Results 11 to 20 of about 110,035 (237)
IMSC-EIoTD: Identity Management and Secure Communication for Edge IoT Devices
The Internet of things (IoT) will accommodate several billions of devices to the Internet to enhance human society as well as to improve the quality of living. A huge number of sensors, actuators, gateways, servers, and related end-user applications will
Kazi Masum Sadique +2 more
doaj +1 more source
The Examination of the Capacity of the Authorization in Establishing Right for the Authorized Person [PDF]
The authorization which basically causes permissibility (Arabic: اباحه) for the authorized person has an unstable nature which with the revocation of the authorizer (in the condition of the absence of inability to revoke) and in any case with one of ...
Muhammad Salehi Mazandarani +1 more
doaj +1 more source
Authentication and Authorization of Users and Services in Dynamic Military SOA Environments
The problem of user authentication and authorization is usually being solved in a single system. Federated environment assumes heterogeneity of systems, which brings the problem of mutual users and services authentication and authorization.
Bartosz Jasiul +3 more
doaj +1 more source
Aims/Introduction Tofogliflozin is a potent and highly selective sodium–glucose cotransporter 2 inhibitor that is currently used to treat patients with type 2 diabetes mellitus.
Yasuo Terauchi +7 more
doaj +1 more source
In this study, we implemented an integrated security solution with Spring Security and Keycloak open-access platform (SSK) to secure data collection and exchange over microservice architecture application programming interfaces (APIs).
Ayan Chatterjee, Andreas Prinz
doaj +1 more source
Using cloud data storage, large amounts of data can be stored by data owners in a flexible way and at low cost. Hence, there has been a major increase in online cloud service providers and their users.
Salah T. Alshammari +3 more
doaj +1 more source
The article considers the experience of Russian and leading foreign regulatory agencies in organisation and conduction of preclinical and clinical trials of human immunoglobulin products.
V. B. Ivanov +6 more
doaj +1 more source
The article discusses amendment options (no significant change, lowering of administrative burdens or exemption of certain products from the legislation) for the European Union (EU) authorization procedures of New Genomic Techniques’ (NGT) products and ...
Tomasz Zimny
doaj +1 more source
Following a request from the European Commission, EFSA was asked to deliver a scientific opinion on the safety and efficacy of Bacillus subtilis ATCC PTA‐6737 (Bacillus subtilis PB6) when used as a feed additive for turkeys for fattening, turkeys reared ...
EFSA Panel on Additives and Products or Substances used in Animal Feed (FEEDAP) +20 more
doaj +1 more source
Access Control with Delegated Authorization Policy Evaluation for Data-Driven Microservice Workflows
Microservices offer a compelling competitive advantage for building data flow systems as a choreography of self-contained data endpoints that each implement a specific data processing functionality.
Davy Preuveneers, Wouter Joosen
doaj +1 more source

