Results 201 to 210 of about 3,031,447 (256)
Cytarabine is a key therapy for acute myeloid leukaemia (AML), but its efficacy is limited by the dNTPase SAMHD1, which hydrolyses its active metabolite. Screening nucleotide biosynthesis inhibitors revealed that IMPDH inhibitors selectively sensitise SAMHD1‐proficient AML cells to cytarabine.
Miriam Yagüe‐Capilla +9 more
wiley +1 more source
A Novel IDS with a Dynamic Access Control Algorithm to Detect and Defend Intrusion at IoT Nodes. [PDF]
Alazab M +5 more
europepmc +1 more source
A medical big data access control model based on smart contracts and risk in the blockchain environment. [PDF]
Pu X, Jiang R, Song Z, Liang Z, Yang L.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Role-Based Access Control and the Access Control Matrix
ACM SIGOPS Operating Systems Review, 2001The Access Matrix is a useful model for understanding the behaviour and properties of access control systems. While the matrix is rarely implemented, access control in real systems is usually based on access control mechanisms, such as access control lists or capabilities, that have clear relationships with the matrix model.
G. Saunders +2 more
openaire +1 more source
2019
Evolution of healthcare systems and the constantly changing regulatory landscape continuously alter all facets of health information technology including access. Access to information systems must be controlled in order to protect privacy and confidentiality.
Karl E. Misulis, Mark E. Frisse
openaire +1 more source
Evolution of healthcare systems and the constantly changing regulatory landscape continuously alter all facets of health information technology including access. Access to information systems must be controlled in order to protect privacy and confidentiality.
Karl E. Misulis, Mark E. Frisse
openaire +1 more source
2007
Presentazione delle caratteristiche principali delle tecnologie per il controllo dell’accesso.
S. De Capitani di Vimercati +3 more
openaire +4 more sources
Presentazione delle caratteristiche principali delle tecnologie per il controllo dell’accesso.
S. De Capitani di Vimercati +3 more
openaire +4 more sources
Personalizing access control by generalizing access control
Proceedings of the 15th ACM symposium on Access control models and technologies, 2010We address the problem of providing data subjects with self-selected controls on access to their personal information. Existing approaches for this are not always sufficient in terms of offering the degrees of control and scope for individualization of access policies that are needed for personal data protection (and usage).
openaire +2 more sources
Cloud Security Access Control: Distributed Access Control
2020Jim Harmening, Randall DeVitto
openaire +1 more source
Cervical cancer prevention and control in women living with human immunodeficiency virus
Ca-A Cancer Journal for Clinicians, 2021Philip E Castle, Vikrant V Sahasrabuddhe
exaly

