Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Authorization" wg kryterium: Temat


Tytuł:
Analysis of selected aspects of mobile security on Android and Windows
Autorzy:
Tybura, M.
Powiązania:
https://bibliotekanauki.pl/articles/114329.pdf
Data publikacji:
2015
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
mobile
security
authorization
Opis:
The purpose of this work was to analyze built-in security and privacy protection methods in mobile devices such as smartphones and tablets with Windows and Android operating systems. It was performed only with default settings and without any external software such as antiviruses.
Źródło:
Measurement Automation Monitoring; 2015, 61, 9; 450-453
2450-2855
Pojawia się w:
Measurement Automation Monitoring
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Process of obtaining authorization for placing TSI-compliant railway vehicles in service in Poland
Autorzy:
Chojnacki, Andrzej
Powiązania:
https://bibliotekanauki.pl/articles/215646.pdf
Data publikacji:
2020
Wydawca:
Instytut Kolejnictwa
Tematy:
authorization
railway vehicles
Opis:
The article discusses the legal acts applicable to the process of obtaining authorization for placing TSI-compliant railway vehicles in service. The procedure in the case of applying for the first authorization for a railway vehicle is also outlined. The procedure concerning a vehicle that is authorized for placement in service in another Member State, but that will also be used in Poland, is presented, as well.
Źródło:
Problemy Kolejnictwa; 2020, 187; 81-85
0552-2145
2544-9451
Pojawia się w:
Problemy Kolejnictwa
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Las facultades para la confesión en el Código de Juan Pablo II
Authorization to Hear Confessions in the Code of Pope John Paul II
Autorzy:
Saj, Marek
Powiązania:
https://bibliotekanauki.pl/articles/1199318.pdf
Data publikacji:
2012
Wydawca:
Uniwersytet Papieski Jana Pawła II w Krakowie
Tematy:
Confession
authorization
ecclesiastical punishment
Opis:
According to the law of the Church, contained mainly in the Code of Canon Law, priests are entitled to certain rights and obligations arising from their Holy Orders. Some of them require also appropriate faculties in addition to the orders. This is the case in relation to the sacrament of penance and reconciliation. This so-called faculty is required in order to exercise this sacrament validly. The of such faculty causes the incurrence of ecclesiastical penalty of suspension latae sententiae. This text examines the norms of the Codex regarding the conferment of the faculty to administer the sacrament of penance, its use and the ecclesiastical penalties incurred for hearing confessions without such faculties.
Źródło:
The Person and the Challenges. The Journal of Theology, Education, Canon Law and Social Studies Inspired by Pope John Paul II; 2012, 2, 2; 207-221
2391-6559
2083-8018
Pojawia się w:
The Person and the Challenges. The Journal of Theology, Education, Canon Law and Social Studies Inspired by Pope John Paul II
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Integration with the software Interface of the com server for authorized user
Autorzy:
Ratov, Denis
Powiązania:
https://bibliotekanauki.pl/articles/1837795.pdf
Data publikacji:
2021
Wydawca:
Polskie Towarzystwo Promocji Wiedzy
Tematy:
automation controller
COM object
authorization
Opis:
The article is devoted to the development of a software controller for automation of access to tools and object model of the multifunctional graphic editor Adobe Photoshop. The work of the graphic editor is initiated in the form of a COM object, which contains methods available to the software controller through the COM interface, which allows the software to use the functionality of the editor. To restrict unauthorized access, a software authorization control protocol is proposed, which is based on the use of binding to the computer hardware and encryption by a 128-bit MD5 public key hashing algorithm.
Źródło:
Applied Computer Science; 2021, 17, 2; 5-13
1895-3735
Pojawia się w:
Applied Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Touch screen based user identification
Autorzy:
Tybura, M.
Szczepański, A.
Powiązania:
https://bibliotekanauki.pl/articles/114687.pdf
Data publikacji:
2015
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
security
authorization
touch screen
user recognition
Opis:
The main subject of this work was to find a new way of user identification based on his interactions with a touch screen of a detecting device such as smartphone, tablet or operating panel. The entire identification process was performed in implemented mobile software and the identification was based on certain mathematical criteria. No additional external device was connected to the portable device for user recognition process.
Źródło:
Measurement Automation Monitoring; 2015, 61, 12; 565-567
2450-2855
Pojawia się w:
Measurement Automation Monitoring
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Authentication and Authorization of Users and Services in Dynamic Military SOA Environments
Autorzy:
Jasiu, B.
Śliwa, J.
Piotrkowski, R.
Goniacz, R.
Powiązania:
https://bibliotekanauki.pl/articles/309558.pdf
Data publikacji:
2011
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
authentication
authorization
military networks
SOA
web services
Opis:
The problem of user authentication and authorization is usually being solved in a single system. Federated environment assumes heterogeneity of systems, which brings the problem of mutual users and services authentication and authorization. In this article the authors presented security requirements for cross domain information exchange in federated environments and a method of secure access to information resources on the basis of web services. Special attentionwas paid to authentication and authorization of users and services. As opportunities, there were presented solutions verified in multinational experimentations and exercises.
Źródło:
Journal of Telecommunications and Information Technology; 2011, 1; 54-61
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Proposal of a new method for e-banking authentication based on fingerprint reader
Autorzy:
Hłobaż, A.
Owsiński, K.
Powiązania:
https://bibliotekanauki.pl/articles/94793.pdf
Data publikacji:
2013
Wydawca:
Szkoła Główna Gospodarstwa Wiejskiego w Warszawie. Wydawnictwo Szkoły Głównej Gospodarstwa Wiejskiego w Warszawie
Tematy:
electronic banking
authorization codes
authorization
biometric data
fingerprint scanner
bankowość elektroniczna
kody autoryzacji
autoryzacja
dane biometryczne
skaner odcisków placów
Opis:
The paper presents a novel method/mechanism for electronic banking transactions authentication based on biometrics, using fingerprint reader. The method allows to identify the client not only by something that he has or knows, but who he is. Therefore, the proposed solution enhances security of transactions authentication by an additional factor of client identification - this kind of solution hasn't been currently used by banks in Poland so far. The article also presents that the application of an additional level of security is not associated with an increase of costs for banks but allows them to reduce them, especially for long-term relationships with customers.
Źródło:
Information Systems in Management; 2013, 2, 2; 136-145
2084-5537
2544-1728
Pojawia się w:
Information Systems in Management
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Intelligent touch based user authentication
Autorzy:
Mazur, D.
Tybura, M.
Powiązania:
https://bibliotekanauki.pl/articles/114728.pdf
Data publikacji:
2017
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
touch
mobile
authentication
authorization
SVM
kNN
kmeans
neural networks
Opis:
Many researches had shown that touch based authentication is something possible to implement in many devices. This research focuses mainly on making a progress in this field by using more advanced methods such as SVM, kNN, kmeans or neural networks in attempt to build system for both recognizing and learning user’s behavior.
Źródło:
Measurement Automation Monitoring; 2017, 63, 1; 20-23
2450-2855
Pojawia się w:
Measurement Automation Monitoring
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Поняття «політична репрезентація» в українському політологічному дискурсі
The concept of «political representation» in Ukrainian political science discourse
Autorzy:
Рудницький, Сергій
Powiązania:
https://bibliotekanauki.pl/articles/489518.pdf
Data publikacji:
2016
Wydawca:
Polskie Towarzystwo Naukowe w Żytomierzu
Tematy:
political representation representation of
representativeness legitimacy
representation mandate
authorization representative
Opis:
The term «representation» in Ukrainian political science and social philosophy is used only in relation to interest (interest representation means their presentation) and is one of the stages of its development. This concept occupies important place and has a long history of use in West political science. The term «representation» was already used in Roman law, in scientific discourse; it appeared in the writings of medieval theologians. Marsilius of Padua proposed the conception of people whose political representatives and executor of their will serve the elected officials. French thinkers Jean- Jacques Rousseau and Charles-Louis Montesquieu examined the representation in the context of popular sovereignty. The theory of political representation is developed with the beginning of the distribution in Europe of representative form of government, during the French Revolution. In the western scientific tradition classical representation is understood as a group of people chosen by elections, acting on behalf of another group (primarily people but also the territorial or ethnic community) institutionalized in government. The most common understanding of political representation is the parliament, but often political representation is understood as the electoral process. Meaningful side of the concept is ambiguous in various sciences, and even within a single scientific discipline. When defining the meaning of «political representation» competence approach is used, according to which representation is treated as a legal jurisdiction that allows the state to make a decision. Representation can also be understood as the right to unilateral government. Within the so-called sociological approach attention is paid not only to the chosen way of representative, but to the similarity of the representative to represent. The relationship between the representative and represented is constitutive feature of representation. The main mechanism of coordination and the will of the sovereign representative of the elections is a subsidiary of the institutions that articulate public opinion, especially political parties. Thus, the concept of «political representation» can be understood as a political institution that provides representation of a group of people (especially parliament); a state in which representative reflects the composition of society (a representative); compliance action representative expectations represented (legitimacy). The concept can also be understood as a process of obtaining right of representation, and the process of presenting someone in the political sphere. Choosing between existing interpretations of concepts we can make our own based on the Ukrainian scenario and interpret it as the phenomenon of presenting the subject in the political sphere. Political representation should also be understood as a principle of representation one entity by another entity, between which there is a connection with the direct absence represented in the political sphere. The author proposes to move away from the classical Western understanding of representative only as a representative body presenting the sovereign and proposes to include in the range of political representatives of all subjects receiving the mandate for representation of society or groups. The author believes that the subject of the representation is not only the people but also a smaller social group - ethnic, demographic or territorial, an individual can be represented in the political sphere. The scope (volume) of the subject representation can also vary; it can be understood wider concerning the political system, or narrower – concerning the part of political system: state, part of the state (Parliament), executive body. The nature and type of connection between the represented and representatives, mechanism of its coordination; method of representation mandate, and other phenomena related to political representation, depend on the nature of democracy. Acts of political representation relationship with the model of a political system that outlines the structure of institutions engaged in political representation sets the ratio between them regarding the scope of representation.
Źródło:
Studia Politologica Ucraino-Polona; 2016, 6; 228-237
2312-8933
Pojawia się w:
Studia Politologica Ucraino-Polona
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Alternatywne narzędzia zdalnej identyfikacji
Alternative tools of remote identification and authentication
Autorzy:
Lewandowski, Remigiusz
Powiązania:
https://bibliotekanauki.pl/articles/1879408.pdf
Data publikacji:
2021
Wydawca:
Agencja Bezpieczeństwa Wewnętrznego
Tematy:
biometria
identyfikacja
uwierzytelnienie
autoryzacja
tożsamość
biometrics
identification
authentication
authorization
identity
Opis:
W pracy przeanalizowano proces zdalnej identyfikacji w tej postaci, w jakiej jest on realizowany obecnie. Na tej podstawie zdiagnozowano najważniejsze słabe strony metod wykorzystywanych w tym procesie. W przypadku metod niebiometrycznych ich główną słabością jest ograniczenie ich stosowania do weryfikacji określonych danych uwierzytelniających posiadanych przez użytkownika (osobę weryfikującą się), a nie do weryfikacji tożsamości per se. Z kolei stosowane współcześnie metody biometryczne są czasochłonne i obarczone subiektywizmem w ocenie zgodności danych biometrycznych ze wzorcem. Alternatywę dla tych metod stanowi zaprezentowany w niniejszym artykule model, który jest oparty na w pełni zautomatyzowanej, zdalnej identyfikacji biometrycznej, wykorzystującej jako wzorzec dane biometryczne zawarte w dokumentach osobistych i paszportach. Model jest wolny od słabości i ograniczeń innych analizowanych biometrycznych i niebiometrycznych metod identyfikacji i charakteryzuje się bardzo niskim poziomem błędu.
The paper presents an analysis of the present-day process of remote identification. On this basis, the most important weaknesses of the methods were diagnosed. With regard to non-biometric methods, the main weakness and limitation is that they only verify Alternatywne narzędzia zdalnej weryfikacji tożsamości | 101 if the user (the person being verified) has appropriate credentials, and they do not verify the identity per se. On the other hand, the currently applied biometric methods are time-consuming and subjective in assessing the compliance of biometric data with the template. An alternative to these methods is a model, presented in this paper, which is based on fully automated, remote biometric identification using biometric data contained in IDs and passports as a template. The model is free from the weaknesses and limitations of other biometric and non-biometric identification methods analysed in this paper and has a very low error rate.
Źródło:
Przegląd Bezpieczeństwa Wewnętrznego; 2021, 13, 25; 85-101
2080-1335
2720-0841
Pojawia się w:
Przegląd Bezpieczeństwa Wewnętrznego
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
One-Time Code Cardholder Verification Method in Electronic Funds Transfer Transactions
Autorzy:
Sitek, A.
Powiązania:
https://bibliotekanauki.pl/articles/106234.pdf
Data publikacji:
2014
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
Electronic Funds Transfer
Cardholder Verification Method
CVM
EMV
authorization protocols
Opis:
Card payments are getting more and more popular across the world. The dominant standard used for Electronic Funds Transfer transaction is EMV. It is widely used across Europeand Canada, and currently it is being introduced in the USA. The most frequently used Cardholder Verification Method in EMV transaction is PIN, which requires from the payment terminal to be equipped with pinpad - which increases the cost of the whole payment device. In this article I presentan alternative Cardholder Verification Method (CVM) that can be used instead of traditional PIN.The key advantage of the presented mechanism is that it can be easily implemented in currently utilized authorization protocols, it does not affect rules of EMV specification and may decrease time of transaction processing.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2014, 14, 2; 46-59
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Security management of mass events
Autorzy:
Jędrzejas, Natalia
Powiązania:
https://bibliotekanauki.pl/articles/1179745.pdf
Data publikacji:
2017
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
mass event
security
support services
the authorization to mass event
Opis:
In recent years there has been a growing interest in the improvement of the security of mass events. Work on the regulations concerning mass events gained in significance by the multiplicity of occurrence of these events in our country. Mass event is a very large undertaking, which organizer must cope with. The aim of the article is to present legal regulations of issues connected with security of mass events in the range of those involved in the project.
Źródło:
World Scientific News; 2017, 72; 347-352
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Blockchain w zdecentralizowanej autoryzacji transakcji barterowych
Blockchain in decentralized authorization of barter transactions
Autorzy:
Filipkowski, Piotr
Horodelski, Michał
Polańska, Krystyna
Powiązania:
https://bibliotekanauki.pl/articles/583027.pdf
Data publikacji:
2018
Wydawca:
Wydawnictwo Uniwersytetu Ekonomicznego we Wrocławiu
Tematy:
blockchain
transakcje barterowe
autoryzacja transakcji
barter transaction
authorization of transaction
Opis:
Celem artykułu jest przedstawienie koncepcji modelu systemu wymiany barterowej realizującego autoryzację transakcji za pomocą łańcucha bloków (blockchain). Współczesne tendencje rozwoju działalności biznesowej wiodące w kierunku gospodarki współdzielenia (sharing economy) wskazują, że transakcje bez ekwiwalentu pieniężnego będą stosowane coraz częściej. Wymiana barterowa, czyli towar/usługa za towar/usługę wpisuje się w ten nurt transakcji gospodarczych. Różnorodność i liczba takich transakcji będzie wzrastać wraz ze wzrostem możliwości obliczeniowych superkomputerów niezbędnych do obsługi tego typu wymiany gospodarczej. Problem w tym, jak skutecznie zabezpieczyć systemy wymiany barterowej np. przed wielokrotnym wykorzystaniem tych samych towarów/ usług w wielu różnych transakcjach toczących się równocześnie. W artykule zaproponowano model systemu wymiany barterowej, w którym autoryzacja transakcji wykorzystuje koncepcję rozproszonej bazy danych.
The aim of the article is to present the concept of model of the system performing authentication barter transactions using a blockchain. Modern trends of business development leading to sharing economy indicate that transactions without cash equivalent will be used more and more often. Barter exchange is part of this trend of economic transactions. The variety and number of such transactions will increase with the increase of computing capabilities of supercomputers necessary to support this type of business exchange. The problem is how to effectively secure barter exchange systems, for example, against the multiple use of the same goods/services in many different transactions taking place simultaneously. The article proposes a model of a barter exchange system in which transaction authorization uses the concept of a distributed database.
Źródło:
Prace Naukowe Uniwersytetu Ekonomicznego we Wrocławiu; 2018, 527; 69-80
1899-3192
Pojawia się w:
Prace Naukowe Uniwersytetu Ekonomicznego we Wrocławiu
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Autoryzacja w praktyce nowych mediów w dobie kryzysu systemu prawa prasowego
Authorization in the Use of New Media during a Period of Crisis in the Press Law System
Autorzy:
Skrzypczak, Jędrzej
Powiązania:
https://bibliotekanauki.pl/articles/616266.pdf
Data publikacji:
2012
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
authorization
press law
new media
autoryzacja
prawo prasowe
nowe media
Opis:
Assuming that a crisis infers the collapse of old values while the new ones to replace them have not developed yet, one can ponder whether we are witnessing a crisis of press law in Poland or not. Taking into consideration the gravity and scope of criticism of the current press law act and the repeated attempts to alter the existing legal status quo, it could be said that we are facing a permanent crisis in the press law system in Poland, and, consequently, of the whole media policy. The paper tries to verify this hypothesis on the example of one of the elements of the press law, namely that of authorization.
Źródło:
Przegląd Politologiczny; 2012, 4; 199-212
1426-8876
Pojawia się w:
Przegląd Politologiczny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Teoria i praktyka wykonywania zawodu rzeczoznawcy majątkowego w Polsce
Theory and Practice of Professional Valuer in Poland
Autorzy:
Ziółkowska, Bogusława
Powiązania:
https://bibliotekanauki.pl/articles/906373.pdf
Data publikacji:
2012
Wydawca:
Uniwersytet Łódzki. Wydawnictwo Uniwersytetu Łódzkiego
Tematy:
property assessor
services
the training process
the system of granting professional authorization.
Opis:
In this paper an evaluation of the professional situation of property assessors in Poland in the field of acquiring professional authorization, type of services rendered and satisfaction gained from the occupation performed has been carried out on the basis of surveys in the form of interviews. The factors influencing the choice of profession of a property assessor, such as the training process, the system of granting professional authorization, the scope of services rendered and the frequency of performing particular services have all been placed under review.
Źródło:
Acta Universitatis Lodziensis. Folia Oeconomica; 2012, 267
0208-6018
2353-7663
Pojawia się w:
Acta Universitatis Lodziensis. Folia Oeconomica
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies