Results 71 to 80 of about 4,673,218 (333)

Distributed Access Control for Web and Business Processes [PDF]

open access: yes, 2003
Middleware influenced the research community in developing a number of systems for controlling access to distributed resources. Nowadays a new paradigm for the lightweight integration of business resources from different partners is starting to take hold
Koshutanski, Hristo
core  

Real-Time Threat Detection with JavaScript: Monitoring and Response Mechanisms

open access: yesТехнічна інженерія
Web apps are essential to contemporary life but are also vulnerable to many security concerns. This article examines real-time threat detection, monitoring, and response techniques at the confluence of JavaScript and security.
A.I. Orynchak   +2 more
doaj   +1 more source

Light‐Responsive Enzyme‐Loaded Nanoparticles for Tunable Adhesion and Mechanical Wound Contraction

open access: yesAdvanced Functional Materials, EarlyView.
This study presents a photoactivatable enzyme‐loaded mesoporous nanoparticle system (MPDA_PaTy) that enables light‐triggered tunable tissue adhesion and facilitates mechanical wound contraction. Controlled enzymatic crosslinking at tissue or hydrogel interfaces allows on‐demand adhesion.
Junghyeon Ko   +10 more
wiley   +1 more source

Ice Lithography: Recent Progress Opens a New Frontier of Opportunities

open access: yesAdvanced Functional Materials, EarlyView.
This review focuses on recent advancements in ice lithography, including breakthroughs in compatible precursors and substrates, processes and applications, hardware, and digital methods. Moreover, it offers a roadmap to uncover innovation opportunities for ice lithography in fields such as biological, nanoengineering and microsystems, biophysics and ...
Bingdong Chang   +9 more
wiley   +1 more source

Analyzing Security Protocol Web Implementations Based on Model Extraction With Applied PI Calculus

open access: yesIEEE Access, 2020
Analyzing security protocol web implementations is a crucial part of web security. Based on the model extraction technology, this paper first defines SubJavaScript and SubPython languages, and then establishes mapping models from SubPython and ...
Xudong He   +5 more
doaj   +1 more source

Durable Physically Mixed Microporous and Mesoporous MOFs/Nanofiber Aerogel 3D Composites for Effective Toxic Gas Capture and Organophosphonate Detoxification

open access: yesAdvanced Functional Materials, EarlyView.
Ultralight 3D nanofibrous aerogels embedded with metal‐organic frameworks effectively capture and neutralize toxic gases and organophosphonates. Incorporating mesoporous UiO‐66‐NH2 and HKUST‐1 into PAN/PVP fibers enables high MOF loading while maintaining mechanical strength and structural stability.
Mai O. Abdelmigeed   +6 more
wiley   +1 more source

Formal Reasoning About the Security of Amazon Web Services

open access: yesInternational Conference on Computer Aided Verification, 2018
We report on the development and use of formal verification tools within Amazon Web Services (AWS) to increase the security assurance of its cloud infrastructure and to help customers secure themselves.
B. Cook
semanticscholar   +1 more source

Charge‐Induced Morphing Gels for Bioinspired Actuation

open access: yesAdvanced Functional Materials, EarlyView.
This study introduces a novel electroactive actuation mechanism that enables the gel material to generate substantial and reversible shape‐changing while preserving topological and isochoric (volumetric) equivalence. The resultant morphing behaviors can mimic the movements of muscle‐driven organelles in nature, including cilia‐like beating and ...
Ciqun Xu   +4 more
wiley   +1 more source

Web Security Detection Tool [PDF]

open access: yes, 2008
According to Government Computer News (GCN) web attacks have been marked as all- time high this year. GCN says that some of the leading security software like SOPHOS detected about 15,000 newly infected web pages daily in initial three months of 2008 [13]
Agashe, Abhishek
core   +1 more source

Web Vulnerability Study of Online Pharmacy Sites [PDF]

open access: yes
Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumers’ personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The
Kuzma, Joanne
core   +1 more source

Home - About - Disclaimer - Privacy