Results 171 to 180 of about 7,761,143 (347)
Enhancing Resource Sharing and Access Control for VNF Instantiation with Blockchain. [PDF]
Dong A, Wang X, Yi B, He Q, Huang M.
europepmc +1 more source
Meta objects for access control [PDF]
Thomas Riechmann, Franz J. Hauck
openalex +1 more source
We quantified and cultured circulating tumor cells (CTCs) of 62 patients with various cancer types and generated CTC‐derived tumoroid models from two salivary gland cancer patients. Cellular liquid biopsy‐derived information enabled molecular genetic assessment of systemic disease heterogeneity and functional testing for therapy selection in both ...
Nataša Stojanović Gužvić+31 more
wiley +1 more source
Statement Recognition of Access Control Policies in IoT Networks. [PDF]
Ma L, Yang Z, Bu Z, Lao Q, Yang W.
europepmc +1 more source
The design of dynamic access control scheme with user authentication
Sung‐Ming Yen, Chi‐Sung Laih
openalex +1 more source
Adaptive ERK reactivation hinders FLT3 tyrosine kinase inhibitor (TKI) treatment in FLT3/ITD acute myeloid leukemia. Here, we report that FLT3 TKI treatment rapidly induces AXL expression and upregulation that is temporally associated with the adaptive ERK reactivation.
Tessa S. Seale+9 more
wiley +1 more source
From Authority Control to Informed Retrieval: Framing the Expanded Domain of Subject Access
Prudence W. Dalrymple+1 more
openalex +2 more sources
Policy analysis for self-administrated role-based access control
Current techniques for security analysis of administrative role-based access control (ARBAC) policies restrict themselves to the separate administration assumption that essentially separates administrative roles from regular ones.
Ferrara, Anna Lisa+2 more
core
The authors analyzed the spatial distributions of gene and metabolite profiles in cervical cancer through spatial transcriptomic and spatially resolved metabolomic techniques. Pivotal genes and metabolites within these cases were then identified and validated.
Lixiu Xu+3 more
wiley +1 more source
A secure medium access control protocol: Security versus performances
Pierre Siron, Bruno d’Ausbourg
openalex +1 more source