Search

Your search keyword '"Role-based access control"' showing total 3,883 results

Search Constraints

Start Over You searched for: Descriptor "Role-based access control" Remove constraint Descriptor: "Role-based access control"
3,883 results on '"Role-based access control"'

Search Results

1. Role-Based Access Control

2. Category-Based Administrative Access Control Policies.

3. Trustworthy AI: Securing Sensitive Data in Large Language Models.

4. Architecture for Enhancing Communication Security with RBAC IoT Protocol-Based Microgrids.

5. HEALTHSOLID 4.0: A NOVEL SOLID-POD AND BLOCKCHAIN-ENABLED FRAMEWORK FOR ROLE-BASED ACCESS CONTROL AND SECURE HEALTHCARE INFORMATION EXCHANGE.

6. Building Trust in Conversational AI: A Review and Solution Architecture Using Large Language Models and Knowledge Graphs.

7. Share Spell - From Fantasy to Reality: A Collaboration Platform with Learning Analytics for a Dynamic Online Learning Environment System

8. Ensuring Securing PII Data in the AWS Cloud: A Comprehensive Guide to PCI DSS Compliance

10. NDN-RBE: An Accountable Privacy Aware Access Control Framework For NDN.

11. Comparative analysis of identity management, access control, and authorization practices in public and private universities [version 2; peer review: 2 approved]

12. Ephemeral Secret Leakage-Free ID-Role-Based Access Control Authentication and Key Exchange Protocol for Securing Electric Vehicle Data

13. SAAC: Secure Access Control Management Framework for Multi-User Smart Home Systems

14. Provisioning trust-oriented role-based access control for maintaining data integrity in cloud.

15. Building Trust in Conversational AI: A Review and Solution Architecture Using Large Language Models and Knowledge Graphs

16. Protecting Smart Home from Cybersecurity Threats Strategies for Homeowners.

17. An Optimized Role-Based Access Control Using Trust Mechanism in E-Health Cloud Environment

18. Samyukta: A Unified Access Control Model using Roles, Labels, and Attributes

19. Role Access Control Search Scheme Based on Attribute Encryption

20. A Fine-Grained Access Control Scheme for Electronic Health Records Based on Roles and Attributes

21. Integration of Attribute-Based Access Control in Microservices Architecture

23. On the Analysis Problem of the Attribute-Based Access Control Model HGABAC

24. H-RCBAC: Hadoop Access Control Based on Roles and Content

25. Towards for Designing Educational System Using Role-Based Access Control.

26. Application of role-based access control in cyber security of substation

27. Distributed Authentication and Authorization Models in Cloud Computing Systems: A Literature Review

28. Application of Rules and Authorization Key for Secured Online Training—A Survey

29. SEMRAchain: A Secure Electronic Medical Record Based on Blockchain Technology.

30. Privacy preserving mobile forensic framework using role‐based access control and cryptography.

31. Centralized and Decentralized Distributed Energy Resource Access Control Implementation Considerations.

32. Double Diagonal Puzzle Encryption Standard-512 for Securing Data over Cloud Environment.

33. A novel role-mapping algorithm for enhancing highly collaborative access control system.

35. Powerful authentication regime applicable to naval OFP integrated development (PARANOID): a vision for non-circumventable code signing and traceability for embedded avionics software

36. Role Mining: Survey and Suggestion on Role Mining in Access Control

39. The Study on the Access Mechanism for My Health Bank

40. Role-Based Authorization and Authentication Framework for Remote Service Access by In-Vehicle Users

41. Streamlining Certification Management with Automation and Certification Retrieval : System development using ABP Framework, Angular, and MongoDB

42. Hospital Management using Gin Framework

44. ReportFlow: an application for EEG visualization and reporting using cloud platform

45. Policy-Based Access Control Scheme for Securing Hadoop Ecosystem

46. A New RFID Middleware and BagTrac Application

47. Automated Security Analysis of Authorization Policies with Contextual Information

48. Adventures in the Analysis of Access Control Policies

49. Genetic Algorithm-Based Deep Learning Ensemble for Detecting Database Intrusion via Insider Attack

50. A Secure Access Control Framework for Cloud Management.

Catalog

Books, media, physical & digital resources