Results 61 to 70 of about 13,774 (222)
RBAC administration in distributed systems [PDF]
Large and distributed access control systems are increasingly common, for example in health care. In such settings, access control policies may become very complex, thus complicating correct and efficient adminstration of the access control system.
Dekker, M.A.C. +2 more
openaire +3 more sources
This article proposes an integrated design method for a 12 kV intelligent ring main unit and constructs a fault diagnosis and isolation model. Firstly, building an integrated hardware platform can significantly improve perception speed and fusion potential.
Rongrong Shan, Jieyun Qiu, Dong Han
wiley +1 more source
Recycled brick aggregates (RBAs) are produced by the process of crushing unused bricks.This approach offers an effective solution for addressing environmental degradation and limited availability of natural resources in civil engineering sector.
Lijuan Yao
doaj +1 more source
An Approach for Hierarchical RBAC Reconfiguration With Minimal Perturbation
In recent years, role-based access control (RBAC) has become the de facto access control model due to its good applicability and high flexibility.
Ning Pan +3 more
doaj +1 more source
Significance and popularity of Role-Based Access Control (RBAC) is inevitable; however, its application is highly challenging in multi-domain collaborative smart city environments.
Rubina Ghazal +5 more
doaj +1 more source
ABSTRACT Chimeric antigen receptor T (CAR‐T) cell therapies have revolutionized the treatment of hematological malignancies, achieving high response rates in patients with relapsed or refractory disease. Despite these benefits, CAR‐T cell therapies are associated with unique toxicities, including cytokine release syndrome (CRS), immune effector cell ...
Livia Donzelli +7 more
wiley +1 more source
Report on the Survey of Role-Based Access Control (RBAC) in Practice [PDF]
From literature study, we collected: (a) a set of core features of the RBAC model, according to the ANSI/INCITS 359:2004 RBAC standard, (b) implicit assumptions, (c) a set of strengths, and (d) a set of phenomena which may limit these strengths in ...
Condori-Fernándezand, Nelly +2 more
core +1 more source
Digital‐Twin‐Enabled, Time‐Aware Anomaly Detection for Industrial Cyber‐Physical Systems
The graphical abstract (Graphical Abstract figure) summarises the proposed pipeline: multivariate ICS data streams are windowed and normalised, fed into a temporal LSTM–DNN encoder and per‐sensor operating‐envelope learner, combined via calibrated fusion and finally surfaced through an operator‐facing digital twin that provides event timelines, top ...
Wulfran Fendzi Mbasso +5 more
wiley +1 more source
Trust aware cryptographic role based access control scheme for secure cloud data storage
Cloud data storage lets customers store vast amounts of data cheaply on demand. Cryptographic role-based access control (RBAC) systems preserve cloud data privacy by restricting access to users.
K. Roslin Dayana, P. Shobha Rani
doaj +1 more source
Design and Development of a Blockchain‐Enabled Decentralized Framework for Academic Microcredentials
Traditional higher education faces significant challenges, including rising costs, inflexibility, and a disconnect from workforce demands, while current credentialing systems are often centralized and vulnerable to fraud. Microcredentials have emerged as a solution, yet they lack integration into formal degree pathways and face issues with recognition ...
Abrar Mahbub Tanim +4 more
wiley +1 more source

