Results 71 to 80 of about 12,389 (249)

Leveraging Blockchain and Smart Contracts to Combat Greenwashing in Sustainable Development

open access: yesSustainable Development, EarlyView.
ABSTRACT Blockchain technology, when combined with smart contracts, enables buyers to distinguish between greenwashed and genuinely eco‐friendly products. The presence of counterfeit items can severely impact supply chains by diminishing brand value, eroding consumer confidence, and undermining market trust.
Ragnhild Silkoset, Arne Nygaard
wiley   +1 more source

Enabling pandemic‐resilient healthcare: Narrowband Internet of Things and edge intelligence for real‐time monitoring

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam   +9 more
wiley   +1 more source

Implementing RBAC Policies [PDF]

open access: yes, 2003
We show how role-based access control (RBAC) and temporal RBAC (TRBAC) policies may be formally represented and translated into PL/SQL code to implement practical access control policies to protect Oracle SQL databases. Performance results for an implementation of a TRBAC policy in PL/SQL are presented.
Barker, Steve   +2 more
openaire   +2 more sources

Trust aware cryptographic role based access control scheme for secure cloud data storage

open access: yesAutomatika, 2023
Cloud data storage lets customers store vast amounts of data cheaply on demand. Cryptographic role-based access control (RBAC) systems preserve cloud data privacy by restricting access to users.
K. Roslin Dayana, P. Shobha Rani
doaj   +1 more source

Advancing Mantle Cell Lymphoma Risk Assessment: Navigating a Moving Target

open access: yesHematological Oncology, Volume 43, Issue S2, June 2025.
ABSTRACT Mantle cell lymphoma (MCL) is a B‐cell malignancy characterized by t(11;14)(q13;q32) translocation and heterogeneous clinical behavior. Advances in risk stratification enabled the distinction of conventional MCL (cMCL) from non‐nodal MCL (nnMCL) subtypes, which presents with distinct biological and clinical features.
Simone Ferrero, Simone Ragaini
wiley   +1 more source

Report on the Survey of Role-Based Access Control (RBAC) in Practice [PDF]

open access: yes, 2012
From literature study, we collected: (a) a set of core features of the RBAC model, according to the ANSI/INCITS 359:2004 RBAC standard, (b) implicit assumptions, (c) a set of strengths, and (d) a set of phenomena which may limit these strengths in ...
Condori-Fernándezand, Nelly   +2 more
core   +1 more source

A Novel Role-based Access Control Model in Cloud Environments

open access: yesInternational Journal of Computational Intelligence Systems, 2016
In Cloud environments, the relationship between resources and users is more ad hoc and dynamic. The role-based access control (RBAC) model is an appropriate access control model for Cloud environments.
Jun Luo   +3 more
doaj   +1 more source

Integrating Security Controls in DevSecOps: Challenges, Solutions, and Future Research Directions

open access: yesJournal of Software: Evolution and Process, Volume 37, Issue 6, June 2025.
In this paper, we conducted a systematic literature review on security controls in DevSecOps. We identified 19 challenges and 18 solutions that are reported in the literature. We also identified research gaps where future research efforts should be directed.
Maysa Sinan   +2 more
wiley   +1 more source

RBAC with ABS - Implementation Practicalities for RBAC Integrity Policies

open access: yesProceedings of the 11th International Conference on Security and Cryptography, 2014
Role-based access control (RBAC) is the de facto access control model used in current information systems. Cryptographic access control (CAC), on the other hand, is an implementation paradigm intended to enforce AC-policies cryptographically. CAC-methods are also attractive in cloud environments due to their distributed and offline nature of operation.
openaire   +2 more sources

A Cloud-ready Architecture for Shared Medical Imaging Repository

open access: yes, 2020
Background and Objective: Nowadays usage paradigms of medical imaging resources are requesting vendor-neutral archives, accessible through standard interfaces, with multi-repository support.
Bastião, Luís   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy