Results 71 to 80 of about 12,389 (249)
Leveraging Blockchain and Smart Contracts to Combat Greenwashing in Sustainable Development
ABSTRACT Blockchain technology, when combined with smart contracts, enables buyers to distinguish between greenwashed and genuinely eco‐friendly products. The presence of counterfeit items can severely impact supply chains by diminishing brand value, eroding consumer confidence, and undermining market trust.
Ragnhild Silkoset, Arne Nygaard
wiley +1 more source
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam+9 more
wiley +1 more source
Implementing RBAC Policies [PDF]
We show how role-based access control (RBAC) and temporal RBAC (TRBAC) policies may be formally represented and translated into PL/SQL code to implement practical access control policies to protect Oracle SQL databases. Performance results for an implementation of a TRBAC policy in PL/SQL are presented.
Barker, Steve+2 more
openaire +2 more sources
Trust aware cryptographic role based access control scheme for secure cloud data storage
Cloud data storage lets customers store vast amounts of data cheaply on demand. Cryptographic role-based access control (RBAC) systems preserve cloud data privacy by restricting access to users.
K. Roslin Dayana, P. Shobha Rani
doaj +1 more source
Advancing Mantle Cell Lymphoma Risk Assessment: Navigating a Moving Target
ABSTRACT Mantle cell lymphoma (MCL) is a B‐cell malignancy characterized by t(11;14)(q13;q32) translocation and heterogeneous clinical behavior. Advances in risk stratification enabled the distinction of conventional MCL (cMCL) from non‐nodal MCL (nnMCL) subtypes, which presents with distinct biological and clinical features.
Simone Ferrero, Simone Ragaini
wiley +1 more source
Report on the Survey of Role-Based Access Control (RBAC) in Practice [PDF]
From literature study, we collected: (a) a set of core features of the RBAC model, according to the ANSI/INCITS 359:2004 RBAC standard, (b) implicit assumptions, (c) a set of strengths, and (d) a set of phenomena which may limit these strengths in ...
Condori-Fernándezand, Nelly+2 more
core +1 more source
A Novel Role-based Access Control Model in Cloud Environments
In Cloud environments, the relationship between resources and users is more ad hoc and dynamic. The role-based access control (RBAC) model is an appropriate access control model for Cloud environments.
Jun Luo+3 more
doaj +1 more source
Integrating Security Controls in DevSecOps: Challenges, Solutions, and Future Research Directions
In this paper, we conducted a systematic literature review on security controls in DevSecOps. We identified 19 challenges and 18 solutions that are reported in the literature. We also identified research gaps where future research efforts should be directed.
Maysa Sinan+2 more
wiley +1 more source
RBAC with ABS - Implementation Practicalities for RBAC Integrity Policies
Role-based access control (RBAC) is the de facto access control model used in current information systems. Cryptographic access control (CAC), on the other hand, is an implementation paradigm intended to enforce AC-policies cryptographically. CAC-methods are also attractive in cloud environments due to their distributed and offline nature of operation.
openaire +2 more sources
A Cloud-ready Architecture for Shared Medical Imaging Repository
Background and Objective: Nowadays usage paradigms of medical imaging resources are requesting vendor-neutral archives, accessible through standard interfaces, with multi-repository support.
Bastião, Luís+2 more
core +1 more source