These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

106 related articles for article (PubMed ID: 31214270)

  • 1. Security Analysis of ABAC under an Administrative Model.
    Jha S; Sural S; Atluri V; Vaidysa J
    IET Inf Secur; 2019 Mar; 13(2):96-103. PubMed ID: 31214270
    [TBL] [Abstract][Full Text] [Related]  

  • 2. PolTree: A Data Structure for Making Efficient Access Decisions in ABAC.
    Nath R; Das S; Sural S; Vaidya J; Atluri V
    Proc ACM Symp Access Control Model Technol; 2019 Jun; 2019():25-35. PubMed ID: 31346589
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Enabling the Deployment of ABAC Policies in RBAC Systems.
    Batra G; Atluri V; Vaidya J; Sural S
    Data Appl Secur Priv XXXII (2018); 2018 Jul; 10980():51-68. PubMed ID: 30687849
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Deploying ABAC policies using RBAC Systems.
    Batra G; Atluri V; Vaidya J; Sural S
    J Comput Secur; 2019; 27(4):483-506. PubMed ID: 31929684
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Managing Attribute-Based Access Control Policies in a Unified Framework using Data Warehousing and In-Memory Database.
    Singh MP; Sural S; Vaidya J; Atluri V
    Comput Secur; 2019 Sep; 86():183-205. PubMed ID: 31662590
    [TBL] [Abstract][Full Text] [Related]  

  • 6. An Efficient Attribute-Based Access Control (ABAC) Policy Retrieval Method Based on Attribute and Value Levels in Multimedia Networks.
    Liu M; Yang C; Li H; Zhang Y
    Sensors (Basel); 2020 Mar; 20(6):. PubMed ID: 32245041
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Contemporaneous Update and Enforcement of ABAC Policies.
    Talegaon S; Batra G; Atluri V; Sural S; Vaidya J
    Proc ACM Symp Access Control Model Technol; 2022 Jun; 2022():31-42. PubMed ID: 36507921
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Efficient bottom-up Mining of Attribute Based Access Control Policies.
    Talukdar T; Batra G; Vaidya J; Atluri V; Sural S
    IEEE Conf Collab Internet Comput; 2017 Oct; 2017():339-348. PubMed ID: 30506058
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Poster: Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes.
    Das S; Sural S; Vaidya J; Atluri V
    Proc ACM Symp Access Control Model Technol; 2018 Jun; 2018():213-215. PubMed ID: 30687851
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Policy Adaptation in Hierarchical Attribute-Based Access Control Systems.
    DAS S; Sural S; Vaidya J; Atluri V
    ACM Trans Internet Technol; 2019 Nov; 19(3):. PubMed ID: 31885522
    [TBL] [Abstract][Full Text] [Related]  

  • 11. The need for the use of XACML access control policy in a distributed EHR and some performance considerations.
    Sucurovic S; Milutinovic V
    Stud Health Technol Inform; 2008; 137():346-52. PubMed ID: 18560096
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Optimal Employee Recruitment in Organizations under Attribute-Based Access Control.
    Roy A; Sural S; Majumdar AK; Vaidya J; Atluri V
    ACM Trans Manag Inf Syst; 2021 Jan; 12(1):. PubMed ID: 33927914
    [TBL] [Abstract][Full Text] [Related]  

  • 13. PAMMELA: Policy Administration Methodology using Machine Learning.
    Gumma V; Mitra B; Dey S; Patel PS; Suman S; Das S; Vaidya J
    SECRYPT; 2022 Jul; 2022():147-157. PubMed ID: 36561130
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Incremental Maintenance of ABAC Policies.
    Batra G; Atluri V; Vaidya J; Sural S
    CODASPY; 2021 Apr; 2021():185-196. PubMed ID: 33977290
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Enabling Workforce Optimization in Constrained Attribute-Based Access Control Systems.
    Roy A; Sural S; Majumdar AK; Vaidya J; Atluri V
    IEEE Trans Emerg Top Comput; 2021; 9(4):1901-1913. PubMed ID: 34900448
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Enabling Attribute-Based Access Control in Linux Kernel.
    Sai Varshith HO; Vaidya J; Sural S; Atluri V
    Asia CCS 22 (2022); 2022 May; 2022():1237-1239. PubMed ID: 36625496
    [TBL] [Abstract][Full Text] [Related]  

  • 17. The Integrated Holistic Security and Privacy Framework Deployed in CrowdHEALTH Project.
    Malliaros S; Xenakis C; Moldovan G; Mantas J; Magdalinou A; Montandon L
    Acta Inform Med; 2019 Dec; 27(5):333-340. PubMed ID: 32210501
    [TBL] [Abstract][Full Text] [Related]  

  • 18. XACML for Mobility (XACML4M)-An Access Control Framework for Connected Vehicles.
    Ashutosh A; Gerl A; Wagner S; Brunie L; Kosch H
    Sensors (Basel); 2023 Feb; 23(4):. PubMed ID: 36850360
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Towards Supporting Attribute-Based Access Control in Hyperledger Fabric Blockchain.
    Pericherla A; Paul P; Sural S; Vaidya J; Atluri V
    IFIP Adv Inf Commun Technol; 2022 Jun; 648():360-376. PubMed ID: 36544863
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation.
    Xu Q; Tan C; Fan Z; Zhu W; Xiao Y; Cheng F
    Sensors (Basel); 2018 May; 18(5):. PubMed ID: 29772840
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.