Results 11 to 20 of about 110,035 (237)

IMSC-EIoTD: Identity Management and Secure Communication for Edge IoT Devices

open access: yesSensors, 2020
The Internet of things (IoT) will accommodate several billions of devices to the Internet to enhance human society as well as to improve the quality of living. A huge number of sensors, actuators, gateways, servers, and related end-user applications will
Kazi Masum Sadique   +2 more
doaj   +1 more source

The Examination of the Capacity of the Authorization in Establishing Right for the Authorized Person [PDF]

open access: yesآموزه‌‌های فقه مدني, 2021
The authorization which basically causes permissibility (Arabic: اباحه) for the authorized person has an unstable nature which with the revocation of the authorizer (in the condition of the absence of inability to revoke) and in any case with one of ...
Muhammad Salehi Mazandarani   +1 more
doaj   +1 more source

Authentication and Authorization of Users and Services in Dynamic Military SOA Environments

open access: yesJournal of Telecommunications and Information Technology, 2023
The problem of user authentication and authorization is usually being solved in a single system. Federated environment assumes heterogeneity of systems, which brings the problem of mutual users and services authentication and authorization.
Bartosz Jasiul   +3 more
doaj   +1 more source

Long‐term safety and efficacy of the sodium–glucose cotransporter 2 inhibitor, tofogliflozin, added on glucagon‐like peptide‐1 receptor agonist in Japanese patients with type 2 diabetes mellitus: A 52‐week open‐label, multicenter, post‐marketing clinical study

open access: yesJournal of Diabetes Investigation, 2019
Aims/Introduction Tofogliflozin is a potent and highly selective sodium–glucose cotransporter 2 inhibitor that is currently used to treat patients with type 2 diabetes mellitus.
Yasuo Terauchi   +7 more
doaj   +1 more source

Applying Spring Security Framework with KeyCloak-Based OAuth2 to Protect Microservice Architecture APIs: A Case Study

open access: yesSensors, 2022
In this study, we implemented an integrated security solution with Spring Security and Keycloak open-access platform (SSK) to secure data collection and exchange over microservice architecture application programming interfaces (APIs).
Ayan Chatterjee, Andreas Prinz
doaj   +1 more source

Trust Management Systems in Cloud Services Environment: Taxonomy of Reputation Attacks and Defense Mechanisms

open access: yesIEEE Access, 2021
Using cloud data storage, large amounts of data can be stored by data owners in a flexible way and at low cost. Hence, there has been a major increase in online cloud service providers and their users.
Salah T. Alshammari   +3 more
doaj   +1 more source

METHODOLOGICAL APPROACHES TO EXPERT EVALUATION OF PRECLINICAL AND CLINICAL TRIALS OF HUMAN IMMUNOGLOBULIN PRODUCTS

open access: yesМедицинская иммунология, 2017
The article considers the experience of Russian and leading foreign regulatory agencies in organisation and conduction of preclinical and clinical trials of human immunoglobulin products.
V. B. Ivanov   +6 more
doaj   +1 more source

New genomic techniques and their European Union reform. Potential policy changes and their implications

open access: yesFrontiers in Bioengineering and Biotechnology, 2022
The article discusses amendment options (no significant change, lowering of administrative burdens or exemption of certain products from the legislation) for the European Union (EU) authorization procedures of New Genomic Techniques’ (NGT) products and ...
Tomasz Zimny
doaj   +1 more source

Safety and efficacy of a feed additive consisting of Bacillus velezensis ATCC PTA‐6737 (Bacillus velezensis PB6) for turkeys for fattening, turkeys reared for breeding, laying hens, minor poultry species for laying, piglets (weaned), weaned minor porcine species and sows (Kemin Europe N.V.)

open access: yesEFSA Journal, 2022
Following a request from the European Commission, EFSA was asked to deliver a scientific opinion on the safety and efficacy of Bacillus subtilis ATCC PTA‐6737 (Bacillus subtilis PB6) when used as a feed additive for turkeys for fattening, turkeys reared ...
EFSA Panel on Additives and Products or Substances used in Animal Feed (FEEDAP)   +20 more
doaj   +1 more source

Access Control with Delegated Authorization Policy Evaluation for Data-Driven Microservice Workflows

open access: yesFuture Internet, 2017
Microservices offer a compelling competitive advantage for building data flow systems as a choreography of self-contained data endpoints that each implement a specific data processing functionality.
Davy Preuveneers, Wouter Joosen
doaj   +1 more source

Home - About - Disclaimer - Privacy