Results 51 to 60 of about 7,761,143 (347)
Access Control Synthesis for Physical Spaces
Access-control requirements for physical spaces, like office buildings and airports, are best formulated from a global viewpoint in terms of system-wide requirements.
Basin, David+2 more
core +1 more source
An Access Control Model for Protecting Provenance Graphs [PDF]
Postprin
Chen, Liang+3 more
core +1 more source
FoxO1 signaling in B cell malignancies and its therapeutic targeting
FoxO1 has context‐specific tumor suppressor or oncogenic character in myeloid and B cell malignancies. This includes tumor‐promoting properties such as stemness maintenance and DNA damage tolerance in acute leukemias, or regulation of cell proliferation and survival, or migration in mature B cell malignancies.
Krystof Hlavac+3 more
wiley +1 more source
Background KwaZulu-Natal, one of South Africa’s three malaria endemic provinces, is nearing malaria elimination, reporting fewer than 100 locally-acquired cases annually since 2010.
Jaishree Raman+24 more
doaj +1 more source
Introduction Disease-specific ‘vertical’ programmes and health system strengthening (HSS) ‘horizontal’ programmes are not mutually exclusive; programmes may be implemented with the dual objectives of achieving both disease-specific and broader HSS ...
Justin Pulford+7 more
doaj +1 more source
SDN Access Control for the Masses
The evolution of Software-Defined Networking (SDN) has so far been predominantly geared towards defining and refining the abstractions on the forwarding and control planes. However, despite a maturing south-bound interface and a range of proposed network
Gehrmann, Christian, Paladi, Nicolae
core +1 more source
A Distributed Calculus for Role-Based Access Control [PDF]
Role-based access control (RBAC) is increasingly attracting attention because it reduces the complexity and cost of security administration by interposing the notion of role in the assignment of permissions to users.
Braghin, C., Gorla, D., Sassone, V.
core +6 more sources
Access Control for the Shuffle Index [PDF]
The shuffle index provides confidentiality guarantees for accesses to externally outsourced data. In this paper, we extend the shuffle index with support for access control, that is, for enforcing authorizations on data. Our approach bases on the use of selective encryption and on the organization of data and authorizations in two shuffle indexes.
S. De Capitani di Vimercati+4 more
openaire +5 more sources
Metabolic dysfunction‐associated steatotic liver disease (MASLD) affects nearly one‐third of the global population and poses a significant risk of progression to cirrhosis or liver cancer. Here, we discuss the roles of hepatic dendritic cell subtypes in MASLD, highlighting their distinct contributions to disease initiation and progression, and their ...
Camilla Klaimi+3 more
wiley +1 more source
Background An estimated 50% of suspected malaria cases in sub-Saharan Africa first seek care in the private sector, especially in private medicine retail outlets.
Meley Woldeghebriel+17 more
doaj +1 more source