Browsing by Subject "Access control"
Now showing items 1-10 of 10
-
A modal logic for information system security
( Australian Computer Society, Inc. , 2011 , Article)As a security mechanism, authorization or access control ensures that all accesses to the system resources occur exclusively according to the access polices and rules specified by the systemsecurity agent. Authorization ... -
Access Control Schemes for Implantable Medical Devices: A Survey
( Institute of Electrical and Electronics Engineers Inc. , 2017 , Article)Implantable medical devices (IMDs) are electronic devices implanted within human body for diagnostic, monitoring, and therapeutic purposes. It is imperative to guarantee that IMDs are completely secured since the patient's ... -
Accountable and privacy-enhanced access control in wireless sensor networks
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)In general, owners and users of wireless sensor networks (WSNs) are different entities. A user may want to hide his/her data access privacy from anyone else including the network owner and, at the same time, users who ... -
Blockchain technology for healthcare: Enhancing shared electronic health record interoperability and integrity
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The Electronic Health Records (EHR) sharing system is the state of art for delivering healthcare. The tools within the system can predict outcomes during the patient's lifetime, monitor how effective are treatments, track ... -
Blockchain-Based Access Control for Secure Smart Industry Management Systems
( Springer Science and Business Media Deutschland GmbH , 2022 , Conference Paper)Smart manufacturing systems involve a large number of interconnected devices resulting in massive data generation. Cloud computing technology has recently gained increasing attention in smart manufacturing systems for ... -
DVF-fog: Distributed virtual firewall in fog computing based on risk analysis
( Inderscience Publishers , 2019 , Article)To eliminate network saturation during data exchanges, fog computing is deployed as the technology that benefits from both cloud computing and internet of things (IoT) paradigms. Therefore, we focus on network access control ... -
Effective Collaboration in the Management of Access Control Policies: A Survey of Tools
( Institute of Electrical and Electronics Engineers Inc. , 2023 , Article Review)Access control (AC) tools implement security policies for controlling access to various assets, including file systems, physical resources, and social media posts. They are also used as pedagogical tools for exploring and ... -
Efficient and Privacy-Preserving Cloud-Based Medical Diagnosis Using an Ensemble Classifier With Inherent Access Control and Micro-Payment
( Institute of Electrical and Electronics Engineers Inc. , 2023 , Article)Decision tree (DT) models are widely used in medical applications where the size of the data sets is usually small or medium. Moreover, DT ensemble models are preferred over single DT models because of their higher accuracy ... -
POKs based secure and energy-efficient access control for implantable medical devices
( Springer , 2019 , Conference Paper)Implantable medical devices (IMDs), such as pacemakers, implanted cardiac defibrillators and neurostimulators are medical devices implanted into patients' bodies for monitoring physiological signals and performing medical ... -
Transforming the Capabilities of Artificial Intelligence in GCC Financial Sector: A Systematic Literature Review
( Wiley , 2022 , Article)Identity and access management is a business process framework that makes it easier to maintain genuine user identities and regulate access to sensitive assets. The word "access control"refers to an organization's policy ...