Static Enforcement of Role-Based Access Control [PDF]
We propose a new static approach to Role-Based Access Control (RBAC) policy enforcement. The static approach we advocate includes a new design methodology, for applications involving RBAC, which integrates the security requirements into the system's ...
Asad Ali, Maribel Fernández
doaj +5 more sources
Modified Rice Bran Arabinoxylan by Lentinus edodes Mycelial Enzyme as an Immunoceutical for Health and Aging—A Comprehensive Literature Review [PDF]
Rice bran arabinoxylan compound (RBAC) is derived from defatted rice bran enzymatically treated with Lentinus edodes mycelium. This review explores biologically active compounds and mechanisms of action that support RBAC as an immunomodulating ...
Soo Liang Ooi+2 more
doaj +2 more sources
Modified rice bran arabinoxylan as a nutraceutical in health and disease—A scoping review with bibliometric analysis [PDF]
Rice bran arabinoxylan compound (RBAC) is a polysaccharide modified by Lentinus edodes mycelial enzyme widely used as a nutraceutical. To explore translational research on RBAC, a scoping review was conducted to synthesise research evidence from English (
Soo Liang Ooi+2 more
doaj +4 more sources
Changes in the Human Gut Microbiome during Dietary Supplementation with Modified Rice Bran Arabinoxylan Compound [PDF]
This study investigated the effects of a modified rice bran arabinoxylan compound (RBAC) as a dietary supplement on the gut microbiota of healthy adults.
Emily Schupfer+5 more
doaj +2 more sources
Rice bran arabinoxylan compound as a natural product for cancer treatment – an evidence-based assessment of the effects and mechanisms [PDF]
Context Rice bran arabinoxylan compound (RBAC) is a natural immunomodulator with anticancer properties.Objective This study critically evaluates the available evidence on the biological pathways of RBAC and its effects on cancer treatment.Methods This ...
Soo Liang Ooi+3 more
doaj +2 more sources
RBAC administration in distributed systems [PDF]
Large and distributed access control systems are increasingly common, for example in health care. In such settings, access control policies may become very complex, thus complicating correct and efficient adminstration of the access control system.
M.A.C. Dekker+2 more
openalex +6 more sources
Continuous Production of Influenza VLPs Using IC-BEVS and Multi-Stage Bioreactors. [PDF]
ABSTRACT The insect cell‐baculovirus expression vector system (IC‐BEVS) has been an asset to produce biologics for over 30 years. With the current trend in biotechnology shifting toward process intensification and integration, developing intensified processes such as continuous production is crucial to hold this platform as a suitable alternative to ...
Correia R+7 more
europepmc +2 more sources
Tie-RBAC: An application of RBAC to Social Networks [PDF]
This paper explores the application of role-based access control to social networks, from the perspective of social network analysis. Each tie, composed of a relation, a sender and a receiver, involves the sender's assignation of the receiver to a role with permissions. The model is not constrained to system-defined relations and lets users define them
Tapiador, Antonio+2 more
arxiv +3 more sources
Efficacy and safety of vonoprazan–amoxicillin dual therapy for first-line treatment: a single-center, randomized, controlled trial [PDF]
Background: With the increase in antibiotic resistance, the success rate of Helicobacter pylori ( H. pylori ) eradication therapy has declined in recent years.
Xiaolei Wang+4 more
doaj +2 more sources
System for Cross-Domain Identity Management (SCIM): Survey and Enhancement With RBAC [PDF]
System for Cross-domain Identity Management (SCIM) is a schema and protocol to exchange identity data across cloud-based applications utilizing a Representational State Transfer (REST) Application Programming Interface (API).
Thomas Baumer+2 more
doaj +2 more sources