Results 121 to 130 of about 12,389 (249)

The Golgi apparatus is a primary site of intracellular damage after photosensitization with Rose Bengal acetate

open access: yesEuropean Journal of Histochemistry, 2009
The aim of the present investigation was to elucidate whether the Golgi apparatus undergoes photodamage following administration of the fluorogenic substrates Rose Bengal acetate (RBAc) and irradiation at the appropriate wavelength. Human HeLa cells were
C Soldani   +5 more
doaj   +1 more source

RBAC on the Web by Secure Cookies [PDF]

open access: bronze, 2000
Joonsoo Park   +2 more
openalex   +1 more source

The Equivalent Conversions of the Role-Based Access Control Model [PDF]

open access: yesCEUR Workshop Proceedings. 2017. Vol. 2081 (Selected Papers of the VIII All-Russian Scientific and Technical Conference on Secure Information Technologies, BIT 2017). P. 11-14, 2018
The problems which are important for the effective functioning of an access control policy in a large information system (LIS) are selected. The general concept of a local optimization of a role-based access control (RBAC) model is formulated. The optimization criteria are proposed.
arxiv  

The Next 700 Policy Miners: A Universal Method for Building Policy Miners [PDF]

open access: yesarXiv, 2019
A myriad of access control policy languages have been and continue to be proposed. The design of policy miners for each such language is a challenging task that has required specialized machine learning and combinatorial algorithms. We present an alternative method, universal access control policy mining (Unicorn).
arxiv  

Poster Sessions

open access: yes
HemaSphere, Volume 9, Issue S1, June 2025.
wiley   +1 more source

Trust-Aware RBAC

open access: yes, 2012
In this paper we propose a trust-aware enhancement of RBAC (TA-RBAC) that takes trustworthiness of users into consideration explicitly before granting access. We assume that each role in the framework is associated with an expression that describe trustworthiness of subjects required to be able to activate the role, and each subject (user) has assigned
openaire   +3 more sources

Semantic security: specification and enforcement of semantic policies for security-driven collaborations [PDF]

open access: yes, 2009
Collaborative research can often have demands on finer-grained security that go beyond the authentication-only paradigm as typified by many e-Infrastructure/Grid based solutions.
Doherty, T.   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy