Results 71 to 80 of about 4,673,218 (333)
Distributed Access Control for Web and Business Processes [PDF]
Middleware influenced the research community in developing a number of systems for controlling access to distributed resources. Nowadays a new paradigm for the lightweight integration of business resources from different partners is starting to take hold
Koshutanski, Hristo
core
Real-Time Threat Detection with JavaScript: Monitoring and Response Mechanisms
Web apps are essential to contemporary life but are also vulnerable to many security concerns. This article examines real-time threat detection, monitoring, and response techniques at the confluence of JavaScript and security.
A.I. Orynchak +2 more
doaj +1 more source
Light‐Responsive Enzyme‐Loaded Nanoparticles for Tunable Adhesion and Mechanical Wound Contraction
This study presents a photoactivatable enzyme‐loaded mesoporous nanoparticle system (MPDA_PaTy) that enables light‐triggered tunable tissue adhesion and facilitates mechanical wound contraction. Controlled enzymatic crosslinking at tissue or hydrogel interfaces allows on‐demand adhesion.
Junghyeon Ko +10 more
wiley +1 more source
Ice Lithography: Recent Progress Opens a New Frontier of Opportunities
This review focuses on recent advancements in ice lithography, including breakthroughs in compatible precursors and substrates, processes and applications, hardware, and digital methods. Moreover, it offers a roadmap to uncover innovation opportunities for ice lithography in fields such as biological, nanoengineering and microsystems, biophysics and ...
Bingdong Chang +9 more
wiley +1 more source
Analyzing Security Protocol Web Implementations Based on Model Extraction With Applied PI Calculus
Analyzing security protocol web implementations is a crucial part of web security. Based on the model extraction technology, this paper first defines SubJavaScript and SubPython languages, and then establishes mapping models from SubPython and ...
Xudong He +5 more
doaj +1 more source
Ultralight 3D nanofibrous aerogels embedded with metal‐organic frameworks effectively capture and neutralize toxic gases and organophosphonates. Incorporating mesoporous UiO‐66‐NH2 and HKUST‐1 into PAN/PVP fibers enables high MOF loading while maintaining mechanical strength and structural stability.
Mai O. Abdelmigeed +6 more
wiley +1 more source
Formal Reasoning About the Security of Amazon Web Services
We report on the development and use of formal verification tools within Amazon Web Services (AWS) to increase the security assurance of its cloud infrastructure and to help customers secure themselves.
B. Cook
semanticscholar +1 more source
Charge‐Induced Morphing Gels for Bioinspired Actuation
This study introduces a novel electroactive actuation mechanism that enables the gel material to generate substantial and reversible shape‐changing while preserving topological and isochoric (volumetric) equivalence. The resultant morphing behaviors can mimic the movements of muscle‐driven organelles in nature, including cilia‐like beating and ...
Ciqun Xu +4 more
wiley +1 more source
Web Security Detection Tool [PDF]
According to Government Computer News (GCN) web attacks have been marked as all- time high this year. GCN says that some of the leading security software like SOPHOS detected about 15,000 newly infected web pages daily in initial three months of 2008 [13]
Agashe, Abhishek
core +1 more source
Web Vulnerability Study of Online Pharmacy Sites [PDF]
Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumers’ personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The
Kuzma, Joanne
core +1 more source

