Results 311 to 320 of about 5,834,162 (365)

The role of circular RNAs in regulating cytokine signaling in cancer

open access: yesFEBS Open Bio, EarlyView.
Cytokines present in the tumor microenvironment fuel cancer development. Aberrant expression of circRNAs contributes to cancer progression. Cytokines are involved in regulating circRNA biogenesis. Furthermore, aberrantly expressed circRNAs regulate the expression of ligands, receptors, and downstream effectors involved in cytokine signaling to promote ...
Vandana Joshi   +4 more
wiley   +1 more source

Addressing influenza in Bangladesh: closing evidence and policy gaps with strategic interventions. [PDF]

open access: yesLancet Reg Health Southeast Asia
Hassan MZ   +9 more
europepmc   +1 more source

Development of 4T1 breast cancer mouse model system for preclinical carbonic anhydrase IX studies

open access: yesFEBS Open Bio, EarlyView.
Carbonic anhydrase IX (CAIX) is a well‐recognised therapeutic target and prognostic biomarker in cancer. We developed and characterised a robust murine breast cancer model system that is suitable for CAIX studies in vitro and in vivo—it comprises both CAIX‐positive and CAIX‐negative controls and provides a solid platform for the comprehensive ...
Zane Kalniņa   +13 more
wiley   +1 more source

Knockout of the mitoribosome rescue factors Ict1 or Mtrfr is viable in zebrafish but not mice: compensatory mechanisms underlying each factor's loss

open access: yesFEBS Open Bio, EarlyView.
Mitochondria contain two mitoribosome rescue factors, ICT1 and MTRFR (C12orf65). ICT1 also functions as a mitoribosomal protein in mice and humans, and its loss is lethal. Although Mtrfr knockout mice could not be generated, knockout zebrafish lines for ict1 and mtrfr were established.
Nobukazu Nameki   +11 more
wiley   +1 more source

Reconciling role based management and role based access control [PDF]

open access: bronzeProceedings of the second ACM workshop on Role-based access control - RBAC '97, 1997
Role Based Access Control is only a subset of the security management and distributed systems management. Yet, the characteristics and use of the role objects in RBAC or Role Based Management (RBM) may differ significantly. In this paper we outline a Role Management Framework based on the specification of policies and examine its differences and ...
Emil Lupu, Morris Sloman
openaire   +3 more sources
Some of the next articles are maybe not open access.

Related searches:

Role-based access control models

Computer, 1996
Security administration of large systems is complex, but it can be simplified by a role-based access control approach. This article explains why RBAC is receiving renewed attention as a method of security administration and review, describes a framework of four reference models developed to better understand RBAC and categorizes different ...
H.L. Feinstein   +3 more
openaire   +3 more sources

Dynamic Role-Based Access Control Policy for Smart Grid Applications: An Offline Deep Reinforcement Learning Approach

IEEE Transactions on Human-Machine Systems, 2022
Role-based access control (RBAC) is adopted in the information and communication technology domain for authentication purposes. However, due to a very large number of entities within organizational access control (AC) systems, static RBAC management can ...
G. Fragkos, Jay Johnson, E. Tsiropoulou
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy