Results 71 to 80 of about 13,774 (222)
Secure role based access control systems using aspect-orientation designing [PDF]
Security system designs are required to be flexible enough to support multiple policies. A security policy model always develops; accordingly, the design of a security system using that policy model should reflect the changes.
Abd Ghani, Abdul Azim +3 more
core +1 more source
The modern metropolis essentially demands the use of state‐of‐the‐art, real‐time surveillance systems, which should be reliable, scalable, and respectful of privacy at the same time. Critical shortcomings in traditional architectures are single points of failure, poor scalability, frequent data breaches, and inadequately managed privacy.
Shihab Sarar +4 more
wiley +1 more source
A Novel Role-based Access Control Model in Cloud Environments
In Cloud environments, the relationship between resources and users is more ad hoc and dynamic. The role-based access control (RBAC) model is an appropriate access control model for Cloud environments.
Jun Luo +3 more
doaj +1 more source
Securing End‐To‐End Encrypted File Sharing Services With the Messaging Layer Security Protocol
ABSTRACT Secure file sharing is essential in today's digital environment, yet many systems remain vulnerable: if an attacker steals client keys, they can often decrypt both past and future content. To address this challenge, we propose a novel file‐sharing architecture that strengthens post‐compromise security while remaining practical.
Roland Helmich, Lars Braubach
wiley +1 more source
This review explores the potential of smart textile systems for monitoring loneliness in older adults. It presents key behavioral and physiological indicators of loneliness and evaluates recent sensing and design innovations in smart textile technology. The study identifies challenges and outlines opportunities for developing user‐centered, comfortable
Yi Zhou +12 more
wiley +1 more source
Context-aware access control systems should reactively adapt access control decisions to dynamic environmental conditions. In this paper we present ERBAC – an event-driven extension of the TRBAC model that allows the specification and enforcement of general reactive policies – and its implementation.
Bonatti Piero +2 more
openaire +3 more sources
Machine learning‐enhanced NIDS, integrating diverse data sources and rigorous feature selection, achieves near‐perfect detection of sophisticated evasive cyber threats—including APTs, DDoS, zero‐day exploits, and MitM attacks—surpassing industry benchmarks in accuracy, precision, recall, and F1$$ {\mathrm{F}}_1 $$‐score. ABSTRACT Advanced cyber threats
Khandakar Md Shafin +2 more
wiley +1 more source
A Privacy Preserving Framework for RFID Based Healthcare Systems [PDF]
RFID (Radio Frequency IDentification) is anticipated to be a core technology that will be used in many practical applications of our life in near future. It has received considerable attention within the healthcare for almost a decade now. The technology’
Ahamed, Sheikh Iqbal +2 more
core +1 more source
ABSTRACT Chatbots have become widely adopted tools for improving user interactions across multiple platforms. They are advanced software applications designed to emulate human conversation across various platforms. Moreover, developing chatbots using existing platforms and frameworks presents challenges, such as the lock‐in of NLP services, and incurs ...
Lamya Benaddi +6 more
wiley +1 more source
Authorization recycling in hierarchical RBAC systems [PDF]
As distributed applications increase in size and complexity, traditional authorization architectures based on a dedicated authorization server become increasingly fragile because this decision point represents a single point of failure and a performance bottleneck.
Wei, Qiang +3 more
openaire +1 more source

