Results 31 to 40 of about 7,761,143 (347)
TCloud: A Dynamic Framework and Policies for Access Control across Multiple Domains in Cloud Computing [PDF]
In a cloud computing environment, access control policy is an effective means of fortification cloud users and cloud resources services against security infringements. Based on analysis of current cloud computing security characteristics, the preamble of the concept of trust, role-based access control policy, combined with the characteristics of the ...
arxiv +1 more source
Sabin-strain oral polio vaccines (OPV) can, in rare instances, cause disease in recipients and susceptible contacts or evolve to become circulating vaccine-derived strains with the potential to cause outbreaks.
Rahnuma Wahid+19 more
doaj +1 more source
Model Checking Access Control Policies: A Case Study using Google Cloud IAM [PDF]
Authoring access control policies is challenging and prone to misconfigurations. Access control policies must be conflict-free. Hence, administrators should identify discrepancies between policy specifications and their intended function to avoid violating security principles.
arxiv
AKER: A Design and Verification Framework for Safe andSecure SoC Access Control [PDF]
Modern systems on a chip (SoCs) utilize heterogeneous architectures where multiple IP cores have concurrent access to on-chip shared resources. In security-critical applications, IP cores have different privilege levels for accessing shared resources, which must be regulated by an access control system.
arxiv
Patient privacy protection using anonymous access control techniques [PDF]
Objective: The objective of this study is to develop a solution to preserve security and privacy in a healthcare environment where health-sensitive information will be accessed by many parties and stored in various distributed databases.
Elmufti, K.+3 more
core +1 more source
Cooperative medium access control based on spectrum leasing [PDF]
Based on cooperative spectrum leasing, a distributed “win–win” (WW) cooperative framework is designed to encourage the licensed source node (SN) to lease some part of its spectral resources to the unlicensed relay node (RN) for the sake of simultaneously
Feng, Jiao+3 more
core +1 more source
MUTATION TESTING OF ACCESS CONTROL POLICIES
One of the most important and integral components of modern computer security are access control systems. The objective of an access control system (ACS) is often described in terms of protecting system resources against inappropriate or unwanted user ...
Galina Cherneva, Pavlо Khalimov
doaj +1 more source
Fast Desynchronization For Decentralized Multichannel Medium Access Control [PDF]
Distributed desynchronization algorithms are key to wireless sensor networks as they allow for medium access control in a decentralized manner. In this paper, we view desynchronization primitives as iterative methods that solve optimization problems.
Andreopoulos, Yiannis+3 more
core +2 more sources
Quantum Internet: from Medium Access Control to Entanglement Access Control
Multipartite entanglement plays a crucial role for the design of the Quantum Internet, due to its potentiality of significantly increasing the network performance. In this paper, we design an entanglement access control protocol for multipartite state, which exhibits several attractive features.
Illiano J.+4 more
openaire +3 more sources
Background Fever associated with malaria is the leading cause of health care-seeking in Mozambique, yet there is limited evidence on the quality of malaria case management.
Baltazar Candrinho+12 more
doaj +1 more source