Results 91 to 100 of about 29,464,938 (335)

How to break access control in a controlled manner [PDF]

open access: yes, 2006
The Electronic Medical Record (EMR) integrates heterogeneous information within a Healthcare Institution stressing the need for security and access control.
Antunes, Luis   +6 more
core   +1 more source

Preferences of Pediatric Patients and Their Caregivers for Chemotherapy‐Induced Nausea and Vomiting Control Endpoints: A Mixed Methods Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Purpose Although not always achieved, complete chemotherapy‐induced nausea and vomiting (CINV) control is the conventional goal of CINV prophylaxis. In this two‐center, mixed‐methods study, we sought to understand the preferences of adolescent patients and family caregivers for CINV control endpoints.
Haley Newman   +8 more
wiley   +1 more source

Self-Adaptive Role-Based Access Control for Business Processes [PDF]

open access: yes, 2017
© 2017 IEEE. We present an approach for dynamically reconfiguring the role-based access control (RBAC) of information systems running business processes, to protect them against insider threats. The new approach uses business process execution traces and
Calinescu, R   +3 more
core   +2 more sources

Intravitreal GD2‐Specific Chimeric Antigen Receptor T‐Cell Therapy for Refractory Retinoblastoma

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Effective treatments for advanced, treatment‐resistant retinoblastoma (RB) remain limited. GD2‐specific chimeric antigen receptor (CAR) T cells show potent antitumor activity with minimal toxicity but have not previously been evaluated in RB.
Subongkoch Subhadhirasakul   +13 more
wiley   +1 more source

Pursuing health systems strengthening through disease-specific programme grants: experiences in Tanzania and Sierra Leone

open access: yesBMJ Global Health, 2021
Introduction Disease-specific ‘vertical’ programmes and health system strengthening (HSS) ‘horizontal’ programmes are not mutually exclusive; programmes may be implemented with the dual objectives of achieving both disease-specific and broader HSS ...
Justin Pulford   +7 more
doaj   +1 more source

ACCESS CONTROL IN A SOCIAL NETWORKING ENVIRONMENT [PDF]

open access: yes, 2013
Collecting users into groups is a common activity in social networking sites such as Facebook, Google groups, Yahoo groups and many other web applications. This project explores access control techniques for dynamically created groups. The starting point
Perepa, Mallika
core   +1 more source

Distributed Random Access Algorithm: Scheduling and Congesion Control

open access: yes, 2009
This paper provides proofs of the rate stability, Harris recurrence, and epsilon-optimality of CSMA algorithms where the backoff parameter of each node is based on its backlog.
Jiang, Libin   +3 more
core   +2 more sources

FADB: A Fine-Grained Access Control Scheme for VANET Data Based on Blockchain

open access: yesIEEE Access, 2020
Vehicular Ad Hoc Network (VANET) is an important foundation of intelligent transportation system and is widely used in traffic management, automatic driving, and road optimization. With the gradual popularization and further development of VANET, a large
Hui Li   +5 more
semanticscholar   +1 more source

Pediatric Oncology Nursing Competencies in Latin America and the Caribbean: A Scoping Review to Inform Practice, Education, and Research

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Nurses are central to cancer care for children and adolescents, yet no comprehensive synthesis has defined essential core competencies for pediatric oncology nursing (PON) practice internationally, particularly in Latin America and the Caribbean (LAC).
Luís Carlos Lopes‐Júnior   +7 more
wiley   +1 more source

Token-Based Access Control

open access: yesIEEE Access, 2020
Traditional centralized access control has some shortcomings in robustness, trustworthiness and circulation. Blockchains have the advantages of fault tolerance and trust.
Guohua Gan   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy