Results 51 to 60 of about 29,464,938 (335)
Network layer access control for context-aware IPv6 applications [PDF]
As part of the Lancaster GUIDE II project, we have developed a novel wireless access point protocol designed to support the development of next generation mobile context-aware applications in our local environs.
Cheverst, Keith +5 more
core +2 more sources
Fast Desynchronization For Decentralized Multichannel Medium Access Control [PDF]
Distributed desynchronization algorithms are key to wireless sensor networks as they allow for medium access control in a decentralized manner. In this paper, we view desynchronization primitives as iterative methods that solve optimization problems.
Andreopoulos, Yiannis +3 more
core +2 more sources
In this paper, a blockchain-based data sharing and access control system is proposed, for communication between the Internet of Things (IoT) devices. The proposed system is intended to overcome the issues related to trust and authentication for access ...
Tanzeela Sultana +5 more
semanticscholar +1 more source
MUTATION TESTING OF ACCESS CONTROL POLICIES
One of the most important and integral components of modern computer security are access control systems. The objective of an access control system (ACS) is often described in terms of protecting system resources against inappropriate or unwanted user ...
Galina Cherneva, Pavlо Khalimov
doaj +1 more source
Distributed Access Control with Blockchain
The specification and enforcement of network-wide policies in a single administrative domain is common in today's networks and considered as already resolved. However, this is not the case for multi-administrative domains, e.g.
Cabellos, Albert +6 more
core +1 more source
Background Fever associated with malaria is the leading cause of health care-seeking in Mozambique, yet there is limited evidence on the quality of malaria case management.
Baltazar Candrinho +12 more
doaj +1 more source
ABSTRACT Pediatric gastroenteropancreatic neuroendocrine neoplasms (GEP‐NENs) are extremely rare and clinically heterogeneous. Management has largely been extrapolated from adult practice. This European Standard Clinical Practice Guideline (ESCP), developed by the EXPeRT network in collaboration with adult NEN experts, provides (adult) evidence ...
Michaela Kuhlen +23 more
wiley +1 more source
Background Nigeria adapted the WHO package of care for Advanced HIV Disease (AHD) in 2020. The package includes CD4 + cell count testing to identify People Living with HIV (PLHIV) with AHD, screening and treatment of opportunistic infections, rapid ...
Williams Eigege +20 more
doaj +1 more source
Background As surveillance is a key strategy for malaria elimination in South Africa, ensuring strong surveillance systems is a National Department of Health priority.
Craig Davies +17 more
doaj +1 more source
Modeling access control and user actions using trust - based access control policies [PDF]
This paper is a natural continuation of previous research on the implementation of confidentiality in small, medium, and virtual enterprises. This research began in 2009, with the work "Xml Based Techniques for Data Privacy in E-Business" which revealed ...
DANILESCU, Marcel
doaj +1 more source

