Results 71 to 80 of about 29,464,938 (335)
Access control is a part of the security of information technologies. Access control regulates the access requests to system resources. The access control logic is formalized in models. Many access control models exist.
Penelova Maria
doaj +1 more source
Introduction Short message service (SMS) reminders coupled with a small monetary incentive conditioned on prompt vaccination have been shown to improve first-dose measles-containing vaccine (MCV1) uptake.
Dustin G Gibson +6 more
doaj +1 more source
Introducing Access Control in Webdamlog [PDF]
We survey recent work on the specification of an access control mechanism in a collaborative environment. The work is presented in the context of the WebdamLog language, an extension of datalog to a distributed context.
Abiteboul, Serge +4 more
core +3 more sources
SDN Access Control for the Masses
The evolution of Software-Defined Networking (SDN) has so far been predominantly geared towards defining and refining the abstractions on the forwarding and control planes. However, despite a maturing south-bound interface and a range of proposed network
Gehrmann, Christian, Paladi, Nicolae
core +1 more source
Behavior-Based Outlier Detection for Network Access Control Systems [PDF]
Network Access Control (NAC) systems manage the access of new devices into enterprise networks to prevent unauthorised devices from attacking network services. The main difficulty with this approach is that NAC cannot detect abnormal behaviour of devices
Dhillon Gurjeet Singh +3 more
core +1 more source
A Secure and Reliable Device Access Control Scheme for IoT Based Sensor Cloud Systems
Among other security concerns, the reliable device to device direct communication is an important research aspect in sensor cloud system application of Internet of things (IoT).
Shehzad Ashraf Chaudhry +3 more
semanticscholar +1 more source
Clinical Insights Into Hypercalcemia of Malignancy in Childhood
ABSTRACT Hypercalcemia of malignancy (HCM) is a rare but life‐threatening metabolic emergency in children that occurs in less than 1% of pediatric cancer cases, with a reported incidence ranging from 0.4% to 1.0% across different studies. While it is observed in 10%–20% of adult malignancies, pediatric HCM remains relatively uncommon.
Hüseyin Anıl Korkmaz
wiley +1 more source
Background KwaZulu-Natal, one of South Africa’s three malaria endemic provinces, is nearing malaria elimination, reporting fewer than 100 locally-acquired cases annually since 2010.
Jaishree Raman +24 more
doaj +1 more source
A Distributed Calculus for Role-Based Access Control [PDF]
Role-based access control (RBAC) is increasingly attracting attention because it reduces the complexity and cost of security administration by interposing the notion of role in the assignment of permissions to users.
Braghin, C., Gorla, D., Sassone, V.
core +6 more sources
Privacy-Preserving Data Processing with Flexible Access Control
Cloud computing provides an efficient and convenient platform for cloud users to store, process and control their data. Cloud overcomes the bottlenecks of resource-constrained user devices and greatly releases their storage and computing burdens. However,
Wenxiu Ding, Zheng Yan, R. Deng
semanticscholar +1 more source

