Overview of Cell Death Mechanisms Induced by Rose Bengal Acetate-Photodynamic Therapy
Photodynamic Therapy (PDT) is a non-invasive treatment for different pathologies, cancer included, using three key components: non-toxic light-activated drug (Photosensitizer, PS), visible light, and oxygen.
Elisa Panzarini +2 more
doaj +1 more source
System for Cross-Domain Identity Management (SCIM): Survey and Enhancement With RBAC
System for Cross-domain Identity Management (SCIM) is a schema and protocol to exchange identity data across cloud-based applications utilizing a Representational State Transfer (REST) Application Programming Interface (API).
Thomas Baumer +2 more
doaj +1 more source
Efficient and Flexible Role-Based Access Control (EFRBAC) Mechanism for Cloud [PDF]
The cloud reduces the user’s burden to many folds. But cloud providers and cloud users with dynamic relationship, are in distinct security domains. Amongst various challenges with cloud, the crucial one is to detect and protect the user’s data from ...
Shilpi Harnal, R.K. Chauhan
doaj +1 more source
DEVELOPMENT OF ACCESS CONTROL MODEL TO PRIVATE MEDICAL INFORMATION
Modern medicine has grown to an insurmountable level over the past decades. Today, this sector of human life is a high-tech industry, where all areas that can save lives of previously hopeless patients are successfully developing. The technical equipment
Андрій Сергійович Андрійчук +1 more
doaj +1 more source
Fuzzy role-based access control [PDF]
RBAC (Role-Based Access Control) is a widely used access control model, which reduces the maintenance cost of classical identity-based access control. However, despite the benefits of RBAC, there are environments in which RBAC can hardly be applied.
Borrell i Viader, Joan +2 more
core +2 more sources
Geopolitics and Aspirations for Sustainability: Turkey's Emergence as an Energy Hub
Abstract Turkey is pursuing three main objectives in the energy sector: enhancing its geopolitical position, expanding its domestic production and renewable energy capacity, and becoming a natural gas hub linking producers from the Middle East, the Caspian region, and Russia to European markets.
Umud Shokri
wiley +1 more source
Research on the multi-granularity method of role engineering
The role-based access control model (RBAC) is an access control approach oriented to enterprise security policy, which plays a leading role in the field of access control due to its good applicability and flexibility.
Yongmei Jiao +3 more
doaj +1 more source
Explainable AI With Imbalanced Learning Strategies for Blockchain Transaction Fraud Detection
Research methodology pipeline for blockchain fraud detection. ABSTRACT Blockchain networks now support billions of dollars in daily transactions, making reliable and transparent fraud detection essential for maintaining user trust and financial stability.
Ahmed Abbas Jasim Al‐Hchaimi +2 more
wiley +1 more source
Application of the Extension RBAC Model in the Family Open Platform
Role-based access control(RBAC)technology is one of the hotspots in the research of access control.It is of great flexibility and high efficiency.The permission of RBAC model was refined,and four elements such as object,action,domain and group were added
We Li, Jing Wang
doaj +2 more sources
A Fault-Tolerant Emergency-Aware Access Control Scheme for Cyber-Physical Systems [PDF]
Access control is an issue of paramount importance in cyber-physical systems (CPS). In this paper, an access control scheme, namely FEAC, is presented for CPS. FEAC can not only provide the ability to control access to data in normal situations, but also
Lu, Dongze +3 more
core +1 more source

