Results 71 to 80 of about 29,464,938 (335)

Access Control Models

open access: yesCybernetics and Information Technologies, 2021
Access control is a part of the security of information technologies. Access control regulates the access requests to system resources. The access control logic is formalized in models. Many access control models exist.
Penelova Maria
doaj   +1 more source

Impact of mobile phone delivered reminders and unconditional incentives on measles-containing vaccine timeliness and coverage: a randomised controlled trial in western Kenya

open access: yesBMJ Global Health, 2021
Introduction Short message service (SMS) reminders coupled with a small monetary incentive conditioned on prompt vaccination have been shown to improve first-dose measles-containing vaccine (MCV1) uptake.
Dustin G Gibson   +6 more
doaj   +1 more source

Introducing Access Control in Webdamlog [PDF]

open access: yes, 2013
We survey recent work on the specification of an access control mechanism in a collaborative environment. The work is presented in the context of the WebdamLog language, an extension of datalog to a distributed context.
Abiteboul, Serge   +4 more
core   +3 more sources

SDN Access Control for the Masses

open access: yes, 2018
The evolution of Software-Defined Networking (SDN) has so far been predominantly geared towards defining and refining the abstractions on the forwarding and control planes. However, despite a maturing south-bound interface and a range of proposed network
Gehrmann, Christian, Paladi, Nicolae
core   +1 more source

Behavior-Based Outlier Detection for Network Access Control Systems [PDF]

open access: yes, 2019
Network Access Control (NAC) systems manage the access of new devices into enterprise networks to prevent unauthorised devices from attacking network services. The main difficulty with this approach is that NAC cannot detect abnormal behaviour of devices
Dhillon Gurjeet Singh   +3 more
core   +1 more source

A Secure and Reliable Device Access Control Scheme for IoT Based Sensor Cloud Systems

open access: yesIEEE Access, 2020
Among other security concerns, the reliable device to device direct communication is an important research aspect in sensor cloud system application of Internet of things (IoT).
Shehzad Ashraf Chaudhry   +3 more
semanticscholar   +1 more source

Clinical Insights Into Hypercalcemia of Malignancy in Childhood

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Hypercalcemia of malignancy (HCM) is a rare but life‐threatening metabolic emergency in children that occurs in less than 1% of pediatric cancer cases, with a reported incidence ranging from 0.4% to 1.0% across different studies. While it is observed in 10%–20% of adult malignancies, pediatric HCM remains relatively uncommon.
Hüseyin Anıl Korkmaz
wiley   +1 more source

High levels of imported asymptomatic malaria but limited local transmission in KwaZulu-Natal, a South African malaria-endemic province nearing malaria elimination

open access: yesMalaria Journal, 2020
Background KwaZulu-Natal, one of South Africa’s three malaria endemic provinces, is nearing malaria elimination, reporting fewer than 100 locally-acquired cases annually since 2010.
Jaishree Raman   +24 more
doaj   +1 more source

A Distributed Calculus for Role-Based Access Control [PDF]

open access: yes, 2004
Role-based access control (RBAC) is increasingly attracting attention because it reduces the complexity and cost of security administration by interposing the notion of role in the assignment of permissions to users.
Braghin, C., Gorla, D., Sassone, V.
core   +6 more sources

Privacy-Preserving Data Processing with Flexible Access Control

open access: yesIEEE Transactions on Dependable and Secure Computing, 2020
Cloud computing provides an efficient and convenient platform for cloud users to store, process and control their data. Cloud overcomes the bottlenecks of resource-constrained user devices and greatly releases their storage and computing burdens. However,
Wenxiu Ding, Zheng Yan, R. Deng
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy