Results 1 to 10 of about 110,035 (237)
Consensus of regulatory decisions on the same Marketing Authorization Application (MAA) are critical for stakeholders. In this context, regulatory decision patterns from the Swissmedic (SMC), the US Food and Drug Administration (FDA), and the European ...
Ulrich‐P. Rohr +10 more
doaj +1 more source
Enhancing JWT Authentication and Authorization in Web Applications Based on User Behavior History
The rapid growth of the web has transformed our daily lives and the need for secure user authentication and authorization has become a crucial aspect of web-based services.
Ahmet Bucko +3 more
doaj +1 more source
Protecting the resources of a cloud-native application is essential to meet an organization’s security goals. Cloud-native applications manage thousands of user requests, and an organization must employ a proper access control mechanism.
Md Shahidur Rahaman +3 more
doaj +1 more source
Regulatory Requirements for Exporting Cosmetic Products to Extra-EU Countries
In this study, an overview of the regulations in force in some extra-EU states belonging to different geoeconomic areas is provided, starting from the current EU legislation on cosmetic products.
Silvia Morel +4 more
doaj +1 more source
Systematic Review of Authentication and Authorization Advancements for the Internet of Things
Technologies for the Internet of Things (IoT) are maturing, yet no common standards dictate their direction, leaving space for a plethora of research directions and opportunities. Among the most important IoT topics is security.
Michal Trnka +4 more
doaj +1 more source
The Role of Regulator-Imposed Post-Approval Studies in Health Technology Assessments for Conditionally Approved Drugs [PDF]
BackgroundThe European Medicines Agency (EMA) aims to resolve uncertainties associated with conditionally approved drugs by imposing post-approval studies.
Rick A. Vreman +8 more
doaj +1 more source
Authentication and authorization constitute the essential security component, access control, for preventing unauthorized access to cloud services in mobile cloud computing (MCC) environments.
Linsheng Yu +4 more
doaj +1 more source
Blockchain-Based Authentication and Trust Management Mechanism for Smart Cities
Security has always been the main concern for the internet of things (IoT)-based systems. Blockchain, with its decentralized and distributed design, prevents the risks of the existing centralized methodologies.
Muhammad Asif +5 more
doaj +1 more source
Modeling access control and user actions using trust - based access control policies [PDF]
This paper is a natural continuation of previous research on the implementation of confidentiality in small, medium, and virtual enterprises. This research began in 2009, with the work "Xml Based Techniques for Data Privacy in E-Business" which revealed ...
DANILESCU, Marcel
doaj +1 more source
IPTV Access Methods with RADIUS-Server Authorization [PDF]
Security is one of the most important aspects of data transmission. To provide controlled access to the network, user authorization and authentication are often used with the help of an AAA server.
Maxim Mikhailovich Kovtsur +5 more
doaj +1 more source

