Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- Finance 2
- Internet 2
- Internet in public administration 2
- Law 2
- Law and legislation 2
- Legal ethics 2
- Moral and ethical aspects 2
- Online social networks 2
- Public administration 2
- Recording and reproducing 2
- Social media 2
- Sound 2
- Access control 1
- Accounting 1
- Advertising media planning 1
- Agricultural diversification 1
- Analysis 1
- Bibliotheken 1
- Business 1
- Business and Management 1
- Censorship 1
- Certification 1
- Communication in rehabilitation 1
- Communication policy 1
-
221
Cross-network access control mechanism for complex network environment
Published 2018-02-01Subjects: Get full text
Article -
222
Access control model and its application for collaborative information systems
Published 2008-01-01Subjects: “…access control…”
Get full text
Article -
223
Profiles and predictors of access to human and veterinary healthcare in multispecies households
Published 2025-06-01Subjects: “…Healthcare access…”
Get full text
Article -
224
Multi-tier cooperative caching in fog radio access network
Published 2019-09-01Subjects: “…fog radio access network…”
Get full text
Article -
225
Classifications of haemodialysis vascular access stenosis: a scoping review
Published 2025-01-01“…Objectives Vascular access (VA) stenoses play a significant role in the morbidity of the haemodialysed population. …”
Get full text
Article -
226
Frailty and outcomes of vascular access for hemodialysis – a scoping review
Published 2025-01-01Subjects: Get full text
Article -
227
Extended access control mechanism for cross-domain data exchange
Published 2019-07-01“…Aiming at the controlled sharing for cross-domain data exchange for complicated application systems,an extended access control mechanism was proposed.The control process was divided into two steps:constraint control and propagation control.The constraint control was used to ensure that access to data was authorized before access request,and the propagation control was used for further extension control after obtaining data access right.In addition,by considering data self and data provenance,the direct and indirect access control were realized.Theoretically,the security and effectiveness of the proposed mechanism were proved.Finally,taking the control of electronic invoice as an example,the implementation approach was proposed.The example shows that the proposed mechanism can perform the fine-grained extended control before and after data in the cross-domain and cross-system are exchanged.…”
Get full text
Article -
228
Security mechanisms and data access protocols in innovative wireless networks
Published 2018-09-01Get full text
Article -
229
Freeway intelligent transportation oriented wireless access technologies evaluation
Published 2017-12-01“…The popularization of broadband mobile communication technology has paved a way for the development of intelligent transportation industry.At the meantime,the intelligent transportation system (ITS) has also put forward higher requirements for the broadband mobile communication technologies.Based on the summary of the challenges faced by the broadband mobile communication technologies when applied to ITS,two typical expressway communication scenarios are selected in which the performance of wireless access technologies are evaluated and compared.It can provide theoretical reference for the development of ITS.…”
Get full text
Article -
230
Tungs’ Medical Journal is indexed in the Directory of Open Access Journals
Published 2024-01-01Get full text
Article -
231
Security mechanism in access control based on non-cooperative game
Published 2014-11-01Subjects: “…access control…”
Get full text
Article -
232
Gaining Surgical Access for Repositioning the Inferior Alveolar Neurovascular Bundle
Published 2014-01-01“…This study is aimed at determining anatomical landmarks that can be used to gain access to the inferior alveolar neurovascular (IAN) bundle. …”
Get full text
Article -
233
Artificial Intelligence: An Untapped Opportunity for Equity and Access in STEM Education
Published 2025-01-01“…Artificial intelligence (AI) holds tremendous potential for promoting equity and access to science, technology, engineering, and mathematics (STEM) education, particularly for students with disabilities. …”
Get full text
Article -
234
Using Operational Analysis to Improve Access to Pulmonary Function Testing
Published 2016-01-01“…Timely pulmonary function testing is crucial to improving diagnosis and treatment of pulmonary diseases. Perceptions of poor access at an academic pulmonary function laboratory prompted analysis of system demand and capacity to identify factors contributing to poor access. …”
Get full text
Article -
235
ACCESSING FINANCE FOR INNOVATIVE EU SMES – KEY DRIVERS AND CHALLENGES
Published 2014-11-01“…However, SMEs can fulfill this potential if they obtain the finance necessary to start and develop their businesses. Access to finance is a key determinant for business start-up, development and growth for SMEs, including the innovative ones, and they have different needs and face different challenges. …”
Get full text
Article -
236
Access control scheme for medical data based on PBAC and IBE
Published 2015-12-01“…Due to the large amount of personal privacy information contained,the medical big data formed in the health care industry was faced with potential threats of both external attacks and internal data leakages.However,traditional access control technology didn’t take into account the important role of user access purpose in the access control schemes that emphasized data privacy,and existing symmetric and asymmetric encryption technologies both face problems such as the complexity of key and certificate management.To address these problems,a novel access control scheme based on PBAC model and IBE encryption technology was proposed,which could provide flexible access control of encrypted medical data.By introducing the concept of conditioned purpose,the PBAC model was extended to achieve full coverage of purpose trees.Furthermore,the scheme used patient ID,conditioned bit and intended purpose as the IBE public key,with which patients’ data were encrypted.Only users who pass the authentication and whose access purposes conform to the intended purposes can obtain the corresponding private keys and the encrypted data,thereby achieving access to patients’ information.Experimental results prove that the scheme can achieve the goals of fine-grained access control and privacy protection with high performance.…”
Get full text
Article -
237
Key-customizable encrypted deduplication with access control for cloud storage
Published 2024-08-01Subjects: Get full text
Article -
238
A Survey of Cognitive Radio Access to TV White Spaces
Published 2010-01-01“…Both in the US, and more recently, in the UK the regulators have given conditional endorsement to this new mode of access. This paper reviews the state-of-the-art in technology, regulation, and standardisation of cognitive access to TVWS. …”
Get full text
Article -
239
Risk Factor Analysis in Vascular Access Complications for Hemodialysis Patients
Published 2025-01-01Subjects: Get full text
Article -
240
Research on the NB-IoT Random Access in LEO Satellite IoT
Published 2021-12-01Subjects: Get full text
Article