Results 51 to 60 of about 12,389 (249)

Achieving Flexible and Self-Contained Data Protection in Cloud Computing

open access: yesIEEE Access, 2017
For enterprise systems running on public clouds in which the servers are outside the control domain of the enterprise, access control that was traditionally executed by reference monitors deployed on the system servers can no longer be trusted.
Bo Lang, Jinmiao Wang, Yanxi Liu
doaj   +1 more source

A conditional role-involved purpose-based access control model [PDF]

open access: yes, 2011
This paper presents a role-involved conditional purpose-based access control (RCPBAC) model, where a purpose is defined as the intension of data accesses or usages. RCPBAC allows users using some data for certain purpose with conditions. The structure of
Bertino, Elisa   +2 more
core   +1 more source

Implications of loosened Role-based Access Control session control implementation for the enforcement of Dynamic Mutually Exclusive Roles properties on Health Information Systems

open access: yesInformatics in Medicine Unlocked, 2021
Role-based Access Control (RBAC) session control is used in the authorization vetting of controlled objects within the system to check if a user intended action is permitted by the associated roles that he/she possesses.
Marcelo Antonio de Carvalho Junior   +1 more
doaj  

Rose Bengal acetate photodynamic therapy (RBAc-PDT) induces exposure and release of Damage-Associated Molecular Patterns (DAMPs) in human HeLa cells.

open access: yesPLoS ONE, 2014
The new concept of Immunogenic Cell Death (ICD), associated with Damage Associated Molecular Patterns (DAMPs) exposure and/or release, is recently becoming very appealing in cancer treatment.
Elisa Panzarini   +3 more
doaj   +1 more source

Secure data sharing and processing in heterogeneous clouds [PDF]

open access: yes, 2015
The extensive cloud adoption among the European Public Sector Players empowered them to own and operate a range of cloud infrastructures. These deployments vary both in the size and capabilities, as well as in the range of employed technologies and ...
Kubo, Baldur   +4 more
core   +2 more sources

Overview of Cell Death Mechanisms Induced by Rose Bengal Acetate-Photodynamic Therapy

open access: yesInternational Journal of Photoenergy, 2011
Photodynamic Therapy (PDT) is a non-invasive treatment for different pathologies, cancer included, using three key components: non-toxic light-activated drug (Photosensitizer, PS), visible light, and oxygen.
Elisa Panzarini   +2 more
doaj   +1 more source

Automated SELinux RBAC Policy Verification Using SMT [PDF]

open access: yesarXiv, 2023
Security-Enhanced Linux (SELinux) is a Linux kernel module that allows for a role-based access control (RBAC) mechanism. It provides a fine-grained security framework enabling system administrators to define security policies at the system and application level. Whilst SELinux offers robust security features through a customisable, powerful RBAC model,
arxiv  

A Survey of Access Control Models in Wireless Sensor Networks [PDF]

open access: yes, 2014
Copyright 2014 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/)Wireless sensor ...
Christianson, B.   +3 more
core   +2 more sources

Efficient and Flexible Role-Based Access Control (EFRBAC) Mechanism for Cloud [PDF]

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2020
The cloud reduces the user’s burden to many folds. But cloud providers and cloud users with dynamic relationship, are in distinct security domains. Amongst various challenges with cloud, the crucial one is to detect and protect the user’s data from ...
Shilpi Harnal, R.K. Chauhan
doaj   +1 more source

An evaluation of break-the-glass access control model for medical data in wireless sensor networks [PDF]

open access: yes, 2015
Wireless Sensor Networks (WSNs) have recently attracted a lot of attention in the research community because it is easy to deploy them in the physical environment and collect and disseminate environmental data from them.
Christianson, B.   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy