-
141
An Authentication and Access Control Model for Healthcare based Cloud Services
Published 2023-03-01Subjects: Get full text
Article -
142
Security Analysis and Improvements of Authentication and Access Control in the Internet of Things
Published 2014-08-01Subjects: Get full text
Article -
143
An Access Control Model for Preventing Virtual Machine Hopping Attack
Published 2019-03-01“…In addition, we designed the access control model PVMH (Prevent VM hopping) to prevent VM hopping attacks based on the BLP model and the Biba model. …”
Get full text
Article -
144
Dynamic access control method for SDP-based network environments
Published 2023-09-01Subjects: “…Dynamic access control…”
Get full text
Article -
145
Blockchain aware decentralized identity management and access control system
Published 2024-02-01“…This paper presents a blockchain-aware decentralized identity management and access control (BADIMAC) model that mitigates these barriers. …”
Get full text
Article -
146
A New Attribute-Based Access Control Model for RDBMS
Published 2022-11-01Subjects: Get full text
Article -
147
Parallel and Distributed Computation of a Fingerprint Access Control System
Published 2022-09-01“… This work evaluates the runtime performance of a single-mode biometric recognition system for fingerprint-based access control to secure premises. To speed up the computation time in this system, we resorted to parallel programming, targeting more loops in the verification module. …”
Get full text
Article -
148
Principles of Eliminating Access Control Lists within a Domain
Published 2012-04-01Subjects: Get full text
Article -
149
Enhancing Microservices Security with Token-Based Access Control Method
Published 2023-03-01Subjects: Get full text
Article -
150
Cryptographically enforced access control for user data in untrusted clouds
Published 2016Get full text
Thesis -
151
Policy-Based Access Control in Federated Clinical Question Answering
Published 2024“…However, due to its sensitive nature, patient medical data often requires retrieval to be federated across a decentralized network of hospital institutions, each maintaining internal databases and access control policies. Applying standard RAG to clinical question-answering tasks is complicated by the lack of an interface for hospital resource owners to regulate and restrict access to sensitive clinical documents during retrieval, which is essential for model feasibility in practice. …”
Get full text
Thesis -
152
Nemesis: Preventing Authentication & [and] Access Control Vulnerabilities in Web Applications
Published 2011“…This paper presents Nemesis, a novel methodology for mitigating authentication bypass and access control vulnerabilities in existing web applications. …”
Get full text
Get full text
Article -
153
Distributed dynamic priority queuing medium access control portocol
Published 2014Get full text
Thesis -
154
Efficient media access control protocol for wireless multimedia networks
Published 2008“…This thesis is concerned with the design and evaluation of a simple and flexible media access control (MAC) protocol that can adapt to different traffic conditions and quality of service (QoS) requirements of the multimedia traffic in CDMA systems.…”
Get full text
Thesis -
155
Graphical wireless medium access control (MAC) protocol simulator
Published 2014“…Paper documents and PowerPoint presentations do not provide an interactive platform for keen learners to learn the concepts of the Medium Access Control (MAC) protocol, Carrier Sense Multiple Access/ Collision Avoidance (CSMA/CA) for IEEE 802.11 Standard. …”
Get full text
Final Year Project (FYP) -
156
Proof-of-concept blockchain application for access controlled file transfer
Published 2019“…In this paper, we introduce different Token mechanisms and explore the most feasible way to build an access control layer on top of a blockchain for file management. …”
Get full text
Final Year Project (FYP) -
157
Role based access control for knowledge sharing in remote areas
Published 2011“…This paper introduces a Role Based Access Control (RBAC) for e-Village in creating and sharing knowledge in a secure way. …”
Get full text
Get full text
Proceeding Paper -
158
-
159
-
160
TC-enabled and distributed cloud computing access control model
Published 2014“…Controlling access to the cloud computing services involves new scalability and security challenges that cannot be directly addressed by traditional access control solutions. In other words, cloud computing access control requires establishing a trust between users, service provider and provided services in a scalable manner. …”
Article