Showing 121 - 138 results of 138 for search '"access control"', query time: 0.06s Refine Results
  1. 121

    Review of privacy computing techniques for multi-party data fusion analysis by LIU Shenglong, HUANG Xiuli, JIANG Yiwen, JIANG Jiawei, TIAN Yuechi, ZHOU Zejun, NIU Ben

    Published 2024-12-01
    “…There were still limitations for anonymity, scrambling, or access control-based traditional privacy desensitization measures, cryptography-based measures, and federated learning-based measures, while privacy computing theory provided a computational and information system framework for full-lifecycle protection, which needed to be combined with different application scenarios to implement full-lifecycle privacy information protection.…”
    Get full text
    Article
  2. 122

    Harnessing Meta-Reinforcement Learning for Enhanced Tracking in Geofencing Systems by Alireza Famili, Shihua Sun, Tolga Atalay, Angelos Stavrou

    Published 2025-01-01
    “…They are now considered essential tools for defining and controlling boundaries across various applications, from aviation safety in drone management to access control within mixed reality platforms like the metaverse. …”
    Get full text
    Article
  3. 123

    Blockchain-Powered Secure and Scalable Threat Intelligence System With Graph Convolutional Autoencoder and Reinforcement Learning Feedback Loop by Mohamad Khayat, Ezedin Barka, Mohamed Adel Serhani, Farag Sallabi, Khaled Shuaib, Heba M. Khater

    Published 2025-01-01
    “…To secure the exchange of threat intelligence information, a safe blockchain network is used, which comprises Byzantine Fault Tolerance for high data integrity and Zero-Knowledge Proofs for access control. All relevant information is cleaned and standardized prior to analysis. …”
    Get full text
    Article
  4. 124

    Unleashing the power of internet of things and blockchain: A comprehensive analysis and future directions by Abderahman Rejeb, Karim Rejeb, Andrea Appolloni, Sandeep Jagtap, Mohammad Iranmanesh, Salem Alghamdi, Yaser Alhasawi, Yasanur Kayikci

    Published 2024-01-01
    “…Meanwhile, the less frequently discussed topics include access control and management in blockchain-based IoT systems and energy efficiency in wireless sensor networks using blockchain and IoT. …”
    Get full text
    Article
  5. 125

    ЗАХИСТ ДАНИХ В ІНФОРМАЦІЙНІЙ МОДЕЛІ МОДУЛЯ «КАФЕДРА» АВТОМАТИЗОВАНОЇ ІНФОРМАЦІЙНОЇ СИСТЕМИ УНІВЕРСИТЕТУ... by Леонід Гальчинський, Максим Стурчак

    Published 2024-02-01
    “…Зазначено, що захист даних слід враховувати через ролі на базі RBAC (Role Base Access Control), політика якого є більш гнучкою. Крім цього, модуль «Кафедра» може бути реалізований як вебзастосунок «Блок оперативного управління», який не лише приверне увагу користувачів, але й допоможе їм швидко і легко знаходити потрібну інформацію, виконувати потрібні дії. …”
    Get full text
    Article
  6. 126

    Contributions to the Virtualization of the BNG by Jorge Proenca, Ricardo Figueiredo, Vasco Pereira, Tiago Cruz, Paulo Simoes

    Published 2025-01-01
    “…It serves as a crucial component, being responsible for various essential services that allow subscribers’ connections and help optimizing infrastructure resources, including enforcing QoS policies and implementing Access Control Lists to safeguard against unauthorized access. …”
    Get full text
    Article
  7. 127

    Boosting Cyberattack Detection Using Binary Metaheuristics With Deep Learning on Cyber-Physical System Environment by Alanoud Al Mazroa, Fahad R. Albogamy, Mohamad Khairi Ishak, Samih M. Mostafa

    Published 2025-01-01
    “…Cyberattack recognition and mitigation techniques in CPSs include using numerous models like intrusion detection systems (IDSs), access control mechanisms, encryption, and firewalls. …”
    Get full text
    Article
  8. 128

    Personal Identification Using Embedded Raspberry Pi-Based Face Recognition Systems by Sebastian Pecolt, Andrzej Błażejewski, Tomasz Królikowski, Igor Maciejewski, Kacper Gierula, Sebastian Glowinski

    Published 2025-01-01
    “…Potential applications include access control, surveillance, and statistical data collection, highlighting the system’s versatility and relevance.…”
    Get full text
    Article
  9. 129

    Securing fog computing in healthcare with a zero-trust approach and blockchain by Navjeet Kaur, Ayush Mittal, Umesh Kumar Lilhore, Sarita Simaiya, Surjeet Dalal, Kashif Saleem, Ehab Seif Ghith

    Published 2025-02-01
    “…The proposed framework enhances security by combining BC’s immutable transaction logs for data integrity and traceability with SDN’s dynamic network reconfiguration for real-time access control and anomaly detection. The integration of BC and SDN supports continuous authentication and monitoring using cryptographic protocols (SHA-256A and RSA-2048) to secure data transmission. …”
    Get full text
    Article
  10. 130

    ALTRIRAS: A Computer Game for Training Children with Autism Spectrum Disorder in the Recognition of Basic Emotions by Leandro M. Almeida, Diego P. da Silva, Daieny P. Theodório, Wolley W. Silva, Silvia Cristina M. Rodrigues, Terigi A. Scardovelli, Alessandro P. da Silva, Marcia Aparecida S. Bissaco

    Published 2019-01-01
    “…It has recreational settings built with 2D graphic interface to keep the children’s attention and an access control and a register mechanism to allow the monitoring of the child’s progress. …”
    Get full text
    Article
  11. 131

    A Decision Cloud Ranking Approach Based on Privacy and Security in Blockchain E-Health Industry 4.0 Systems by Sarah Qahtan, Khaironi Yatim, Mohd Hafeez Osman, Hazura Zulzalil, Muhammad Luqman Mahamad Zakaria

    Published 2023-12-01
    “…The findings reveal the following: (1) The SFS-FWZIC method effectively assigned weights to privacy and security properties, with access control achieving the highest significance weight (0.1934) and Secure-search receiving the lowest weight (0.0603). (2) The Grey-TOPSIS method efficiently ranked E-health systems across the three categories based on various parameters, including α=0.1,α=0.3,α=0.5,α=0.7, and α=0.9. …”
    Get full text
    Article
  12. 132

    Analisis Faktor yang Berpengaruh pada Adopsi E-Commerce dan Dampaknya Bagi Kinerja UKM di Kabupaten Subang by Abu Muna Almaududi Ausat, Endang Siti Astuti, Wilopo Wilopo

    Published 2022-02-01
    “…This research arrives at a suggestion that SMEs who have used e-commerce should be followed by an understanding of access control and security of e-commerce itself, not only can use it. …”
    Get full text
    Article
  13. 133

    AN INTEGRATED INFORMATION SYSTEM ON BIORESOURCE COLLECTIONS OF THE FASO OF RUSSIA by S. A. Lashin, D. A. Afonnikov, M. A. Genaev, F. V. Kazantsev, E. G. Komyshev, E. A. Oschepkova, А. V. Petrov, D. A. Rasskazov, A. A. Smirnova, N. A. Kolchanov

    Published 2018-05-01
    “…The information system “Bioresource Collections of Scientific Organizations” (IS BRC) has been developed as a Web­portal (www.biores.cytogen.ru) integrating databases on bioresource collections of the FASO of Russia and graphical user interface. Access control to the databases integrated into the IS BRC is performed through authorized program access for viewing records, their creation and editing on the basis of REST technology. …”
    Get full text
    Article
  14. 134

    A Review on Blockchain Applications in Operational Technology for Food and Agriculture Critical Infrastructure by Chengliang Zheng, Xiangzhen Peng, Ziyue Wang, Tianyu Ma, Jiajia Lu, Leiyang Chen, Liang Dong, Long Wang, Xiaohui Cui, Zhidong Shen

    Published 2025-01-01
    “…Content analysis further identified six key research areas within this domain: identity authentication and data verification, secure access control, attack detection and perception, data security and protection, data backup and recovery, and attack assessment and attribution. …”
    Get full text
    Article
  15. 135

    A SURVEY OF NETWORK SERVICE LOG PROCESSING PLATFORMS AND TECHNIQUES FOR THE DETECTION OF INFORMATION INSECURITY RISKS by Phạm Duy Lộc, Hoàng Xuân Dậu

    Published 2018-07-01
    “…In the layers of information security measures, the monitoring and detection measures of anomalous activities and information insecurity risks are considered the second defense layer behind firewalls and access controls. This defense layer includes intrusion detection and prevention systems for hosts and networks. …”
    Get full text
    Article
  16. 136

    Electronic Records Management and Office Organization: A Case Study of Rugarama Hospital. by Nimusiima, Talent

    Published 2024
    “…Registry staff on the importance of maintaining accessible records and provide ongoing support to address any challenges they may encounter and there is a need for implementation of access controls and permissions within digital records management systems to restrict access to sensitive information while ensuring that authorized personnel have the necessary permissions to access relevant records and there should be regularly review and update access controls to align with changing roles and responsibilities.…”
    Get full text
    Thesis
  17. 137

    Integrity of Best-Answer Assignments in Large Enrollment Classes; the role of Compulsory Attribution by Kurt Schmitz, Veda Storey

    Published 2024-12-01
    “…The method secures compulsory attribution of digital solutions using meta-data, access controls, and extensible code available in many common applications, including Microsoft Office. …”
    Get full text
    Article
  18. 138

    Design and implementation of an intelligent sports management system (ISMS) using wireless sensor networks by ZhiGuo Zhu

    Published 2025-01-01
    “…Finally, the security layer ensures data integrity and confidentiality with robust encryption and access controls. To evaluate the system performance in different scenarios, we performed many experiments, which show that the proposed ISMS model shows the system efficacy in improving accuracy (0.94), specificity (0.97), recall (0.91), precision (0.93), F1 score (0.95), mean absolute error (MAE) (0.6), mean square error (MSE) (0.8), and root mean square error (RMSE) (0.9), compared to traditional methods. …”
    Get full text
    Article