Results 121 to 130 of about 7,761,143 (347)

Improved hierarchical role based access control model for cloud computing [PDF]

open access: yesInternational Research Conference on Smart Computing and Systems Engineering ( 2018 ), 2020
Cloud computing is considered as the one of the most dominant paradigm in field of information technology which offers on demand cost effective services such as Software as a service (SAAS), Infrastructure as a service (IAAS) and Platform as a service (PAAS).Promising all these services as it is, this cloud computing paradigm still associates number of
arxiv  

Repairing Inconsistent XML Write-Access Control Policies

open access: yes, 2007
XML access control policies involving updates may contain security flaws, here called inconsistencies, in which a forbidden operation may be simulated by performing a sequence of allowed operations. This paper investigates the problem of deciding whether
Bravo, Loreto   +2 more
core  

Dynamic User Role Assignment in Remote Access Control [PDF]

open access: yes, 2009
The Role-Based Access Control (RBAC) model has been widely applied to a single domain in which users are known to the administrative unit of that domain, beforehand.
Hartel, Pieter   +3 more
core   +2 more sources

Interaction vesicles as emerging mediators of host‐pathogen molecular crosstalk and their implications for infection dynamics

open access: yesFEBS Letters, EarlyView.
Interaction extracellular vesicles (iEVs) are hybrid vesicles formed through host‐pathogen communication. They facilitate immune evasion, transfer pathogens' molecules, increase host cell uptake, and enhance virulence. This Perspective article illustrates the multifunctional roles of iEVs and highlights their emerging relevance in infection dynamics ...
Bruna Sabatke   +2 more
wiley   +1 more source

A Dynamic Access Control Model Using Authorising Workflow and Task-Role-Based Access Control

open access: yesIEEE Access, 2019
Access control is fundamental and prerequisite to govern and safeguard information assets within an organisation. Organisations generally use web enabled remote access coupled with applications access distributed on the various networks facing various ...
Mumina Uddin   +2 more
doaj   +1 more source

Access Control

open access: yes, 2005
Learning objectives: Comprehend the principles behind access control mechanisms used in today\\\\\\\'s: * operating systems, * middleware, * virtual machines. Overview: In this module, the principles behind access control mechanisms and policies employed in todays operating systems, middleware, and virtual machines are studied. Two key principles are
openaire   +1 more source

STAT3 expression is reduced in cardiac pericytes in HFpEF and its loss reduces cellular adhesion and induces pericyte senescence

open access: yesFEBS Letters, EarlyView.
Heart failure with preserved ejection fraction (HFpEF) accounts for half of the heart failure cases. It is characterised by microvascular dysfunction, associated with reduced pericyte coverage and diminished STAT3 expression in pericytes. Loss of STAT3 impairs pericyte adhesion, promotes senescence, and activates a pro‐fibrotic gene program.
Leah Rebecca Vanicek   +15 more
wiley   +1 more source

The impact of SLMTA in improving laboratory quality systems in the Caribbean Region

open access: yesAfrican Journal of Laboratory Medicine, 2014
Background: Past efforts to improve laboratory quality systems and to achieve accreditation for better patient care in the Caribbean Region have been slow.
Giselle Guevara   +9 more
doaj   +1 more source

"Shifting Access Control Left" using Asset and Goal Models [PDF]

open access: yesarXiv
Access control needs have broad design implications, but access control specifications may be elicited before, during, or after these needs are captured. Because access control knowledge is distributed, we need to make knowledge asymmetries more transparent, and use expertise already available to stakeholders. In this paper, we present a tool-supported
arxiv  

Home - About - Disclaimer - Privacy