Results 11 to 20 of about 251,382 (296)
3AS: Authentication, Authorization, and Accountability for SDN-Based Smart Grids
Smart grid refers to the advancement of the current electric grid with the help of information and communication technologies. In such scenarios, an efficient and secure smart grid communication system is essential. Accordingly, Software-Defined Networks
Arthur A. Z. Soares +4 more
doaj +1 more source
Developing sustainable agriculture by identifying non-chemical alternative Plant Protection Products (PPP) is a cornerstone in achieving long-sought environmental friendliness.
Florența-Elena Helepciuc, Arpad Todor
doaj +1 more source
Traditional cloud-centric approaches to medical data sharing pose risks related to real-time performance, security, and stability. Medical and healthcare data encounter challenges like data silos, privacy breaches, and transmission latency.
Gaoyuan Quan +6 more
doaj +1 more source
ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware [PDF]
Billions of users rely on the security of the Android platform to protect phones, tablets, and many different types of consumer electronics. While Android's permission model is well studied, the enforcement of the protection policy has received ...
Arzt Steven +16 more
core +2 more sources
Blockchain-based cross-domain authorization system for user-centric resource sharing
User-centric data sharing is essential to encourage citizens' active participation in the digital economy. One key to smart cities, a form of the digital economy, is the promotion of public use of citizen data.
Yuki Ezawa +4 more
doaj +1 more source
Privacy Preserving Trust Authorization Framework Using XACML [PDF]
Nowadays many organizations share sensitive services\ud through open network systems and this raises the need\ud for an authorization framework that can interoperate\ud even when the parties have no pre-existing\ud relationships. Trust Negotiation is the process used to\ud establish these first relationships, through the transfer\ud of attributes ...
Mbanaso, Uche +3 more
openaire +2 more sources
Authorization Framework for Medical Data
In this paper, the authors describe an approach for sharing sensitive medical data with the consent of the data owner. The framework builds on the advantages of the Semantic Web technologies and makes it secure and robust for sharing sensitive information in a controlled environment.
Geetha Madadevaiah +4 more
openaire +2 more sources
Common controls driven conceptual leadership framework
The forthcoming social welfare and healthcare reform in Finland with its organizational, financing and steering changes challenges the leadership. All service systems levels of the social welfare and healthcare have to achieve performance objectives ...
Petteri Mussalo +6 more
doaj +1 more source
Background Midwives’ authorization to deliver the seven basic emergency obstetric and newborn care (BEmONC) functions is a core policy indicator in global monitoring frameworks, yet little evidence supports whether such data are captured accurately, or ...
Sowmya Ramesh +15 more
doaj +2 more sources
Blockchain-Based Context-Aware Authorization Management as a Service in IoT
Internet of Things (IoT) applications bring evolved and intelligent services that can help improve users’ daily lives. These applications include home automation, health care, and smart agriculture.
Tidiane Sylla +3 more
doaj +1 more source

