Results 51 to 60 of about 29,464,938 (335)

Network layer access control for context-aware IPv6 applications [PDF]

open access: yes, 2003
As part of the Lancaster GUIDE II project, we have developed a novel wireless access point protocol designed to support the development of next generation mobile context-aware applications in our local environs.
Cheverst, Keith   +5 more
core   +2 more sources

Fast Desynchronization For Decentralized Multichannel Medium Access Control [PDF]

open access: yes, 2015
Distributed desynchronization algorithms are key to wireless sensor networks as they allow for medium access control in a decentralized manner. In this paper, we view desynchronization primitives as iterative methods that solve optimization problems.
Andreopoulos, Yiannis   +3 more
core   +2 more sources

Data Sharing System Integrating Access Control Mechanism using Blockchain-Based Smart Contracts for IoT Devices

open access: yesApplied Sciences, 2020
In this paper, a blockchain-based data sharing and access control system is proposed, for communication between the Internet of Things (IoT) devices. The proposed system is intended to overcome the issues related to trust and authentication for access ...
Tanzeela Sultana   +5 more
semanticscholar   +1 more source

MUTATION TESTING OF ACCESS CONTROL POLICIES

open access: yesСучасні інформаційні системи, 2021
One of the most important and integral components of modern computer security are access control systems. The objective of an access control system (ACS) is often described in terms of protecting system resources against inappropriate or unwanted user ...
Galina Cherneva, Pavlо Khalimov
doaj   +1 more source

Distributed Access Control with Blockchain

open access: yes, 2019
The specification and enforcement of network-wide policies in a single administrative domain is common in today's networks and considered as already resolved. However, this is not the case for multi-administrative domains, e.g.
Cabellos, Albert   +6 more
core   +1 more source

Quality of malaria services offered in public health facilities in three provinces of Mozambique: a cross-sectional study

open access: yesMalaria Journal, 2019
Background Fever associated with malaria is the leading cause of health care-seeking in Mozambique, yet there is limited evidence on the quality of malaria case management.
Baltazar Candrinho   +12 more
doaj   +1 more source

European Standard Clinical Practice Guideline and EXPeRT Recommendations for the Diagnosis and Management of Gastroenteropancreatic Neuroendocrine Neoplasms in Children and Adolescents

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Pediatric gastroenteropancreatic neuroendocrine neoplasms (GEP‐NENs) are extremely rare and clinically heterogeneous. Management has largely been extrapolated from adult practice. This European Standard Clinical Practice Guideline (ESCP), developed by the EXPeRT network in collaboration with adult NEN experts, provides (adult) evidence ...
Michaela Kuhlen   +23 more
wiley   +1 more source

Implementation of the advanced HIV disease package of care using a public health approach: lessons from Nigeria

open access: yesBMC Public Health
Background Nigeria adapted the WHO package of care for Advanced HIV Disease (AHD) in 2020. The package includes CD4 + cell count testing to identify People Living with HIV (PLHIV) with AHD, screening and treatment of opportunistic infections, rapid ...
Williams Eigege   +20 more
doaj   +1 more source

Effectiveness of 24-h mobile reporting tool during a malaria outbreak in Mpumalanga Province, South Africa

open access: yesMalaria Journal, 2019
Background As surveillance is a key strategy for malaria elimination in South Africa, ensuring strong surveillance systems is a National Department of Health priority.
Craig Davies   +17 more
doaj   +1 more source

Modeling access control and user actions using trust - based access control policies [PDF]

open access: yesJournal of Social Sciences, 2020
This paper is a natural continuation of previous research on the implementation of confidentiality in small, medium, and virtual enterprises. This research began in 2009, with the work "Xml Based Techniques for Data Privacy in E-Business" which revealed ...
DANILESCU, Marcel
doaj   +1 more source

Home - About - Disclaimer - Privacy