Sign Up to like & get
recommendations!
2
Published in 2022 at "International Journal of Intelligent Systems"
DOI: 10.1002/int.22904
Abstract: While cloud computing services such as cloud storage are fairly mature, it remains challenging to design efficient and secure cryptographic schemes to facilitate fine‐grained access control and achieve other features. For example, existing ciphertext‐policy attribute‐based…
read more here.
Keywords:
blockchain based;
control times;
based access;
access control ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "Journal of Software: Evolution and Process"
DOI: 10.1002/smr.2730
Abstract: Smart contracts executed on blockchains are interactive programs where external actors generate events that trigger function invocations. Events can be emitted by participants asynchronously. However, some functionalities should be restricted to participants inhabiting specific roles…
read more here.
Keywords:
access;
access control;
evolution smart;
smart contracts ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "Circuits, Systems, and Signal Processing"
DOI: 10.1007/s00034-018-0893-6
Abstract: AbstractIn this paper, a hardware implementation of a data hiding technique is proposed for efficient quality access control of images using lifting-based discrete wavelet transformation (DWT). Host image is decomposed into n-level wavelet tiles. A…
read more here.
Keywords:
scheme;
implementation;
quality;
access control ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "Personal and Ubiquitous Computing"
DOI: 10.1007/s00779-017-1089-y
Abstract: With the explosive growth of smart phones in recent years, QR code is becoming more and more popular. This work presents a new electronic access control system for smart building based on QR code. The…
read more here.
Keywords:
aesthetic code;
access control;
control system;
code ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "Applied Intelligence"
DOI: 10.1007/s10489-017-1064-3
Abstract: The purpose based access control model has been proposed recently to restrict the access to the sensitive data which are out of control of their owner. This model can be enforced by ensuring that the…
read more here.
Keywords:
model;
access control;
control model;
access ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "Cluster Computing"
DOI: 10.1007/s10586-017-0863-y
Abstract: WSN-integrated cloud computing (WCC) has become a promising cloud service architecture, in which sensors and mobile devices are utilized as the data collecting and processing nodes for the cloud service model, while cloud servers can…
read more here.
Keywords:
data access;
wsn;
fine grained;
access control ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Cluster Computing"
DOI: 10.1007/s10586-020-03196-x
Abstract: As a pioneering surge of ICT technologies, offering computing resources on-demand, the exceptional evolution of Cloud computing has not gone unnoticed by the IT world. At the same time, security stands as a most prior…
read more here.
Keywords:
cloud;
cloud computing;
access control;
computing environment ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Information Systems Frontiers"
DOI: 10.1007/s10796-021-10167-z
Abstract: Over the past few years, several efforts have been made to enable specification and enforcement of flexible and dynamic access control policies using traditional access control (such as role based access control (RBAC), etc.) and…
read more here.
Keywords:
heterogeneous access;
control policies;
access;
administrative model ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "Journal of Medical Systems"
DOI: 10.1007/s10916-019-1467-2
Abstract: As a consequence of the epidemiological transition towards non-communicable diseases, integrated care approaches are required, not solely focused on medical purposes, but also on a range of essential activities for the maintenance of the individuals’…
read more here.
Keywords:
control policies;
access control;
definition access;
Sign Up to like & get
recommendations!
0
Published in 2024 at "Journal of Medical Systems"
DOI: 10.1007/s10916-024-02102-x
Abstract: IT has made significant progress in various fields over the past few years, with many industries transitioning from paper-based to electronic media. However, sharing electronic medical records remains a long-term challenge, particularly when patients are…
read more here.
Keywords:
system;
public blockchain;
emergency;
access control ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-019-07923-4
Abstract: The patient and healthcare professionals use the Electronic Healthcare System (EHS) for accessing medical records from the remote locations via the Internet. The emerging healthcare system has several advantages such as better management of the…
read more here.
Keywords:
healthcare;
healthcare system;
trust;
access control ... See more keywords