全部文献期刊学位论文会议报纸专利标准年鉴图书|学者科研项目
中外文文献  中文文献  外文文献
作者:Brett R. Stacey , Jonathan Liss , Regina Behar ...
来源:[J].BMC Health Services Research(IF 1.773), 2017, Vol.17 (1)Springer
摘要:... However, restriction policies such as prior authorization (PA) and step therapy (ST) often favor less costly generic pain medications over pregabalin.
作者:Adam Wójtowicz , Jacek Chmielewski
来源:[J].Personal and Ubiquitous Computing(IF 1.133), 2017, Vol.21 (6), pp.1113-1125Springer
摘要:... It allows for dynamic selection of payment authorization methods that constitutes accurate trade-off between security and convenience. Particularly, the payments can be performed and authorized in the background using biometric means (face recognition), without user’s ex...
作者:Elaine C. Wirrell , Alexander J. Vanderwiel , Lauren Nickels ...
来源:[J].Pediatric Neurology(IF 1.416), 2018, Vol.83, pp.38-41Elsevier
摘要:Abstract(#br)Objective(#br)We assessed how commonly prior authorization results in treatment delay or missed doses in children with epilepsy.(#br)Methods(#br)Parents of 462 children followed in a pediatric epilepsy clinic were surveyed regarding prior authorization in the precedi...
作者:Zhi Li , Jian Ni
来源:[J].Computers & Industrial Engineering(IF 1.516), 2018, Vol.116, pp.13-21Elsevier
摘要:Abstract(#br)We consider the joint product innovation and production decisions of a manufacturing firm under the existence of quality authorization from a 3rd party, which has gained growing popularity in recent years. A dynamic control model is developed to analyse the effect...
作者:Faria Mehak , Rahat Masood , Muhammad Awais Shibli ...
来源:[J].Annals of Telecommunications(IF 0.567), 2017, Vol.72 (5-6), pp.307-323Springer
摘要:The dynamic authorization and continuous monitoring of resource usage in cloud environments is a challenge. Moreover, the extant access control techniques are not well-suited for all types of the cloud-hosted applications predominantly for two reasons. Firstly, these techniques l...
作者:Cheng Chang , Ligang He , Nadeem Chaudhary ...
来源:[J].Future Generation Computer Systems(IF 1.864), 2017, Vol.67, pp.194-205Elsevier
摘要:... The authorization policies deployed in the system may restrict the task executions. The common authorization constraints include role constraints, Separation of Duty (SoD), Binding of Duty (BoD) and temporal constraints. This paper presents the methods to check the feasibi...
作者:Huihui Liu , Ming Lei , Tao Huang ...
来源:[J].International Journal of Production Economics(IF 2.081), 2018, Vol.195, pp.198-209Elsevier
摘要:... As a result, some OEMs choose to provide refurbishing authorization to TPRs who are required to meet specific standards and pay an authorization fee. Besides the strategy of refurbishing authorization, an OEM could choose strategies such as participating in direct refurbishin...
作者:Yang Bo , Chunhe Xia , Zhigang Zhang ...
来源:[J].Frontiers of Computer Science(IF 0.298), 2017, Vol.11 (3), pp.528-540Springer
摘要:Satisfiability problem of authorization requirements in business process asks whether there exists an assignment of users to tasks that satisfies all the requirements, and methods were proposed to solve this problem. However, the proposed methods are inefficient in the sense that...
作者:Mang Su , Bo Zhou , Anmin Fu ...
来源:[J].Information Sciences(IF 3.643), 2019Elsevier
摘要:... Thus, it is a crucial and urgent issue to realize the trusted update of authorization of nodes. When some nodes are hijacked, both of the behaviors to upload data to servers and to download information from servers should be forbidden. Otherwise, it might cause the serious d...
作者:Anna Kordecka , Ewa Walkiewicz-Żarek , Joanna Łapa ...
来源:[J].Value in Health(IF 2.191), 2019, Vol.22 (8), pp.884-890Elsevier
摘要:... Changes in the endpoints applied in marketing authorization practice were also considered.(#br)Methods(#br)The analysis included marketing authorization applications (MAAs) for medicines used in oncological indications that were first-time approved by the European Medicines A...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×