Results 1 to 10 of about 305,823 (288)

Software implementation of protection against unauthorized access

open access: yesБезопасность информационных технологий, 2023
Information security tools are an integral part of system users. The concept of information security implies the development and expansion of the scope of innovative technologies in information processing.
Albina S. Ismagilova   +1 more
doaj   +3 more sources

Blockchain enabled policy-based access control mechanism to restrict unauthorized access to electronic health records [PDF]

open access: yesPeerJ Computer Science
Electronic health record transmission and storage involve sensitive information, requiring robust security measures to ensure access is limited to authorized personnel.
Nadeem Yaqub   +6 more
doaj   +3 more sources

Secure electronic health record access control via blockchain, dual-attribute encryption, and large language model-based attribute extraction [PDF]

open access: yesScientific Reports
Access control and data privacy are two of the main necessities in managing electronic health records (EHRs) across distributed domain. There are privacy gaps that expose EHRs to risks like unauthorized access by unaffiliated medical personnel ...
Atefeh Nekouie   +3 more
doaj   +2 more sources

A novel obfuscation method based on majority logic for preventing unauthorized access to binary deep neural networks [PDF]

open access: yesScientific Reports
The significant expansion of deep learning applications has necessitated safeguarding the deep neural network (DNN) model from potential unauthorized access, highlighting its importance as a valuable asset.
Alireza Mohseni   +2 more
doaj   +2 more sources

Access Control Development Within the Framework of an IOTA-Based Electronic Medical Record Management System [PDF]

open access: yesSensors
Electronic Medical Records (EMRs) are mandatory in Indonesia following the Ministry of Health regulation, which raises significant challenges in data security and patient-centric access control.
Hari Purnama   +5 more
doaj   +2 more sources

An analysis of security challenges and their perspective solutions for cloud computing and IoT [PDF]

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2021
INTRODUCTION: With the on-going revolution inthe Internet of Things and Cloud Computing has made the potential of every object that is connected through the Internet, to exchange and transfer data.
Muhammad Muhammad   +5 more
doaj   +1 more source

Hardware, software and organizational means of protecting the resources of the personal data information system from unauthorized access by means of "sniffing attacks"

open access: yesВестник Дагестанского государственного технического университета: Технические науки, 2022
Objective. The article discusses hardware and software methods of protecting the resources of the personal data information system from unauthorized access by means of "sniffing attacks"; the essence of which is to intercept data that is delivered within
A. R. Gazizov
doaj   +1 more source

Improvement and Application of Shiro Framework in Web System Security [PDF]

open access: yesJisuanji gongcheng, 2018
For information security issues that the normal users unauthorized access to unauthorized system resources and unauthorized users access to system resources illegally in Web system,this paper analyzes the principle of the Broken Access Control(BAC),uses ...
YI Wenkang,CHENG Hua,CHENG Gengguo
doaj   +1 more source

Privacy protection scheme for mobile social network

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
In the recent years, popularity and number of users of mobile social networks have grown significantly. Due to different types of communication on these networks, users share a lot of information with each other.
Seyyed Mohammad Safi   +2 more
doaj   +1 more source

Machine Learning-Based Detection for Unauthorized Access to IoT Devices

open access: yesJournal of Sensor and Actuator Networks, 2023
The Internet of Things (IoT) has become widely adopted in businesses, organizations, and daily lives. They are usually characterized by transferring and processing sensitive data.
Malak Aljabri   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy