Results 151 to 160 of about 12,389 (249)

HoneyBee: Efficient Role-based Access Control for Vector Databases via Dynamic Partitioning [PDF]

open access: yesarXiv
As vector databases gain traction in enterprise applications, robust access control has become critical to safeguard sensitive data. Access control in these systems is often implemented through hybrid vector queries, which combine nearest neighbor search on vector data with relational predicates based on user permissions.
arxiv  

Segurança Multilateral e RBAC para Gerência de Contabilidade em Sistema Distribuídos

open access: bronze, 2005
Luis Marco Cáceres Alvarez   +2 more
openalex   +2 more sources

Constructing RBAC Based Security Model in u-Healthcare Service Platform [PDF]

open access: gold, 2015
Moon Sun Shin   +4 more
openalex   +1 more source

Use of Role Based Access Control for Security-Purpose Hypervisors [PDF]

open access: yes, 2013
Chadwick, David W   +2 more
core   +1 more source

A Model-driven Approach to Representing and Checking RBAC Contextual Policies [PDF]

open access: green, 2016
Ameni Ben Fadhel   +3 more
openalex   +1 more source

The RBAC System Based on Role Risk and User Trust [PDF]

open access: bronze, 2016
Caiyuan Jin, Aodong Shen, Wenxue Yu
openalex   +1 more source

Baclofen-associated neurophysiologic target engagement across species in fragile X syndrome. [PDF]

open access: yesJ Neurodev Disord, 2022
Jonak CR   +10 more
europepmc   +1 more source

Deploying ABAC policies using RBAC systems [PDF]

open access: green, 2019
Gunjan Batra   +3 more
openalex   +1 more source

Home - About - Disclaimer - Privacy