Results 311 to 320 of about 645,588 (340)
Some of the next articles are maybe not open access.
Authentication and Authorization
2011In this chapter, we look at the ASP.NET support for and authorization. Authentication is the process of identifying your users. Authorization is the process of controlling their access to different parts of the application. We focus very narrowly on techniques and features.
Adam Freeman, Steven Sanderson
openaire +2 more sources
Authenticity under threat: When social media influencers need to go beyond self-presentation
, 2020Alice Audrezet +2 more
semanticscholar +1 more source
2014
Is a passenger-pigeon-like bird that has come into existence through de-extinction procedures an authentic passenger-pigeon? A similar question can be asked about all animals produced by the three methods of de-extinction: back-breeding, cloning and genetic engineering (Sherkow and Greely 2013, p. 32).
openaire +3 more sources
Is a passenger-pigeon-like bird that has come into existence through de-extinction procedures an authentic passenger-pigeon? A similar question can be asked about all animals produced by the three methods of de-extinction: back-breeding, cloning and genetic engineering (Sherkow and Greely 2013, p. 32).
openaire +3 more sources
AJOB Neuroscience, 2019
Kreitmair (2019) proposes seven dimensions to be explored in order to ensure the ethical foundations of direct-to-consumer (DTC) neurotechnologies, namely, safety, just distribution, privacy, trans...
openaire +3 more sources
Kreitmair (2019) proposes seven dimensions to be explored in order to ensure the ethical foundations of direct-to-consumer (DTC) neurotechnologies, namely, safety, just distribution, privacy, trans...
openaire +3 more sources
Staged Authenticity: Arrangements of Social Space in Tourist Settings
American Journal of Sociology, 1973D. MacCannell
semanticscholar +1 more source
2018
This chapter discusses the certification of digital records and their long- term preservation as authentic records. Two scenarios in which the records’ trustworthiness might be questioned are examined. The first scenario addresses digital records and their potential inadmissibility as evidence to external audits.
openaire +1 more source
This chapter discusses the certification of digital records and their long- term preservation as authentic records. Two scenarios in which the records’ trustworthiness might be questioned are examined. The first scenario addresses digital records and their potential inadmissibility as evidence to external audits.
openaire +1 more source
The role and dimensions of authenticity in heritage tourism
Tourism Management, 2019Eunkyung Park +2 more
semanticscholar +1 more source
Honey: Chemical composition, stability and authenticity.
Food Chemistry, 2016Priscila Missio da Silva +4 more
semanticscholar +1 more source

