Results 91 to 100 of about 29,464,938 (335)
How to break access control in a controlled manner [PDF]
The Electronic Medical Record (EMR) integrates heterogeneous information within a Healthcare Institution stressing the need for security and access control.
Antunes, Luis +6 more
core +1 more source
ABSTRACT Purpose Although not always achieved, complete chemotherapy‐induced nausea and vomiting (CINV) control is the conventional goal of CINV prophylaxis. In this two‐center, mixed‐methods study, we sought to understand the preferences of adolescent patients and family caregivers for CINV control endpoints.
Haley Newman +8 more
wiley +1 more source
Self-Adaptive Role-Based Access Control for Business Processes [PDF]
© 2017 IEEE. We present an approach for dynamically reconfiguring the role-based access control (RBAC) of information systems running business processes, to protect them against insider threats. The new approach uses business process execution traces and
Calinescu, R +3 more
core +2 more sources
Intravitreal GD2‐Specific Chimeric Antigen Receptor T‐Cell Therapy for Refractory Retinoblastoma
ABSTRACT Effective treatments for advanced, treatment‐resistant retinoblastoma (RB) remain limited. GD2‐specific chimeric antigen receptor (CAR) T cells show potent antitumor activity with minimal toxicity but have not previously been evaluated in RB.
Subongkoch Subhadhirasakul +13 more
wiley +1 more source
Introduction Disease-specific ‘vertical’ programmes and health system strengthening (HSS) ‘horizontal’ programmes are not mutually exclusive; programmes may be implemented with the dual objectives of achieving both disease-specific and broader HSS ...
Justin Pulford +7 more
doaj +1 more source
ACCESS CONTROL IN A SOCIAL NETWORKING ENVIRONMENT [PDF]
Collecting users into groups is a common activity in social networking sites such as Facebook, Google groups, Yahoo groups and many other web applications. This project explores access control techniques for dynamically created groups. The starting point
Perepa, Mallika
core +1 more source
Distributed Random Access Algorithm: Scheduling and Congesion Control
This paper provides proofs of the rate stability, Harris recurrence, and epsilon-optimality of CSMA algorithms where the backoff parameter of each node is based on its backlog.
Jiang, Libin +3 more
core +2 more sources
FADB: A Fine-Grained Access Control Scheme for VANET Data Based on Blockchain
Vehicular Ad Hoc Network (VANET) is an important foundation of intelligent transportation system and is widely used in traffic management, automatic driving, and road optimization. With the gradual popularization and further development of VANET, a large
Hui Li +5 more
semanticscholar +1 more source
ABSTRACT Background Nurses are central to cancer care for children and adolescents, yet no comprehensive synthesis has defined essential core competencies for pediatric oncology nursing (PON) practice internationally, particularly in Latin America and the Caribbean (LAC).
Luís Carlos Lopes‐Júnior +7 more
wiley +1 more source
Traditional centralized access control has some shortcomings in robustness, trustworthiness and circulation. Blockchains have the advantages of fault tolerance and trust.
Guohua Gan +3 more
doaj +1 more source

