These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

109 related articles for article (PubMed ID: 31662590)

  • 1. Managing Attribute-Based Access Control Policies in a Unified Framework using Data Warehousing and In-Memory Database.
    Singh MP; Sural S; Vaidya J; Atluri V
    Comput Secur; 2019 Sep; 86():183-205. PubMed ID: 31662590
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Security Analysis of ABAC under an Administrative Model.
    Jha S; Sural S; Atluri V; Vaidysa J
    IET Inf Secur; 2019 Mar; 13(2):96-103. PubMed ID: 31214270
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Contemporaneous Update and Enforcement of ABAC Policies.
    Talegaon S; Batra G; Atluri V; Sural S; Vaidya J
    Proc ACM Symp Access Control Model Technol; 2022 Jun; 2022():31-42. PubMed ID: 36507921
    [TBL] [Abstract][Full Text] [Related]  

  • 4. An Efficient Attribute-Based Access Control (ABAC) Policy Retrieval Method Based on Attribute and Value Levels in Multimedia Networks.
    Liu M; Yang C; Li H; Zhang Y
    Sensors (Basel); 2020 Mar; 20(6):. PubMed ID: 32245041
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Enabling the Deployment of ABAC Policies in RBAC Systems.
    Batra G; Atluri V; Vaidya J; Sural S
    Data Appl Secur Priv XXXII (2018); 2018 Jul; 10980():51-68. PubMed ID: 30687849
    [TBL] [Abstract][Full Text] [Related]  

  • 6. PolTree: A Data Structure for Making Efficient Access Decisions in ABAC.
    Nath R; Das S; Sural S; Vaidya J; Atluri V
    Proc ACM Symp Access Control Model Technol; 2019 Jun; 2019():25-35. PubMed ID: 31346589
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Deploying ABAC policies using RBAC Systems.
    Batra G; Atluri V; Vaidya J; Sural S
    J Comput Secur; 2019; 27(4):483-506. PubMed ID: 31929684
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Enabling Attribute-based Access Control in NoSQL Databases.
    Gupta E; Sural S; Vaidya J; Atluri V
    IEEE Trans Emerg Top Comput; 2023; 11(1):208-223. PubMed ID: 37274839
    [TBL] [Abstract][Full Text] [Related]  

  • 9. RESPOnSE-A Framework for Enforcing Risk-Aware Security Policies in Constrained Dynamic Environments.
    Michailidou C; Gkioulos V; Shalaginov A; Rizos A; Saracino A
    Sensors (Basel); 2020 May; 20(10):. PubMed ID: 32456150
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Query Monitoring and Analysis for Database Privacy - A Security Automata Model Approach.
    Kumar A; Ligatti J; Tu YC
    Proc Int Conf Web Inf Syst Eng; 2015 Nov; 9419():458-472. PubMed ID: 26997936
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Enabling Agile Clinical and Translational Data Warehousing: Platform Development and Evaluation.
    Spengler H; Lang C; Mahapatra T; Gatz I; Kuhn KA; Prasser F
    JMIR Med Inform; 2020 Jul; 8(7):e15918. PubMed ID: 32706673
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Efficient bottom-up Mining of Attribute Based Access Control Policies.
    Talukdar T; Batra G; Vaidya J; Atluri V; Sural S
    IEEE Conf Collab Internet Comput; 2017 Oct; 2017():339-348. PubMed ID: 30506058
    [TBL] [Abstract][Full Text] [Related]  

  • 13. PAMMELA: Policy Administration Methodology using Machine Learning.
    Gumma V; Mitra B; Dey S; Patel PS; Suman S; Das S; Vaidya J
    SECRYPT; 2022 Jul; 2022():147-157. PubMed ID: 36561130
    [TBL] [Abstract][Full Text] [Related]  

  • 14. XACML for Mobility (XACML4M)-An Access Control Framework for Connected Vehicles.
    Ashutosh A; Gerl A; Wagner S; Brunie L; Kosch H
    Sensors (Basel); 2023 Feb; 23(4):. PubMed ID: 36850360
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Enabling Workforce Optimization in Constrained Attribute-Based Access Control Systems.
    Roy A; Sural S; Majumdar AK; Vaidya J; Atluri V
    IEEE Trans Emerg Top Comput; 2021; 9(4):1901-1913. PubMed ID: 34900448
    [TBL] [Abstract][Full Text] [Related]  

  • 16. The need for the use of XACML access control policy in a distributed EHR and some performance considerations.
    Sucurovic S; Milutinovic V
    Stud Health Technol Inform; 2008; 137():346-52. PubMed ID: 18560096
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Enabling Attribute-Based Access Control in Linux Kernel.
    Sai Varshith HO; Vaidya J; Sural S; Atluri V
    Asia CCS 22 (2022); 2022 May; 2022():1237-1239. PubMed ID: 36625496
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Optimal Employee Recruitment in Organizations under Attribute-Based Access Control.
    Roy A; Sural S; Majumdar AK; Vaidya J; Atluri V
    ACM Trans Manag Inf Syst; 2021 Jan; 12(1):. PubMed ID: 33927914
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Access control based on attribute certificates for medical intranet applications.
    Mavridis I; Georgiadis C; Pangalos G; Khair M
    J Med Internet Res; 2001; 3(1):E9. PubMed ID: 11720951
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Semantic security: specification and enforcement of semantic policies for security-driven collaborations.
    Sinnott RO; Doherty T; Gray N; Lusted J
    Stud Health Technol Inform; 2009; 147():201-11. PubMed ID: 19593058
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.