Results 81 to 90 of about 29,464,938 (335)
ABSTRACT Purpose Retinoblastoma (RB) is the most common pediatric ocular cancer, yet population‐based data on survival and risk factors remain limited. This study aimed to describe survival in a large national RB cohort and identify predictors of death and complications.
Samuel Sassine +14 more
wiley +1 more source
Event Systems and Access Control [PDF]
We consider the interpretations of notions of access control (permissions, interdictions, obligations, and user rights) as run-time properties of information systems specified as event systems with fairness.
Merz, Stephan, Méry, Dominique
core +3 more sources
Strong and Provably Secure Database Access Control
Existing SQL access control mechanisms are extremely limited. Attackers can leak information and escalate their privileges using advanced database features such as views, triggers, and integrity constraints.
Basin, David +2 more
core +1 more source
A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT
With the sharp increase in the number of intelligent devices, the Internet of Things (IoT) has gained more and more attention and rapid development in recent years.
Sheng Ding +4 more
semanticscholar +1 more source
ABSTRACT Objective To evaluate selumetinib exposure using therapeutic drug monitoring (TDM) in pediatric patients with neurofibromatosis type 1 (NF1) and plexiform neurofibromas (PN), assess interpatient pharmacokinetic variability, and explore the relationship between drug exposure, clinical response, and adverse effects.
Janka Kovács +8 more
wiley +1 more source
Evaluating the quality of routinely reported data on malaria commodity stocks in Guinea, 2014–2016
Background Ensuring malaria commodity availability at health facilities is a cornerstone of malaria control. Since 2013, the Guinea National Malaria Control Programme has been routinely collecting data on stock levels of key malaria commodities through a
Yu Sun +10 more
doaj +1 more source
A flexible mandatory access control policy for XML databases [PDF]
A flexible mandatory access control policy (MAC) for XML databases is presented in this paper. The label type and label access policy can be defined according to the requirements of applications.
Jin, R, Lü, K, Zhu, H
core +1 more source
In traditional cloud storage systems, attribute-based encryption (ABE) is regarded as an important technology for solving the problem of data privacy and fine-grained access control.
Shangping Wang +2 more
semanticscholar +1 more source
ABSTRACT Arteriovenous malformations (AVMs) are rare, high‐flow, vascular anomalies that can occur either sporadically or as part of a genetic syndrome. AVMs can progress with serious morbidity and even mortality if left unchecked. Sirolimus is an mTOR inhibitor that is effective in low‐flow vascular malformations; however, its role in AVMs is unclear.
Will Swansson +3 more
wiley +1 more source
Strengthening Laboratory Management Towards Accreditation: The Lesotho experience
Introduction: The Lesotho Ministry of Health and Social Welfare’s (MOHSW) 5-year strategic plan, as well as their national laboratory policy and yearly operational plans, directly addresses issues of accreditation, indicating their commitment to ...
David Mothabeng +5 more
doaj +1 more source

