Results 51 to 60 of about 13,774 (222)

Overview of Cell Death Mechanisms Induced by Rose Bengal Acetate-Photodynamic Therapy

open access: yesInternational Journal of Photoenergy, 2011
Photodynamic Therapy (PDT) is a non-invasive treatment for different pathologies, cancer included, using three key components: non-toxic light-activated drug (Photosensitizer, PS), visible light, and oxygen.
Elisa Panzarini   +2 more
doaj   +1 more source

System for Cross-Domain Identity Management (SCIM): Survey and Enhancement With RBAC

open access: yesIEEE Access, 2023
System for Cross-domain Identity Management (SCIM) is a schema and protocol to exchange identity data across cloud-based applications utilizing a Representational State Transfer (REST) Application Programming Interface (API).
Thomas Baumer   +2 more
doaj   +1 more source

Efficient and Flexible Role-Based Access Control (EFRBAC) Mechanism for Cloud [PDF]

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2020
The cloud reduces the user’s burden to many folds. But cloud providers and cloud users with dynamic relationship, are in distinct security domains. Amongst various challenges with cloud, the crucial one is to detect and protect the user’s data from ...
Shilpi Harnal, R.K. Chauhan
doaj   +1 more source

DEVELOPMENT OF ACCESS CONTROL MODEL TO PRIVATE MEDICAL INFORMATION

open access: yesРадіоелектронні і комп'ютерні системи, 2018
Modern medicine has grown to an insurmountable level over the past decades. Today, this sector of human life is a high-tech industry, where all areas that can save lives of previously hopeless patients are successfully developing. The technical equipment
Андрій Сергійович Андрійчук   +1 more
doaj   +1 more source

Fuzzy role-based access control [PDF]

open access: yes, 2011
RBAC (Role-Based Access Control) is a widely used access control model, which reduces the maintenance cost of classical identity-based access control. However, despite the benefits of RBAC, there are environments in which RBAC can hardly be applied.
Borrell i Viader, Joan   +2 more
core   +2 more sources

Geopolitics and Aspirations for Sustainability: Turkey's Emergence as an Energy Hub

open access: yesMiddle East Policy, EarlyView.
Abstract Turkey is pursuing three main objectives in the energy sector: enhancing its geopolitical position, expanding its domestic production and renewable energy capacity, and becoming a natural gas hub linking producers from the Middle East, the Caspian region, and Russia to European markets.
Umud Shokri
wiley   +1 more source

Research on the multi-granularity method of role engineering

open access: yesFrontiers in Computational Neuroscience, 2022
The role-based access control model (RBAC) is an access control approach oriented to enterprise security policy, which plays a leading role in the field of access control due to its good applicability and flexibility.
Yongmei Jiao   +3 more
doaj   +1 more source

Explainable AI With Imbalanced Learning Strategies for Blockchain Transaction Fraud Detection

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
Research methodology pipeline for blockchain fraud detection. ABSTRACT Blockchain networks now support billions of dollars in daily transactions, making reliable and transparent fraud detection essential for maintaining user trust and financial stability.
Ahmed Abbas Jasim Al‐Hchaimi   +2 more
wiley   +1 more source

Application of the Extension RBAC Model in the Family Open Platform

open access: yesDianxin kexue, 2015
Role-based access control(RBAC)technology is one of the hotspots in the research of access control.It is of great flexibility and high efficiency.The permission of RBAC model was refined,and four elements such as object,action,domain and group were added
We Li, Jing Wang
doaj   +2 more sources

A Fault-Tolerant Emergency-Aware Access Control Scheme for Cyber-Physical Systems [PDF]

open access: yes, 2011
Access control is an issue of paramount importance in cyber-physical systems (CPS). In this paper, an access control scheme, namely FEAC, is presented for CPS. FEAC can not only provide the ability to control access to data in normal situations, but also
Lu, Dongze   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy