Results 11 to 20 of about 29,464,938 (335)

Toward Deep Learning Based Access Control [PDF]

open access: yesConference on Data and Application Security and Privacy, 2022
A common trait of current access control approaches is the challenging need to engineer abstract and intuitive access control models. This entails designing access control information in the form of roles (RBAC), attributes (ABAC), or relationships ...
M. N. Nobi   +4 more
semanticscholar   +1 more source

Blockchain for IoT Access Control: Recent Trends and Future Research Directions [PDF]

open access: yesJournal of Network and Computer Applications, 2021
With the rapid development of wireless sensor networks, smart devices, and traditional information and communication technologies, there is tremendous growth in the use of Internet of Things (IoT) applications and services in our everyday life.
S. Pal, A. Dorri, R. Jurdak
semanticscholar   +1 more source

Patient outcomes in public sector hepatitis C treatment programmes: a retrospective cohort analysis across five low- and middle-income countries

open access: yesBMJ Open, 2022
Objectives Given limited data on factors associated with hepatitis C virus (HCV) treatment discontinuation and failure in low- and middle-income countries, we aimed to describe patient populations treated for HCV in five countries and identify patient ...
Caroline E Boeke   +24 more
doaj   +1 more source

Access Control for IoT: A Survey of Existing Research, Dynamic Policies and Future Directions

open access: yesItalian National Conference on Sensors, 2023
Internet of Things (IoT) provides a wide range of services in domestic and industrial environments. Access control plays a crucial role in granting access rights to users and devices when an IoT device is connected to a network.
K. Ragothaman   +3 more
semanticscholar   +1 more source

Key factors associated with malaria infection among patients seeking care through the public sector in endemic townships of Ayeyarwady Region, Myanmar

open access: yesMalaria Journal, 2022
Background Ayeyarwady Region in Myanmar has made significant progress towards malaria elimination, with cases decreasing from 12,312 in 2015 to 122 in 2019.
Jillian Dunning   +9 more
doaj   +1 more source

DSMAC: Privacy-Aware Decentralized Self-Management of Data Access Control Based on Blockchain for Health Data

open access: yesIEEE Access, 2022
In recent years, the interest in using wireless communication technologies and mobile devices in the healthcare environment has increased. However, despite increased attention to the security of electronic health records, patient privacy is still at risk
Hafida Saidi   +4 more
semanticscholar   +1 more source

Factors associated with the decline of malaria in Myanmar’s Ayeyarwady Region between 2013 and 2017

open access: yesScientific Reports, 2021
The burden of malaria in Myanmar has declined rapidly in recent years; cases decreased from 333,871 in 2013 to 85,019 in 2017 (75% decrease). Decline of malaria in the Ayeyarwady Region of Myanmar reflects this trend with an 86% decrease in cases over ...
Sarah Gallalee   +10 more
doaj   +1 more source

The procurement and supply chain strengthening project: improving public health supply chains for better access to HIV medicines, Uganda 2011–2016

open access: yesJournal of Pharmaceutical Policy and Practice, 2022
Background With countries moving towards reaching the UNAIDS 90-90-90 goal to achieve HIV epidemic control, there are going to be an unprecedented number of persons who will need to be tested, treated, and regularly monitored for viral suppression ...
Sowedi Muyingo   +8 more
doaj   +1 more source

SmartAccess: Attribute-Based Access Control System for Medical Records Based on Smart Contracts

open access: yesIEEE Access, 2022
Cross-organisation data sharing is challenging because all the involved organisations must agree on ‘how’ and ‘why’ the data is processed. Due to a lack of transparency, the organisations need to trust that others comply with the agreements and ...
Marcela Tuler de Oliveira   +4 more
semanticscholar   +1 more source

Blockchain-Based IoT Access Control System: Towards Security, Lightweight, and Cross-Domain

open access: yesIEEE Access, 2021
Most IoT devices cannot afford to be a blockchain node due to the high computation and storage loads. Thus, the blockchain is usually deployed on one delegate node, e.g., the edge device or cloud, which may encounters three drawbacks: (1) The delegate ...
Shuang Sun   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy