共 50 条
- [2] User Profiling in Anomaly Detection of Authorization Logs COMPUTATIONAL SCIENCE AND TECHNOLOGY, 2019, 481 : 59 - 65
- [3] Authentication and Authorization of End User in Microservice Architecture 2017 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGY AND COMMUNICATION ENGINEERING (CTCE2017), 2017, 910
- [4] User's authorization in singularity operating system INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (02): : 439 - 445
- [5] Using Virtualization Technology for the User Authorization System SOFTWARE ENGINEERING TRENDS AND TECHNIQUES IN INTELLIGENT SYSTEMS, CSOC2017, VOL 3, 2017, 575 : 192 - 200
- [8] Authentication and authorization user management within a collaborative community PROCEEDING OF THE 11TH WSEAS INTERNATIONAL CONFERENCE ON COMPUTERS: COMPUTER SCIENCE AND TECHNOLOGY, VOL 4, 2007, : 563 - +
- [9] A study on secure user authentication and authorization in OAuth protocol CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1991 - 1999