نتایج جستجو برای: authorization propagation

تعداد نتایج: 115609  

Journal: :The American journal of managed care 2014
Dana Goldman John Fastenau Riad Dirani Eric Helland Geoff Joyce Ryan Conrad Darius Lakdawalla

OBJECTIVE To examine the impact of Medicaid prior authorization for atypical antipsychotics on the prevalence of schizophrenia among the prison population. Study DESIGN We collected drug-level information on prior authorization restrictions from Medicaid programs in 30 states to determine which states had prior authorization requirements before 2004. We linked the regulatory data to a survey ...

Journal: :RFC 2011
Jukka Manner Martin Stiemerling Hannes Tschofenig Roland Bless

Signaling layer protocols specified within the Next Steps in Signaling (NSIS) framework may rely on the General Internet Signaling Transport (GIST) protocol to handle authorization. Still, the signaling layer protocol above GIST itself may require separate authorization to be performed when a node receives a request for a certain kind of service or resources. This document presents a generic mo...

2004
Bo Li Sheng Ge Tianyu Wo Dian-fu Ma

Software Services based Application Service Provider pattern is an important method in constructing enterprise applications, which integrate business systems with different authentication mechanism. So there are questions such as repeated authentication and authorization, difficulties in authorization management, difficult to describe security information interoperability. This paper proposes a...

2016

Prior Authorization Information Pre-service approval is required for all inpatient services for all products. See below for situations where prior authorization may be required or may not be required for outpatient services. Yes indicates that prior authorization is required. No indicates that prior authorization is not required. N/A indicates that this service is primarily performed in an inpa...

2006
Sasha Romanosky

• Authentication and authorization • Pass-sentences, pass-phrases and mnemonic passwords • Randomly generated passwords • User Study: Human selection of text passwords 1.1 Authentication and authorization The management of multiple versions of user identities across multiple applications is difficult and one type of building blocks of identity management is 1 : • Password reset • Password synch...

2017

Prior Authorization Information Pre-service approval is required for all inpatient services for all products. See below for situations where prior authorization may be required or may not be required for outpatient services. Yes indicates that prior authorization is required. No indicates that prior authorization is not required. N/A indicates that this service is primarily performed in an inpa...

2006
Felix Wortmann Robert Winter

A procedure model for the development of an authorization architecture, which spans different IT systems and organizational units, is presented. Based on a conceptual discussion of authorization and authorization architecture, existing approaches are discussed. As basic requirements for authorization architecture, a theoretical foundation and a transparent derivation of the procedure model and ...

1999
Konstantin Beznosov Yi Deng Bob Blakley C. Burt John F. Barkley

Decoupling authorization logic from application logic allows applications with fine-grain access control requirements to be independent from a particular access control policy and from factors that are used in authorization decisions as well as access control models, no matter how dynamic those polices and factors are. It also enables elaborate and consistent access control policies across hete...

2002
Zoltán Miklós

E-business applications need robust and powerful mechanisms to authorize security-critical actions. This actions can be very complex, since they can be initiated not only by human users but also by applications or software agents. Existing authorization mechanisms do not scale for large number of users if the trust relations are dynamic and fail to provide reliable authorization among strangers...

2010
Andreas Blass Yuri Gurevich Michal Moskal Itay Neeman

Consider interaction of principals where each principal has its own policy and different principals may not trust each other. In one scenario the principals could be pharmaceutical companies, hospitals, biomedical labs and health related government institutions. In another scenario principals could be navy fleets of different and not necessarily friendly nations. In spite of the complexity of i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید