Results 61 to 70 of about 18,941 (248)

Time-based and privacy protection revocable and traceable data sharing scheme in cloud computing

open access: yesTongxin xuebao, 2021
General ciphertext-policy attribute-based encryption (CP-ABE) provides fine-grained access control for data sharing in cloud computing, but its plaintext formed access policy may cause leakage of private and sensitive data.And revoking a malicious user ...
Jiawei ZHANG   +3 more
doaj   +2 more sources

Internet X.509 Public Key Infrastructure Operational Protocols -- LDAPv3 [PDF]

open access: yes, 2002
This document describes the features of the Lightweight Directory Access Protocol v3 that are needed in order to support a public key infrastructure based on X.509 certificates and ...
Chadwick, David W.
core  

Brexit and Its Impact on EU Financial Markets

open access: yesInternational Journal of Finance &Economics, EarlyView.
ABSTRACT We investigate the impact of Brexit on volatility spillovers across the EU countries. We introduce a Brexit intensity measure that assigns an intensity score reflective of the financial markets' reaction to the events that occurred as Brexit negotiations began to unfold.
Marwan Izzeldin   +3 more
wiley   +1 more source

User oriented access to secure biomedical resources through the grid [PDF]

open access: yes, 2006
The life science domain is typified by heterogeneous data sets that are evolving at an exponential rate. Numerous post-genomic databases and areas of post-genomic life science research have been established and are being actively explored. Whilst many of
Ajayi, O.   +4 more
core   +3 more sources

Measuring Organizational Resilience in a Resource‐Constrained Environment: An Empirical Study of Micro‐and‐Small‐Service‐Enterprises (MSSEs) in Nigeria

open access: yesStrategic Change, EarlyView.
ABSTRACT There is growing evidence that a preponderance of resilience indicators discussed in management scholarship is often developed with limited consideration of the context in which micro‐and‐small‐service enterprises (MSSEs) operate. Given their strategic relevance to developing economies, it thus becomes necessary to understand the meaning of ...
Justin Okoli   +2 more
wiley   +1 more source

Progress on the Application of Polymers of Intrinsic Microporosity for the Adsorption of Organic Contaminants

open access: yesChemistryOpen, EarlyView.
The pictorial illustration of the applications of polymers of intrinsic microporosity extraordinary porous organic polymers with high surface areas, pore radii, pore volumes, high permeability, high diffusivity, high selectivity, and high thermal stability, as suitable filters or purifiers for water contaminated with pharmaceutical and organic dyes ...
Martins O. Omorogie
wiley   +1 more source

ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments [PDF]

open access: yes, 2013
The enforcement of security policies in outsourced environments is still an open challenge for policy-based systems. On the one hand, taking the appropriate security decision requires access to the policies.
Asghar, Muhammad Rizwan   +3 more
core   +1 more source

LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments

open access: yes, 2008
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile ...
Beheshti, A. A., Toorani, M.
core   +3 more sources

Synthesis of Pyrido[2,3‐d]Azolopyrimidinones: Design and Epidermal Growth Factor Receptor‐Targeted Molecular Docking Toward Novel Anticancer Leads

open access: yesChemistryOpen, EarlyView.
New pyrido[2,3‐d]azolopyrimidinones were synthesized and evaluated as potent EGFR‐targeted anticancer leads. Molecular docking and cytotoxicity studies revealed strong receptor binding and submicromolar activity, highlighting this scaffold as a promising framework for future targeted drug development.
Sobhi M. Gomha   +6 more
wiley   +1 more source

Blockchain-Based Traceable Multi-Level Revocation Attribute-Based Encryption

open access: yesIEEE Access
With the development of cloud computing and big data, data security and privacy protection in multi-user environments have become particularly important.
Zhigang Xu   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy