Results 311 to 320 of about 5,834,162 (365)
The role of circular RNAs in regulating cytokine signaling in cancer
Cytokines present in the tumor microenvironment fuel cancer development. Aberrant expression of circRNAs contributes to cancer progression. Cytokines are involved in regulating circRNA biogenesis. Furthermore, aberrantly expressed circRNAs regulate the expression of ligands, receptors, and downstream effectors involved in cytokine signaling to promote ...
Vandana Joshi+4 more
wiley +1 more source
Addressing influenza in Bangladesh: closing evidence and policy gaps with strategic interventions. [PDF]
Hassan MZ+9 more
europepmc +1 more source
Development of 4T1 breast cancer mouse model system for preclinical carbonic anhydrase IX studies
Carbonic anhydrase IX (CAIX) is a well‐recognised therapeutic target and prognostic biomarker in cancer. We developed and characterised a robust murine breast cancer model system that is suitable for CAIX studies in vitro and in vivo—it comprises both CAIX‐positive and CAIX‐negative controls and provides a solid platform for the comprehensive ...
Zane Kalniņa+13 more
wiley +1 more source
Mitochondria contain two mitoribosome rescue factors, ICT1 and MTRFR (C12orf65). ICT1 also functions as a mitoribosomal protein in mice and humans, and its loss is lethal. Although Mtrfr knockout mice could not be generated, knockout zebrafish lines for ict1 and mtrfr were established.
Nobukazu Nameki+11 more
wiley +1 more source
Reconciling role based management and role based access control [PDF]
Role Based Access Control is only a subset of the security management and distributed systems management. Yet, the characteristics and use of the role objects in RBAC or Role Based Management (RBM) may differ significantly. In this paper we outline a Role Management Framework based on the specification of policies and examine its differences and ...
Emil Lupu, Morris Sloman
openaire +3 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Role-based access control models
Computer, 1996Security administration of large systems is complex, but it can be simplified by a role-based access control approach. This article explains why RBAC is receiving renewed attention as a method of security administration and review, describes a framework of four reference models developed to better understand RBAC and categorizes different ...
H.L. Feinstein+3 more
openaire +3 more sources
IEEE Transactions on Human-Machine Systems, 2022
Role-based access control (RBAC) is adopted in the information and communication technology domain for authentication purposes. However, due to a very large number of entities within organizational access control (AC) systems, static RBAC management can ...
G. Fragkos, Jay Johnson, E. Tsiropoulou
semanticscholar +1 more source
Role-based access control (RBAC) is adopted in the information and communication technology domain for authentication purposes. However, due to a very large number of entities within organizational access control (AC) systems, static RBAC management can ...
G. Fragkos, Jay Johnson, E. Tsiropoulou
semanticscholar +1 more source