Results 61 to 70 of about 13,774 (222)

RBAC administration in distributed systems [PDF]

open access: yesProceedings of the 13th ACM symposium on Access control models and technologies, 2008
Large and distributed access control systems are increasingly common, for example in health care. In such settings, access control policies may become very complex, thus complicating correct and efficient adminstration of the access control system.
Dekker, M.A.C.   +2 more
openaire   +3 more sources

Integrated Design of 12 kV Intelligent Ring Main Unit With Multi‐Model Fusion and Fault Diagnosis Method

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
This article proposes an integrated design method for a 12 kV intelligent ring main unit and constructs a fault diagnosis and isolation model. Firstly, building an integrated hardware platform can significantly improve perception speed and fusion potential.
Rongrong Shan, Jieyun Qiu, Dong Han
wiley   +1 more source

Sand Cat Swarm Optimization-based prediction regressions on the elastic modulus of Recycled brick aggregates concrete

open access: yesJournal of Applied Science and Engineering
Recycled brick aggregates (RBAs) are produced by the process of crushing unused bricks.This approach offers an effective solution for addressing environmental degradation and limited availability of natural resources in civil engineering sector.
Lijuan Yao
doaj   +1 more source

An Approach for Hierarchical RBAC Reconfiguration With Minimal Perturbation

open access: yesIEEE Access, 2018
In recent years, role-based access control (RBAC) has become the de facto access control model due to its good applicability and high flexibility.
Ning Pan   +3 more
doaj   +1 more source

Agent-Based Semantic Role Mining for Intelligent Access Control in Multi-Domain Collaborative Applications of Smart Cities

open access: yesSensors, 2021
Significance and popularity of Role-Based Access Control (RBAC) is inevitable; however, its application is highly challenging in multi-domain collaborative smart city environments.
Rubina Ghazal   +5 more
doaj   +1 more source

Managing Treatment‐Emergent Immune Effector Cell‐Associated Hemophagocytic Lymphohistiocytosis‐Like Syndrome Following CAR‐T Cell Therapy: A Case‐Based Review of the use of Emapalumab

open access: yesHematological Oncology, Volume 44, Issue 1, January 2026.
ABSTRACT Chimeric antigen receptor T (CAR‐T) cell therapies have revolutionized the treatment of hematological malignancies, achieving high response rates in patients with relapsed or refractory disease. Despite these benefits, CAR‐T cell therapies are associated with unique toxicities, including cytokine release syndrome (CRS), immune effector cell ...
Livia Donzelli   +7 more
wiley   +1 more source

Report on the Survey of Role-Based Access Control (RBAC) in Practice [PDF]

open access: yes, 2012
From literature study, we collected: (a) a set of core features of the RBAC model, according to the ANSI/INCITS 359:2004 RBAC standard, (b) implicit assumptions, (c) a set of strengths, and (d) a set of phenomena which may limit these strengths in ...
Condori-Fernándezand, Nelly   +2 more
core   +1 more source

Digital‐Twin‐Enabled, Time‐Aware Anomaly Detection for Industrial Cyber‐Physical Systems

open access: yesDigital Twins and Applications, Volume 3, Issue 1, January/December 2026.
The graphical abstract (Graphical Abstract figure) summarises the proposed pipeline: multivariate ICS data streams are windowed and normalised, fed into a temporal LSTM–DNN encoder and per‐sensor operating‐envelope learner, combined via calibrated fusion and finally surfaced through an operator‐facing digital twin that provides event timelines, top ...
Wulfran Fendzi Mbasso   +5 more
wiley   +1 more source

Trust aware cryptographic role based access control scheme for secure cloud data storage

open access: yesAutomatika, 2023
Cloud data storage lets customers store vast amounts of data cheaply on demand. Cryptographic role-based access control (RBAC) systems preserve cloud data privacy by restricting access to users.
K. Roslin Dayana, P. Shobha Rani
doaj   +1 more source

Design and Development of a Blockchain‐Enabled Decentralized Framework for Academic Microcredentials

open access: yesIET Software, Volume 2026, Issue 1, 2026.
Traditional higher education faces significant challenges, including rising costs, inflexibility, and a disconnect from workforce demands, while current credentialing systems are often centralized and vulnerable to fraud. Microcredentials have emerged as a solution, yet they lack integration into formal degree pathways and face issues with recognition ...
Abrar Mahbub Tanim   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy