Results 61 to 70 of about 18,941 (248)
Time-based and privacy protection revocable and traceable data sharing scheme in cloud computing
General ciphertext-policy attribute-based encryption (CP-ABE) provides fine-grained access control for data sharing in cloud computing, but its plaintext formed access policy may cause leakage of private and sensitive data.And revoking a malicious user ...
Jiawei ZHANG +3 more
doaj +2 more sources
Internet X.509 Public Key Infrastructure Operational Protocols -- LDAPv3 [PDF]
This document describes the features of the Lightweight Directory Access Protocol v3 that are needed in order to support a public key infrastructure based on X.509 certificates and ...
Chadwick, David W.
core
Brexit and Its Impact on EU Financial Markets
ABSTRACT We investigate the impact of Brexit on volatility spillovers across the EU countries. We introduce a Brexit intensity measure that assigns an intensity score reflective of the financial markets' reaction to the events that occurred as Brexit negotiations began to unfold.
Marwan Izzeldin +3 more
wiley +1 more source
User oriented access to secure biomedical resources through the grid [PDF]
The life science domain is typified by heterogeneous data sets that are evolving at an exponential rate. Numerous post-genomic databases and areas of post-genomic life science research have been established and are being actively explored. Whilst many of
Ajayi, O. +4 more
core +3 more sources
ABSTRACT There is growing evidence that a preponderance of resilience indicators discussed in management scholarship is often developed with limited consideration of the context in which micro‐and‐small‐service enterprises (MSSEs) operate. Given their strategic relevance to developing economies, it thus becomes necessary to understand the meaning of ...
Justin Okoli +2 more
wiley +1 more source
The pictorial illustration of the applications of polymers of intrinsic microporosity extraordinary porous organic polymers with high surface areas, pore radii, pore volumes, high permeability, high diffusivity, high selectivity, and high thermal stability, as suitable filters or purifiers for water contaminated with pharmaceutical and organic dyes ...
Martins O. Omorogie
wiley +1 more source
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments [PDF]
The enforcement of security policies in outsourced environments is still an open challenge for policy-based systems. On the one hand, taking the appropriate security decision requires access to the policies.
Asghar, Muhammad Rizwan +3 more
core +1 more source
LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile ...
Beheshti, A. A., Toorani, M.
core +3 more sources
New pyrido[2,3‐d]azolopyrimidinones were synthesized and evaluated as potent EGFR‐targeted anticancer leads. Molecular docking and cytotoxicity studies revealed strong receptor binding and submicromolar activity, highlighting this scaffold as a promising framework for future targeted drug development.
Sobhi M. Gomha +6 more
wiley +1 more source
Blockchain-Based Traceable Multi-Level Revocation Attribute-Based Encryption
With the development of cloud computing and big data, data security and privacy protection in multi-user environments have become particularly important.
Zhigang Xu +5 more
doaj +1 more source

