Suggested Topics within your search.
Suggested Topics within your search.
-
1
Enhancing Healthcare Security: A Unified RBAC and ABAC Risk-Aware Access Control Approach
Published 2025-06-01Subjects: Get full text
Article -
2
BACAD: AI-based framework for detecting vertical broken access control attacks
Published 2024-12-01Subjects: “…Broken access control…”
Get full text
Article -
3
BPDAC: A Blockchain Based and Provenance Enabled Dynamic Access Control Scheme
Published 2023-01-01Subjects: “…Dynamic access control…”
Get full text
Article -
4
Design of Role Based Access Control for Triadic Concept Analysis
Published 2020-04-01Subjects: “…access control…”
Get full text
Article -
5
Game-based detection method of broken access control vulnerabilities in Web application
Published 2024-06-01Subjects: “…Web application security;vulnerability detection;access control vulnerability;access control rule;game…”
Get full text
Article -
6
Dynamic token encryption for preventing permission leakage in serverless architectures
Published 2025-07-01Subjects: Get full text
Article -
7
B<sc>ambda</sc>: A Real-Time Verification Framework for Serverless Computing
Published 2025-01-01Subjects: Get full text
Article -
8
<span style="font-variant: small-caps">MedAccessX</span>: A Blockchain-Enabled Dynamic Access Control Framework for IoMT Networks
Published 2025-03-01Subjects: “…access control…”
Get full text
Article -
9
Blockchain enabled policy-based access control mechanism to restrict unauthorized access to electronic health records
Published 2025-01-01Subjects: “…Access control…”
Get full text
Article -
10
Automatic Verification Analysis Technology of Network Security Domain
Published 2015-01-01Subjects: Get full text
Article -
11
A response to the European Data Protection Supervisor ‘Misunderstandings in Biometrics’ by the European Association for Biometrics
Published 2022-01-01Subjects: “…biometrics (access control)…”
Get full text
Article -
12
Research on data schema and security in data governance
Published 2016-05-01Subjects: “…data governance;data fusion;access control…”
Get full text
Article -
13
Roles query algorithm in cloud computing environment based on user require
Published 2011-01-01Subjects: Get full text
Article -
14
Spectral-clustering-based abnormal permission assignments hunting framework
Published 2017-12-01Subjects: “…access control…”
Get full text
Article -
15
BSAMS: Blockchain-Based Secure Authentication Scheme in Meteorological Systems
Published 2023-03-01Subjects: Get full text
Article -
16
Formal Verification for Preventing Misconfigured Access Policies in Kubernetes Clusters
Published 2025-01-01Subjects: “…Attribute-based access control…”
Get full text
Article -
17
Trustworthy AI: Securing Sensitive Data in Large Language Models
Published 2024-12-01Subjects: Get full text
Article -
18
Modeling Enterprise Authorization: A Unified Metamodel and Initial Validation
Published 2016-07-01Subjects: “…Access control…”
Get full text
Article -
19
R~2BAC:a risk-based multi-domain secure interoperation model
Published 2008-01-01Subjects: “…access control…”
Get full text
Article -
20
Blockchain-based access control mechanism for data traceability
Published 2020-12-01Subjects: Get full text
Article