Results 41 to 50 of about 251,382 (296)

Blockchain-based access management framework for interoperable digital twins in industrial IoT

open access: yesFrontiers in Blockchain
IntroductionDigital Twins (DT) have appeared as a significant tool in Industrial Internet of Things (IIoT) environments, allowing real-time monitoring, predictive maintenance, and maximizing device performance.
Gauhar Ali   +3 more
doaj   +1 more source

Congressional Authorization and the War on Terrorism [PDF]

open access: yes, 2005
This Article presents a framework for interpreting Congress\u27s September 18, 2001 Authorization for Use of Military Force (AUMF), the central statutory enactment related to the war on terrorism.
Bradley, Curtis A., Goldsmith, Jack L.
core   +2 more sources

Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures (Full version)

open access: yes, 2009
A widespread design approach in distributed applications based on the service-oriented paradigm, such as web-services, consists of clearly separating the enforcement of authorization policies and the workflow of the applications, so that the interplay ...
Barletta, Michele   +2 more
core   +2 more sources

Utility of Computed Tomography Surveillance of Asymptomatic Infection in Children and Young Adults Before Allogeneic Hematopoietic Stem Cell Transplant

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Asymptomatic infection poses a significant risk for children undergoing hematopoietic stem cell transplantation (HSCT). Pre‐transplant surveillance computed tomography (CT) is commonly used to identify occult infection, though its diagnostic yield remains uncertain.
Tyler Obermark   +9 more
wiley   +1 more source

Demystifying Employment Authorization and Prosecutorial Discretion in Immigration Cases

open access: yesColumbia Journal of Race and Law, 2015
On November 20, 2014, President Barack Obama announced a series of immigration programs aimed to reform the immigration system. Deferred Action for Parents of Americans or Lawful Permanent Residents (DAPA) and extended Deferred Action for Childhood ...
Shoba Sivaprasad Wadhia
doaj   +1 more source

xDBAuth: Blockchain Based Cross Domain Authentication and Authorization Framework for Internet of Things

open access: yesIEEE Access, 2020
The innovation of ubiquitous and pervasive computing helps service-oriented organizations in the realization of a virtual coalition. The virtual coalition is a set of IoT domains i.e., smart homes and smart hospitals that are linked together through ...
Gauhar Ali   +6 more
doaj   +1 more source

Using Force on Land to Suppress Piracy at Sea: The Legal Landscape of a Largely Untapped Strategy [PDF]

open access: yes, 2013
On May 14, 2012, a combat helicopter operated by European Union Naval Forces (EUNAVFOR) struck a pirate base ashore in Somalia. The raid destroyed several fiberglass skiffs on the beach in Haradheere, a town on the coast of central Somalia.
Obert, Steven R.
core   +3 more sources

Unheard and Under‐Supported: Health‐Related Quality of Life in Children, Adolescents, and Young Adults With Sickle Cell Disease

open access: yesPediatric Blood &Cancer, EarlyView.
Abstract Background Sickle cell disease (SCD) is an autosomal recessive hemoglobinopathy affecting millions of individuals worldwide. The clinical expression and psychosocial burden of SCD vary widely across geographical, cultural, and healthcare system contexts, underscoring the need for setting‐specific approaches to assessment.
Desiré Fantasia   +7 more
wiley   +1 more source

Imaging of High‐Risk Neuroblastoma: Recommendations From SIOPEN Radiology and Nuclear Medicine Specialty Committees

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Neuroblastoma is the most common extracranial solid tumor in early childhood. Its clinical behavior is highly variable, ranging from spontaneous regression to fatal outcome despite intensive treatment. The International Society of Pediatric Oncology Europe Neuroblastoma Group (SIOPEN) Radiology and Nuclear Medicine Specialty Committees ...
Annemieke Littooij   +11 more
wiley   +1 more source

Access Control with Delegated Authorization Policy Evaluation for Data-Driven Microservice Workflows

open access: yesFuture Internet, 2017
Microservices offer a compelling competitive advantage for building data flow systems as a choreography of self-contained data endpoints that each implement a specific data processing functionality.
Davy Preuveneers, Wouter Joosen
doaj   +1 more source

Home - About - Disclaimer - Privacy