: Define- created a process map. Measure- calculated baseline for prior-authorization denials. Analyze- conducted retrospective analysis to identify areas to improve. Improve- conducted provider training for appropriate imaging guidelines. Control- established internal auditing to check provider compliance. Results: At SCCA, we found that 94.8% of prior-authorizations were approved instantly or after providing more documentation, thus prior-authorization did not add value. Moreover, 2.15% were approved after peer-to-peer review that involves significant administrative burden and delay in care. Only 3% prior-authorizations did not meet medical necessity criteria, major reasons being- PET/CT and CT CAP ordered in combination, or PET/CT ordered without clear justification. 2.46% prior-authorizations led to a patient receiving a letter of denial. SCCA and the payor agreed to eliminate prior-authorizations for all imaging (except PET and PET/CT). This required all ordering providers to attest to completion of training on the NCCN Imaging Appropriate Use Criteria. In addition, a quarterly internal audit was put in place to check provider compliance to NCCN guidelines for ordering Imaging tests. SCCA achieved a 100% provider training completion rate and 100% provider compliance to NCCN guidelines in the first two internal audits. Conclusions: A strong partnership and shared vision with a payor enabled us to eliminate wasteful prior-authorizations. Our high training completion rate and compliance rate implies strong support from our providers and leadership to provide value-based care to our patients.
APA, Harvard, Vancouver, ISO, and other styles
3

McLaughlin, Rob. "Authorizations for maritime law enforcement operations." International Review of the Red Cross 98, no. 902 (August 2016): 465–90. http://dx.doi.org/10.1017/s1816383117000340.

Full text
Abstract:
AbstractAlthough there are areas of uncertainty and overlap, authorizations for maritime law enforcement operations are beholden to a different regime from that which governs the conduct of armed conflict at sea. This article seeks to briefly describe five regularly employed authorizations for maritime law enforcement operations at sea: flag State consent, agreed pre-authorization, coastal State jurisdiction, UN Security Council resolutions, and the right of visit.
APA, Harvard, Vancouver, ISO, and other styles
4

Bargeron, Leonce, Alice Bonaime, and Shawn Thomas. "The Timing and Source of Long-Run Returns Following Repurchases." Journal of Financial and Quantitative Analysis 52, no. 2 (April 2017): 491–517. http://dx.doi.org/10.1017/s0022109017000084.

Full text
Abstract:
This paper investigates the timing and source of anomalous positive long-run abnormal returns following repurchase authorizations. Returns between program authorization and completion announcements are indistinguishable from 0. Abnormal returns occur onlyaftercompletion announcements. Long-run returns are largely attributable to announcement returns at subsequent authorizations and takeover attempts; that is, anomalous post-authorization returns are not persistent drifts but rather step functions. These findings have important implications for prior papers examining this most persistent and widespread anomaly. Further, our results serve to refocus the search for a rational explanation for the anomaly on subsequent repurchase announcements and takeover bids.
APA, Harvard, Vancouver, ISO, and other styles
5

Xu, Yang, Wuqiang Gao, Quanrun Zeng, Guojun Wang, Ju Ren, and Yaoxue Zhang. "A Feasible Fuzzy-Extended Attribute-Based Access Control Technique." Security and Communication Networks 2018 (June 5, 2018): 1–11. http://dx.doi.org/10.1155/2018/6476315.

Full text
Abstract:
Attribute-based access control (ABAC) is a maturing authorization technique with outstanding expressiveness and scalability, which shows its overwhelmingly competitive advantage, especially in complicated dynamic environments. Unfortunately, the absence of a flexible exceptional approval mechanism in ABAC impairs the resource usability and business time efficiency in current practice, which could limit its growth. In this paper, we propose a feasible fuzzy-extended ABAC (FBAC) technique to improve the flexibility in urgent exceptional authorizations and thereby improving the resource usability and business timeliness. We use the fuzzy assessment mechanism to evaluate the policy-matching degrees of the requests that do not comply with policies, so that the system can make special approval decisions accordingly to achieve unattended exceptional authorizations. We also designed an auxiliary credit mechanism accompanied by periodic credit adjustment auditing to regulate expediential authorizations for mitigating risks. Theoretical analyses and experimental evaluations show that the FBAC approach enhances resource immediacy and usability with controllable risk.
APA, Harvard, Vancouver, ISO, and other styles
6

Vandenberghe, Karolien. "Dual-Use Regulation 2021/821: What’s Old & What’s New in EU Export Control." Global Trade and Customs Journal 16, Issue 9 (September 1, 2021): 479–88. http://dx.doi.org/10.54648/gtcj2021053.

Full text
Abstract:
Regulation 2021/821 of 20 May 2021, which sets up a European Union (EU) regime for the control of exports, brokering, technical assistance, transit, and transfer of dual-use items, enters into force on 9 September 2021. While the main features of the EU’s dual-use regime remain the same, Regulation 2021/821 introduces some novelties. Export control is extended to technical assistance. Member States are granted more options to use local controls applicable to non-listed items, particularly in the case of cyber-surveillance items being used for repression or serious human rights violations, and generally in the case of a Member State creating national controls. In addition to the new authorization for large projects, two new EU authorizations are created: the intra-group software authorization (EU007) and the encryption authorization (EU008). The role of an internal compliance program (ICP), now clearly defined, is strengthened: an ICP is a legal necessity for holders of general global export authorizations and for applicants of the intra-group export of software and technology authorization. Finally, administrative provisions are added to improve cooperation between customs authorities and dual-use authorities at the national level, as well as to improve the exchange of information among the Member States, including with regard to the coordination of enforcement, at EU level. Dual-Use, EU Export Control, Regulation 428/2009, Regulation 2021/821
APA, Harvard, Vancouver, ISO, and other styles
7

Hugo, Audra, Daniella Pena, Emily Meichun Ko, Ashley Ford Haggerty, and Anna Jo Bodurtha Smith. "Prior authorizations for PARP inhibitors in ovarian cancer." Journal of Clinical Oncology 40, no. 16_suppl (June 1, 2022): 5549. http://dx.doi.org/10.1200/jco.2022.40.16_suppl.5549.

Full text
Abstract:
5549 Background: PARP inhibitors improve survival in ovarian cancer, especially in patients with BRCA 1/2 mutations or homologous recombination deficiency (HRD). However, these FDA-approved drugs cost $100,000 annually on average, and concerns have been raised about insurance barriers like prior authorization to such medications. Our objective was to examine the prevalence of prior authorization for PARP inhibitors in ovarian cancer overall, by frontline or recurrent maintenance, and by genetic status. Methods: We performed a retrospective cross-sectional study of ovarian cancer patients prescribed a PARP inhibitor within the University of Pennsylvania oncology practices from May 2020-2021. Using electronic medical records, we assessed the prevalence of prior authorization for PARP inhibitors overall, by frontline or recurrent maintenance, and by BRCA or HRD status. We then assessed the associated approval and appeal rates. Results: We identified 110 patients with ovarian cancer who were prescribed a PARP inhibitor. Of these, 67% (95%CI 57-75) experienced prior authorization for their PARP inhibitor. In contrast, 31 (95%CI 23-40) experienced prior authorization for other components of their gynecologic oncology care. Of patients in the frontline setting, 74 (95%CI 58-86) experienced prior authorization for FDA-approved PARP maintenance. Of patients prescribed PARP maintenance after recurrence, 58 (95%CI 45-71) experienced prior authorization. Of patients with germline BRCA, 70% (95%CI 47-85) experienced prior authorization for PARP inhibitors. Of patients with germline or somatic BRCA or HRD+, 76% (95%CI 61-87) experienced prior authorization. 95% (95%CI 86-94) of prior authorizations for PARP inhibitors were approved on their 1st appeal, and 99% (95%CI 95-100) were approved by the 2nd appeal. Conclusions: Two-thirds of patients of ovarian cancer patients who were prescribed PARP inhibitor experienced prior authorization, including equally high rates among women with germline or somatic BRCA mutations, as well as with HRD-deficient tumors. Given the nearly 100% approval after prior authorization, improvements in insurance processes are needed to streamline PARP inhibitor access in ovarian cancer.
APA, Harvard, Vancouver, ISO, and other styles
8

Hugo, Audra, Daniella Pena, Emily Meichun Ko, Ashley Ford Haggerty, and Anna Jo Bodurtha Smith. "Prior authorizations for PARP inhibitors in ovarian cancer." Journal of Clinical Oncology 40, no. 16_suppl (June 1, 2022): 5549. http://dx.doi.org/10.1200/jco.2022.40.16_suppl.5549.

Full text
Abstract:
5549 Background: PARP inhibitors improve survival in ovarian cancer, especially in patients with BRCA 1/2 mutations or homologous recombination deficiency (HRD). However, these FDA-approved drugs cost $100,000 annually on average, and concerns have been raised about insurance barriers like prior authorization to such medications. Our objective was to examine the prevalence of prior authorization for PARP inhibitors in ovarian cancer overall, by frontline or recurrent maintenance, and by genetic status. Methods: We performed a retrospective cross-sectional study of ovarian cancer patients prescribed a PARP inhibitor within the University of Pennsylvania oncology practices from May 2020-2021. Using electronic medical records, we assessed the prevalence of prior authorization for PARP inhibitors overall, by frontline or recurrent maintenance, and by BRCA or HRD status. We then assessed the associated approval and appeal rates. Results: We identified 110 patients with ovarian cancer who were prescribed a PARP inhibitor. Of these, 67% (95%CI 57-75) experienced prior authorization for their PARP inhibitor. In contrast, 31 (95%CI 23-40) experienced prior authorization for other components of their gynecologic oncology care. Of patients in the frontline setting, 74 (95%CI 58-86) experienced prior authorization for FDA-approved PARP maintenance. Of patients prescribed PARP maintenance after recurrence, 58 (95%CI 45-71) experienced prior authorization. Of patients with germline BRCA, 70% (95%CI 47-85) experienced prior authorization for PARP inhibitors. Of patients with germline or somatic BRCA or HRD+, 76% (95%CI 61-87) experienced prior authorization. 95% (95%CI 86-94) of prior authorizations for PARP inhibitors were approved on their 1st appeal, and 99% (95%CI 95-100) were approved by the 2nd appeal. Conclusions: Two-thirds of patients of ovarian cancer patients who were prescribed PARP inhibitor experienced prior authorization, including equally high rates among women with germline or somatic BRCA mutations, as well as with HRD-deficient tumors. Given the nearly 100% approval after prior authorization, improvements in insurance processes are needed to streamline PARP inhibitor access in ovarian cancer.
APA, Harvard, Vancouver, ISO, and other styles
9

Maerki, Ulrich, Albert Walther, and Walter Rossbach. "Computerized ordering of experimental animals and test authorization." Laboratory Animals 24, no. 1 (January 1, 1990): 25–31. http://dx.doi.org/10.1258/002367790780890266.

Full text
Abstract:
The authorization procedure required by law in Switzerland and the internal set-up at Roche for acquiring experimental animals has made a computerized system for monitoring authorizations and animal deliveries essential. The INQUIRE software program, which can be run on the central computer, was used to set-up databases with information on all personnel who place orders and perform experiments (PERI), authorization matters (BEWI), orders (ORDR), deliveries (SPED), animal species (SPEC), animal strains (STRE), populations (POPU) and the management of various data (BARA). The authorizations database (BEWI) permits sequential searches on specific questions. The animals ordered in the ORDR database are constantly updated in BEWI, thus ensuring that the authorized animal quotas are not exceeded. Expiry of an authorization or an unregistered experimenter will come to light in the course of the plausibility study. Through ORDR the experimenter has a good overview of the animals that he has ordered or have been ordered for him, and he can select the most appropriate strain or population for his studies in STRE or POPU, which contain data on the genetic and physiological characteristics as well as the breeding and keeping of all sublines and stocks. Realization of the IFIS project has made it a simple matter to keep a check on the legal requirements pertaining to animal experimentation and to update the information and evaluate the entire stock of data at any time.
APA, Harvard, Vancouver, ISO, and other styles
10

Forrester, Caroline. "Benefits of Prior Authorizations." Journal of Managed Care & Specialty Pharmacy 26, no. 7 (July 2020): 820–22. http://dx.doi.org/10.18553/jmcp.2020.26.7.820.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Van Maldegem, Koen. "The Biocidal Products Directive." European Energy and Environmental Law Review 7, Issue 10 (October 1, 1998): 261–68. http://dx.doi.org/10.54648/eelr1998042.

Full text
Abstract:
A more detailed review of the provisions of the Biocidal Products Directive than that appearing at [1998] EELR 204. The position in the Member States. The background to the Directive. Scope; definitions. Procedures for EU authorizations of active substances and for Member State authorizations of products containing active substances; data to be included in application dossiers - basic and specific data. Procedure for the inclusion of an active substance in Annex I, I A or IB: who may apply; the dossier on the active substance and on at least one product containing the active substance; evaluation by the reviewing Member State - completeness check, evaluation, report; Commission proposal and decision on the application; duration and renewal of listing; terms of listing; consequences of refusal of an application. Comparative assessment of active substances leading to refusal of listing or de-listing of an active substance where an alternative substance, posing less risk, is already listed - a shift from risk assessment to risk management; proposed technical guidance on comparative assessment. Product authorization by Member States. Mutual recognition of product authorizations; procedure; refusal to grant mutual recognition; recognition subject to restrictions; modifications to original authorization. Technical aspects: principles for the evaluation of active substances and products; extensive data requirements; risk assessment based on the identification of hazards, assessment of exposure and likelihood that hazards will arise. Classification, packaging, labelling and safety data sheets in respect of biocidal products and active substances. The expense of meeting the data requirements for listing; confidentiality to be observed by the competent authorities if so requested by the applicant; justification for such a request; data protection and its consequences; differences between confidentiality and data protection; periods of data protection; access to the data of other applicants by agreement. "Task forces" and cooperation in the use and development of data - advantages and disadvantages. Ten-year transitional period and review of existing active substances; Enforcement by the Member States; their discretion; interpretation of the Directive, which is based on Article 100(a), EC Treaty (the internal market).
APA, Harvard, Vancouver, ISO, and other styles
12

Li, Pei Wu. "The Research of Temporal-Based Authorization for Group-Centric Secure Information Sharing." Advanced Materials Research 143-144 (October 2010): 1223–27. http://dx.doi.org/10.4028/www.scientific.net/amr.143-144.1223.

Full text
Abstract:
In this paper, we propose a temporal-based aythorization model for Group-centric Secure Information Sharing(g-SIS) . The traditional approach to information sharing focuses on attaching attributes and policies to an object as it is disseminated from producer to consumers in a system. In contrast, group-centric sharing brings subjects and objects together in a group to facilitate sharing. In such contexts, authorizations are influenced by the temporal ordering of subject and object group membership. That is, the authorizations are decided by the time that subject joins group and the time that object is added to group. But, the model doesn’t consider the time constraint of group enabling and access enabling. For example, a secure meeting room is open only at 8:00—10:00 am and 15:00—17:00 pm every Monday. We develop a temporal-based authorization model for group-centric information sharing which takes the temporal intervals of group and access enabling into consideration. We also discuss a usage scenario to illustrate practical application in secure meeting system.
APA, Harvard, Vancouver, ISO, and other styles
13

Sciberras, Josette, Raymond Zammit, and Patricia Vella Bonanno. "The European framework for intellectual property rights for biological medicines." Generics and Biosimilars Initiative Journal 10, no. 4 (December 15, 2021): 172–83. http://dx.doi.org/10.5639/gabij.2021.1004.022.

Full text
Abstract:
Introduction: The Pharmaceutical Strategy for Europe (2020) proposes actions related to intellectual property (IP) rights as a means of ensuring patients’ access to medicines. This review aims to describe and discuss the European IP framework and its impact on accessibility of biological medicines and makes some recommendations. Methods: A non-systematic literature review on IP for biological medicines was conducted. Data on authorizations and patent and exclusivity expiry dates of biological medicines obtained from the European Medicines Agency’s (EMA) website and literature was analysed quantitatively and qualitatively. Results: The analysis showed that as at end July 2021, 1,238 medicines were authorized in Europe, of which 332 (26.8%) were biological medicines. There were only 55 biosimilars for 17 unique biologicals. There is an increasing trend in biological authorizations but signifi cant delays in submission of applications for marketing authorization of biosimilars, with no signifi cant diff erences in the time for assessment for marketing authorization between originator biologicals and biosimilars. For some of the more recent biosimilars, applications for authorization were submitted prior to patent and exclusivity expiry. COVID vaccines confi rmed the impact of knowledge transfer on accessibility, especially when linked to joint procurement. Discussion: IP protects originator products and impacts the development of biosimilars. Strategies to improve competition in the EU biological market are discussed. Pricing policies alone do not increase biosimilar uptake since patients are switched to second generation products. Evergreening strategies might be abusing the IP framework, and together with trade secrets and disproportionate prices compared to R & D and manufacturing costs lead to an imbalance between market access and innovation. Conclusion: The European Pharmaceutical Strategy should focus on IP initiatives that support earlier authorization of biosimilars of new biologicals. Recommendations include knowledge sharing, simplifi cation of the regulatory framework and transparency of prices and R & D costs.
APA, Harvard, Vancouver, ISO, and other styles
14

Li, Cheng, Zhiyong Zhang, and Lanfang Zhang. "A Novel Authorization Scheme for Multimedia Social Networks Under Cloud Storage Method by Using MA-CP-ABE." International Journal of Cloud Applications and Computing 8, no. 3 (July 2018): 32–47. http://dx.doi.org/10.4018/ijcac.2018070103.

Full text
Abstract:
This article finds that with the development of network technology and the change of a users' social habits, the existing multimedia social network, whether it is one-to-one authorization or one-to-many authorization, are having difficulty meeting the needs of users and cloud storage service. In order to solve this problem, this article proposes a new authorization scheme of multimedia community, based on attribute encryption. Use MA-CP-ABE solution to enhance system service efficiency. This program contributes to two aspects: (1) combining user trust with attribute-based authorizations, and (2) enhancing the flexibility and security of the solution. The scheme has been applied in the prototype system and achieved good results. Results prove that the program has good application value for cloud storage technology, IoT and many other fields.
APA, Harvard, Vancouver, ISO, and other styles
15

GRIMALDI, PAUL L. "Manage Authorizations to Manage Care." Nursing Management (Springhouse) 27, no. 4 (April 1996): 49???51. http://dx.doi.org/10.1097/00006247-199604000-00015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Kaufman, L. S., and C. S. Snoddy. "Clinical Study Authorizations: Development Strategies." Drug Information Journal 24, no. 3 (July 1990): 549–59. http://dx.doi.org/10.1177/009286159002400313.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Wilens, Timothy E., Kai Wilens, K. Yvonne Woodworth, Victoria Chippari, and Elizabeth S. Firmin. "Prior Authorizations: A Necessary Evil?" Journal of the American Academy of Child & Adolescent Psychiatry 59, no. 9 (September 2020): 1005–7. http://dx.doi.org/10.1016/j.jaac.2020.06.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Carlini, Beatriz H., Sharon B. Garrett, and Gregory T. Carter. "Medicinal Cannabis." American Journal of Hospice and Palliative Medicine® 34, no. 1 (July 11, 2016): 85–91. http://dx.doi.org/10.1177/1049909115604669.

Full text
Abstract:
Introduction: Washington State allows marijuana use for medical (since 1998) and recreational (since 2012) purposes. The benefits of medicinal cannabis (MC) can be maximized if clinicians educate patients about dosing, routes of administration, side effects, and plant composition. However, little is known about clinicians’ knowledge and practices in Washington State. Methods: An anonymous online survey assessed providers’ MC knowledge, beliefs, clinical practices, and training needs. The survey was disseminated through health care providers’ professional organizations in Washington State. Descriptive analysis compared providers who had and had not authorized MC for patients. Survey results informed the approach and content of an online training on best clinical practices of MC. Results: Four hundred ninety-four health care providers responded to the survey. Approximately two-third were women, aged 30 to 60 years, and working in family or internal medicine. More than half of the respondents were legally allowed to write MC authorizations per Washington State law, and 27% of those had issued written MC authorizations. Overall, respondents reported low knowledge and comfort level related to recommending MC. Respondents rated MC knowledge as important and supported inclusion of MC training in medical/health provider curriculum. Most Washington State providers have not received education on scientific basis of MC or training on best clinical practices of MC. Clinicians who had issued MC authorizations were more likely to have received MC training than those who had not issued MC authorization. Discussion: The potential of MCs to benefit some patients is hindered by the lack of comfort of clinicians to recommend it. Training opportunities are badly needed to address these issues.
APA, Harvard, Vancouver, ISO, and other styles
19

Zendeli, Emine. "The right to dispose of an item of property acquired in marriage." SEEU Review 11, no. 2 (December 1, 2015): 81–93. http://dx.doi.org/10.1515/seeur-2015-0030.

Full text
Abstract:
Abstract This research article analyzes the right of disposal of marital property in relation to the undertaking of those legal actions that imply the highest authorizations that legal subjects can have over things. Having in consideration the fact that according to the legislation in the Republic of Macedonia, marital property is joint as are the authorizations of spouses over their joint items, it is important to determine the extent of the disposal, i.e. who disposes of the items of the joint property and to what extent. Referring to the normative framework, which regulates disposal relations of spouses, the article emphasizes the concept and importance of the authorization of disposal of things (alienation or assignment of things from joint ownership), through legal activities (sale, donation, exchange, etc.). In this context, the article tends to draw a divisive line between the administration with the joint item, referring to continuative actions and measures and the disposal of the thing, which is not continuative but, due to legal consequences it causes, has great importance in practice, and as a result, enjoys greater attention in legislators in terms of its limitation compared to the acts of administration with joint items in marriage.
APA, Harvard, Vancouver, ISO, and other styles
20

Boyd, Monica, Chris Taylor, and Paul Delaney. "Temporary Workers in Canada: A Multifaceted Program." International Migration Review 20, no. 4 (December 1986): 929–50. http://dx.doi.org/10.1177/019791838602000410.

Full text
Abstract:
This article highlights important developments in the character of temporary worker flows to Canada between 1973 and 1985 through the use of unpublished data and new measures for analyzing this data. The number of employment authorizations are converted to person years to indicate the overall labor market impact of temporary worker flows and this measure is employed in an analysis of unpublished data from Employment and Immigration Canada. The analysis reveals that a significant and growing proportion of employment authorizations are exempted from governmental procedures which link the admission of temporary workers to the Canadian labor market. In many cases, these exempt documents are being authorized for social and humanitarian programs (e.g., refugee claimants, in-Canada immigrant claimants). As a result, the actual “labor recruitment” component of these authorizations is considerably less than interpreted from published statistics of employment authorizations. The policy implications of these findings are discussed.
APA, Harvard, Vancouver, ISO, and other styles
21

Hiers, Richard H. ""Binding" and "Loosing": The Matthean Authorizations." Journal of Biblical Literature 104, no. 2 (June 1985): 233. http://dx.doi.org/10.2307/3260965.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

De Capitani di Vimercati, Sabrina, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, and Pierangela Samarati. "Enforcing authorizations while protecting access confidentiality1." Journal of Computer Security 26, no. 2 (January 8, 2018): 143–75. http://dx.doi.org/10.3233/jcs-171004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Ghilezan, Silvia, Svetlana Jakšić, Jovanka Pantović, Jorge A. Pérez, and Hugo Torres Vieira. "A Typed Model for Dynamic Authorizations." Electronic Proceedings in Theoretical Computer Science 203 (February 10, 2016): 73–84. http://dx.doi.org/10.4204/eptcs.203.6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Gupta, Sugandha, and Yashu Ahuja. "Review of Red Tacton: Evolving Authorizations." International Journal of Computer Trends and Technology 19, no. 2 (January 25, 2015): 99–101. http://dx.doi.org/10.14445/22312803/ijctt-v19p118.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Hall, Thad. "Steering Agencies with Short-Term Authorizations." Public Administration Review 68, no. 2 (March 2008): 366–79. http://dx.doi.org/10.1111/j.1540-6210.2007.00868.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Rogers, Andrew T., Brittany Sutherland, and Manisha J. Loss. "Prior Authorizations for Diagnostic Skin Biopsies." JAMA Dermatology 153, no. 11 (November 1, 2017): 1091. http://dx.doi.org/10.1001/jamadermatol.2017.3516.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Ruan, Chun. "Designing and evaluating weighted delegatable authorizations." Concurrency and Computation: Practice and Experience 27, no. 15 (April 29, 2015): 3877–91. http://dx.doi.org/10.1002/cpe.3493.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Jayaraman, Narayanan, and Thomas Noe. "Stock authorizations: A sequential equilibrium analysis." Review of Quantitative Finance and Accounting 1, no. 4 (December 1991): 383–97. http://dx.doi.org/10.1007/bf02408398.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Prokić, Ivan, Jovanka Pantović, and Hugo Torres Vieira. "A calculus for modeling floating authorizations." Journal of Logical and Algebraic Methods in Programming 107 (October 2019): 136–74. http://dx.doi.org/10.1016/j.jlamp.2019.06.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Ma, Ke, and Geng Yang. "RTBAC: A Risk-Aware Topic-Based Access Control Model for Text Data with Paragraph-Level Authorization." Security and Communication Networks 2022 (May 5, 2022): 1–18. http://dx.doi.org/10.1155/2022/3371688.

Full text
Abstract:
Granting users precise access rights is one of the purposes of access control technologies. With the increasing requirements of fine-grained authorization, too strict or too loose access control models may cause many problems. In this paper, aiming at insufficient authorizations in text databases, we propose a risk-aware topic-based access control (RTBAC) model, which uses topics to represent the content relationships between users and data. The RTBAC model also uses risk technologies to grant users corresponding access rights based on their historical behaviours and their access requests. The RTBAC model is a fine-grained access control model, and the authorization of RTBAC can reach the paragraph level. Experimental results show that RTBAC is an efficient access control model and the access control granularity of the RTBAC model is more than 3 times that of the existing content-based access control models.
APA, Harvard, Vancouver, ISO, and other styles
31

Fruscione, Alessandro. "Dual Use Items: A Whole New Export Regulation in the European Union." Global Trade and Customs Journal 17, Issue 3 (March 1, 2022): 136–40. http://dx.doi.org/10.54648/gtcj2022018.

Full text
Abstract:
On 9 September 2021, Regulation (EU) no. 821/2021, of the European Parliament and of the Council, of 20 May 2021, relating to the control of exports, brokering, technical assistance, transit and transfer of dual-use items, i.e., all those products, including software and technologies, which can be used for both civil and military purposes, came into effect. The new Regulation has as its main objective (see in particular ‘Whereas (5)’ in the preamble to the Regulation) that of making the common system for the control of exports of dual-use items even more effective, to ensure compliance with the commitments and responsibilities of the Member States and of the Union, particularly in the fields of non-proliferation, regional peace, security and stability and respect for human rights and international humanitarian law. For these purposes, the definitions of ‘dual-use products’ and ‘exporter’ have been expanded and, moreover, a specific Article (8) is dedicated to the issue of technical assistance, which in the previous Regulation (428/2009) was covered exclusively in certain explanatory notes in the Annexes. The changes in this Regulation also concern the authorizations for the export from the European Union of ‘dual-use’ goods: a whole new ‘large project authorization’ (Article 2 (14) of the Regulation) has been created, which consists of an individual export authorization or a global export authorization granted to one specific exporter for a type or category of dual-use items, which may be valid for exports to one or more specific end-users in one or more specified third countries for the purpose of a specified large-scale project. This permission can relate to intra-group technology transfers and cryptography. Also with regard to the procedures for the export of dual-use items, the European Union decided to make use of the ‘Internal Compliance Programmes’, already present in other legislative sectors of the Union. Dual use export controls, authorizations, civil, military, technologies, compliance, exportation, controls, Regulation
APA, Harvard, Vancouver, ISO, and other styles
32

BAI, YUN, and YAN ZHANG. "ARTIFICIAL INTELLIGENCE IN DATABASE SECURITY." International Journal of Pattern Recognition and Artificial Intelligence 18, no. 01 (February 2004): 3–17. http://dx.doi.org/10.1142/s0218001404003022.

Full text
Abstract:
In this paper, we propose a formal approach of Artificial Intelligence (AI) in securing object oriented database systems. We combine the specification of object oriented database with security policies and provide its formal syntax and semantics. The properties in the inheritance of authorizations in object oriented database system and reasoning about authorizations on data objects are also investigated in detail.
APA, Harvard, Vancouver, ISO, and other styles
33

Jones, Nancy, and Jim Mensching. "A Segregation of Duties Case Study in the Purchase-to-Pay Process with an SAP Example." AIS Educator Journal 2, no. 1 (January 1, 2007): 1–21. http://dx.doi.org/10.3194/aise.2007.2.1.1.

Full text
Abstract:
Abstract With the advent of legislation dealing with financial responsibility and information assurance, the topic of segregation of duties has gained additional importance. Recent studies have found that segregation of duties is one of the areas in which companies have frequently disclosed material internal control weaknesses under reporting requirements of the Sarbanes-Oxley Act of 2002. This is a case assignment that develops both the theoretical base for segregation of duties and then illustrates how this is accomplished in a highly integrated computerized enterprise business environment. The authorization system within the SAP R/3 system is used to illustrate the implementation of segregated duties in one type of ERP system. There are four steps to the case: assessing risks of the business process, defining positions within the organization to handle a set of defined tasks, developing an authorization matrix for designated employees, and examining the SAP authorizations system.
APA, Harvard, Vancouver, ISO, and other styles
34

Blokker, Niels. "Abuse of the Members: Questions concerning Draft Article 16 of the Draft Articles on Responsibility of International Organizations." International Organizations Law Review 7, no. 1 (2010): 35–48. http://dx.doi.org/10.1163/157237310x523849.

Full text
Abstract:
AbstractThis contribution discusses Article 16 (“Decisions, authorizations and recommendations addressed to member states and international organizations”) of the ILC draft articles on responsibility of international organizations, completed in first reading in 2009. According to Article 16, international organizations may incur international responsibility for their binding and non-binding decisions if certain conditions are fulfilled. The main rationale of this provision is that an international organization may not require its members to perform acts which the organization itself may not perform under its own obligations. The need to include this provision in the draft articles is not questioned. Five specific issues are addressed. The provision concerning authorizations may in the future turn out to be the most troublesome, in particular in relation to Security Council authorizations for the use of force.
APA, Harvard, Vancouver, ISO, and other styles
35

Sun, Wei, Shiwei Wei, Huaping Guo, and Hongbing Liu. "Role-Mining Optimization with Separation-of-Duty Constraints and Security Detections for Authorizations." Future Internet 11, no. 9 (September 19, 2019): 201. http://dx.doi.org/10.3390/fi11090201.

Full text
Abstract:
Role-based access control (RBAC), which has been regarded as one of the most popular access-control mechanisms, is featured by the separation-of-duty constraints, mutually exclusive constraints, and the least-privileges principle. Role mining, a bottom-up role-engineering technology, is an effective method to migrate from a non-RBAC system to an RBAC system. However, conventional role-mining approaches not only do not consider the separation of duty constraints, but also cannot ensure the security of a constructed RBAC system when the corresponding mined results violate the separation of a duty constraint and/or the least-privileges principle. To solve these problems, this paper proposes a novel method called role-mining optimization with separation-of-duty constraints and security detections for authorizations (RMO_SODSDA), which mainly includes two aspects. First, we present a role-mining-optimization approach for satisfying the separation of duty constraints, and we constructed different variants of mutually exclusive constraints to correctly implement the given separation of duty constraints based on unconstrained role mining. Second, to ensure the security of the constructed system and evaluate authorization performance, we reduced the authorization-query problem to a maximal-satisfiability problem. The experiments validate the effectiveness and efficiency of the proposed method.
APA, Harvard, Vancouver, ISO, and other styles
36

Sweeney, Joey. "Prior authorizations limit patients’ access to medications." Pharmacy Today 22, no. 6 (June 2016): 2. http://dx.doi.org/10.1016/j.ptdy.2016.05.033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Samarati, Pierangela, Paul Ammann, and Sushil Jajodia. "Maintaining replicated authorizations in distributed database systems." Data & Knowledge Engineering 18, no. 1 (February 1996): 55–84. http://dx.doi.org/10.1016/0169-023x(95)00000-i.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Leibundgut, Brice G. "Re-assignment and consolidation of credit authorizations." European Journal of Operational Research 30, no. 1 (June 1987): 35–41. http://dx.doi.org/10.1016/0377-2217(87)90008-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Wilenius, Heikki. "Lectio Praecursoria: Routine work: Authorizing representation in East Javanese regional politics." Suomen Antropologi: Journal of the Finnish Anthropological Society 45, no. 2 (March 17, 2021): 35–40. http://dx.doi.org/10.30676/jfas.v45i2.100381.

Full text
Abstract:
This lectio summarizes a PhD study of the public activities of East Javanese regional councillors. Analysing the communication of these politicians, the thesis focuses on the ways they authorize their status as representatives of their constituency. The study finds that politics in East Java has a wide selection of authorizations, the use of which depends on the party, the political history, the age, and the gender of the politician. For the councillor, the most decisive factor for the choice of authorizations, however, is the political context. Different public institutions of politics are examined: meetings with the constituency during council recess, public hearings on draft bylaws, election campaign events, and regional council plenary sessions. The authorizations used in these contexts vary greatly, for example, concerning their aspect of ritualization, style of oratory, or way of evidence presented. Keywords: Indonesia, East Java, politics, communication, semiotic ideology, democracy, hierarchy
APA, Harvard, Vancouver, ISO, and other styles
40

Macedo, Juliana Lopes de. "The multiple meanings of 'risk': views on the abortion of non-viable fetuses among Brazilian medical doctors and magistrates." Vibrant: Virtual Brazilian Anthropology 12, no. 1 (June 2015): 204–30. http://dx.doi.org/10.1590/1809-43412015v12n1p204.

Full text
Abstract:
The article seeks to understand the conceptions of 'risk' produced in the medical field as they come to be interpreted in the legal field. It draws on legal decisions concerning authorization for aborting fetuses bearing anomalies incompatible with life, and on non-directive interviews with medical doctors and magistrates. The category of 'risk' was found to be subject to considerable manipulation by both doctors and magistrates in being deployed as moral justification for the abortion of non-viable fetuses. Abortion is thus displaced from the sphere of individual choice to the domain of therapeutic abortion. The article also highlights the polyvalence of risk discourse, since this notion is deployed both to affirm and to deny legal authorizations for abortion, and to attribute responsibility for abortion decisions to doctors.
APA, Harvard, Vancouver, ISO, and other styles
41

Stoimenova, Assena, Bogdan Kirilov, and Krassimira Zaykova. "Analysis of good distribution practice inspection deficiency data of pharmaceutical wholesalers in Bulgaria." Pharmacia 66, no. 3 (October 10, 2019): 85–89. http://dx.doi.org/10.3897/pharmacia.66.e35880.

Full text
Abstract:
The current study analyses the regulatory inspection findings of the wholesalers in Bulgaria in 2017 and compares the results with the findings from some other EU member-states. In total, 48 GDP inspections were performed in 2017. 50% of the inspections were performed in relation with issuing an authorization for wholesale of medicines, the rest half were related to changes in already granted authorizations. During the inspections, 17 non-conformities (NCs) have been documented. The NCs were identified in 3 wholesalers and 6 deficiencies were classified as major. No critical deficiencies were found. NCs were found in 6.25% of the inspected companies. No critical NCs were identified and only 6 NCs were classified as major which demonstrated high level of compliance of distributions sites in Bulgaria with the requirements of GDP.
APA, Harvard, Vancouver, ISO, and other styles
42

Li, Na. "Efficient Equality Test on Identity-Based Ciphertexts Supporting Flexible Authorization." Entropy 25, no. 2 (February 15, 2023): 362. http://dx.doi.org/10.3390/e25020362.

Full text
Abstract:
In the cloud, uploading encrypted data is the most effective way to ensure that the data are not leaked. However, data access control is still an open problem in cloud storage systems. To provide an authorization mechanism to limit the comparison of a user’s ciphertexts with those of another, public key encryption supporting the equality test with four flexible authorizations (PKEET-FA) is presented. Subsequently, more functional identity-based encryption supporting the equality test (IBEET-FA) further combines identity-based encryption with flexible authorization. The bilinear pairing has always been intended to be replaced due to the high computational cost. Hence, in this paper, we use general trapdoor discrete log groups to construct a new and secure IBEET-FA scheme, which is more efficient. The computational cost for the encryption algorithm in our scheme was reduced to 43% of that of the scheme of Li et al. In Type 2 and 3 authorization algorithms, the computational cost of both was reduced to 40% of that of the scheme of Li et al. Furthermore, we give proof that our scheme is secure against one-wayness under the chosen identity and chosen ciphertext attacks (OW-ID-CCA), and indistinguishable against chosen identity and chosen ciphertext attacks (IND-ID-CCA).
APA, Harvard, Vancouver, ISO, and other styles
43

Castano, S., S. De Capitani di Vimercati, and M. G. Fugini. "Automated derivation of global authorizations for database federations." Journal of Computer Security 5, no. 4 (October 1, 1997): 271–301. http://dx.doi.org/10.3233/jcs-1997-5402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Muzumdar, Sonal, Jane M. Grant-Kels, and Hao Feng. "The ethics of charging patients for prior authorizations." Journal of the American Academy of Dermatology 82, no. 6 (June 2020): 1574–75. http://dx.doi.org/10.1016/j.jaad.2020.01.060.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Wang, Hua, Jinli Cao, and Yanchun Zhang. "Delegating revocations and authorizations in collaborative business environments." Information Systems Frontiers 11, no. 3 (May 23, 2008): 293–305. http://dx.doi.org/10.1007/s10796-008-9091-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Thomson, Kyle, and Herschel Nachlis. "Emergency Use Authorizations During the COVID-19 Pandemic." JAMA 324, no. 13 (October 6, 2020): 1282. http://dx.doi.org/10.1001/jama.2020.16253.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Rubin, Rita. "More Transparency Needed for COVID-19 Emergency Authorizations." JAMA 324, no. 24 (December 22, 2020): 2475. http://dx.doi.org/10.1001/jama.2020.24201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Manciaux, Sébastien. "Big Pharma and Investment Arbitration." Vietnamese Journal of Legal Sciences 4, no. 1 (June 1, 2021): 88–114. http://dx.doi.org/10.2478/vjls-2021-0010.

Full text
Abstract:
Abstract Investment Arbitration in the pharmaceutical sector raises some specificities. Regarding jurisdiction of arbitral tribunals, it is questionable whether the registration of a patent abroad or a patent license granted to a foreign partner constitutes an investment. Similarly, as health products are not ordinary goods, arguments according to which marketing authorizations or monopolies granted constitute an investment are real issues. On the merits, the invalidation of a patent, the refusal or withdrawal of a marketing authorization or the decision of a state authority to end a monopoly can be analyzed as a violation of some of the commitments made by States in the treaties they conclude. The aim of this study is to address these questions thanks to the awards already rendered, making it a useful tool for countries -like Vietnam- that wish to develop their pharmaceutical sector by attracting foreign investors.
APA, Harvard, Vancouver, ISO, and other styles
49

Papa, Maria Irene. "Le autorizzazioni del Consiglio di sicurezza davanti alla Corte europea dei diritti umani: dalla decisione sui casi Behrami e Saramati alla sentenza Al-Jedda." DIRITTI UMANI E DIRITTO INTERNAZIONALE, no. 2 (July 2012): 229–62. http://dx.doi.org/10.3280/dudi2012-002001.

Full text
Abstract:
Four years after the highly criticized decision in Behrami and Saramati, on 7 July 2011 the European Court of Human Rights returned in Al-Jedda v. United Kingdom to the applicability of the European Convention on Human Rights to acts undertaken by military forces of Member States acting abroad under an authorization of the United Nations Security Council. The article examines the main implications of that case law by comparing how the Court addressed the following issues in Behrami and Saramati and in Al-Jedda: the legal nature of UNSC authorizations to states to use force; the attribution of conduct of military personnel in this kind of situations and the relationship between the European Convention and the UN collective security system. According to the author, the Al-Jedda judgment presents some elements of continuity with the Behrami and Saramati decision (such as the distinction among different models of UNSC authorization), but also significant developments (especially with regard to the possibility of dual attribution of conduct both to states and international organizations and to the interpretative presumption in favour of interpreting SC resolutions in conformity with human rights).
APA, Harvard, Vancouver, ISO, and other styles
50

Orlović, Slobodan, and Nataša Rajić. "Dissolution of parliament: Exercising or abusing of constitutional authorizations." Zbornik radova Pravnog fakulteta, Novi Sad 52, no. 4 (2018): 1545–57. http://dx.doi.org/10.5937/zrpfns52-20442.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography