Results 161 to 170 of about 7,792 (193)
The apparency hypothesis applied to a local pharmacopoeia in the Brazilian northeast. [PDF]
Lozano A +3 more
europepmc +1 more source
Comportamento respiratório e amaciamento de graviola (Annona muricata L.) após tratamentos pós-colheita com cera e 1-metilciclopropeno. [PDF]
ALVES, R. E. +2 more
core
Exportdiversifizierung durch tropische Produkte: Ansatzmöglichkeiten in Brasilien [PDF]
Wilhelms, Christian
core
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Incremental Maintenance of ABAC Policies
Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy, 2021Discovery of Attribute Based Access Control policies through mining has been studied extensively in the literature. However, current solutions assume that the rules are to be mined from a static data set of access permissions and that this process only needs to be done once.
Gunjan, Batra +3 more
openaire +2 more sources
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020
Internet of Things (IoT) is revolutionizing the capabilities of the Internet with billions of connected devices in the cyberspace. These devices are commonly referred to as smart things enabling smart environments, such as Smart Home, Smart Health, Smart Transportation, and overall Smart Communities, together with key enabling technologies like Cloud ...
Smriti Bhatt, Ravi Sandhu
openaire +1 more source
Internet of Things (IoT) is revolutionizing the capabilities of the Internet with billions of connected devices in the cyberspace. These devices are commonly referred to as smart things enabling smart environments, such as Smart Home, Smart Health, Smart Transportation, and overall Smart Communities, together with key enabling technologies like Cloud ...
Smriti Bhatt, Ravi Sandhu
openaire +1 more source
Deploying ABAC policies using RBAC systems [PDF]
The flexibility, portability and identity-less access control features of Attribute Based Access Control (ABAC) make it an attractive choice to be employed in many application domains. However, commercially viable methods for implementation of ABAC do not exist while a vast majority of organizations use Role Based Access Control (RBAC) or their ...
Gunjan, Batra +3 more
openaire +2 more sources
Contemporaneous Update and Enforcement of ABAC Policies
Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies, 2022Access control policies are dynamic in nature, and therefore require frequent updates to synchronize with the latest organizational security requirements. As these updates are handled, it is important that all user access requests be answered contemporaneously and correctly without any interruption or delay.
Samir, Talegaon +4 more
openaire +2 more sources
Efficient Extended ABAC Evaluation
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018A main challenge of attribute-based access control (ABAC) is the handling of missing information. Several studies show that the way standard ABAC mechanisms (e.g., XACML) handle missing information is flawed, making ABAC policies vulnerable to attribute-hiding attacks.
Morisset, Charles +2 more
openaire +1 more source
Performance Analysis of ABAC and ABAC with Trust (ABAC-T) in Fine Grained Access Control Model
2019 11th International Conference on Advanced Computing (ICoAC), 2019Access the resources with secured manner is challenging task in a dynamic environment. Though various access control models exist, ABAC plays a vital role in providing access to resources in specific contexts with security. Since ABAC is a fine-grained method its rules and policy reduce flexibility to access the resources.
G Abirami, Revathi Venkataraman
openaire +1 more source

