Results 121 to 130 of about 7,761,143 (347)
Improved hierarchical role based access control model for cloud computing [PDF]
Cloud computing is considered as the one of the most dominant paradigm in field of information technology which offers on demand cost effective services such as Software as a service (SAAS), Infrastructure as a service (IAAS) and Platform as a service (PAAS).Promising all these services as it is, this cloud computing paradigm still associates number of
arxiv
Repairing Inconsistent XML Write-Access Control Policies
XML access control policies involving updates may contain security flaws, here called inconsistencies, in which a forbidden operation may be simulated by performing a sequence of allowed operations. This paper investigates the problem of deciding whether
Bravo, Loreto+2 more
core
Dynamic User Role Assignment in Remote Access Control [PDF]
The Role-Based Access Control (RBAC) model has been widely applied to a single domain in which users are known to the administrative unit of that domain, beforehand.
Hartel, Pieter+3 more
core +2 more sources
Interaction extracellular vesicles (iEVs) are hybrid vesicles formed through host‐pathogen communication. They facilitate immune evasion, transfer pathogens' molecules, increase host cell uptake, and enhance virulence. This Perspective article illustrates the multifunctional roles of iEVs and highlights their emerging relevance in infection dynamics ...
Bruna Sabatke+2 more
wiley +1 more source
A Dynamic Access Control Model Using Authorising Workflow and Task-Role-Based Access Control
Access control is fundamental and prerequisite to govern and safeguard information assets within an organisation. Organisations generally use web enabled remote access coupled with applications access distributed on the various networks facing various ...
Mumina Uddin+2 more
doaj +1 more source
Access and communication controls in an accounting information system [PDF]
Avi Rushinek, Sara F. Rushinek
openalex +1 more source
Learning objectives: Comprehend the principles behind access control mechanisms used in today\\\\\\\'s: * operating systems, * middleware, * virtual machines. Overview: In this module, the principles behind access control mechanisms and policies employed in todays operating systems, middleware, and virtual machines are studied. Two key principles are
openaire +1 more source
Heart failure with preserved ejection fraction (HFpEF) accounts for half of the heart failure cases. It is characterised by microvascular dysfunction, associated with reduced pericyte coverage and diminished STAT3 expression in pericytes. Loss of STAT3 impairs pericyte adhesion, promotes senescence, and activates a pro‐fibrotic gene program.
Leah Rebecca Vanicek+15 more
wiley +1 more source
The impact of SLMTA in improving laboratory quality systems in the Caribbean Region
Background: Past efforts to improve laboratory quality systems and to achieve accreditation for better patient care in the Caribbean Region have been slow.
Giselle Guevara+9 more
doaj +1 more source
"Shifting Access Control Left" using Asset and Goal Models [PDF]
Access control needs have broad design implications, but access control specifications may be elicited before, during, or after these needs are captured. Because access control knowledge is distributed, we need to make knowledge asymmetries more transparent, and use expertise already available to stakeholders. In this paper, we present a tool-supported
arxiv