These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

99 related articles for article (PubMed ID: 31885522)

  • 1. Policy Adaptation in Hierarchical Attribute-Based Access Control Systems.
    DAS S; Sural S; Vaidya J; Atluri V
    ACM Trans Internet Technol; 2019 Nov; 19(3):. PubMed ID: 31885522
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Efficient bottom-up Mining of Attribute Based Access Control Policies.
    Talukdar T; Batra G; Vaidya J; Atluri V; Sural S
    IEEE Conf Collab Internet Comput; 2017 Oct; 2017():339-348. PubMed ID: 30506058
    [TBL] [Abstract][Full Text] [Related]  

  • 3. PolTree: A Data Structure for Making Efficient Access Decisions in ABAC.
    Nath R; Das S; Sural S; Vaidya J; Atluri V
    Proc ACM Symp Access Control Model Technol; 2019 Jun; 2019():25-35. PubMed ID: 31346589
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Poster: Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes.
    Das S; Sural S; Vaidya J; Atluri V
    Proc ACM Symp Access Control Model Technol; 2018 Jun; 2018():213-215. PubMed ID: 30687851
    [TBL] [Abstract][Full Text] [Related]  

  • 5. PAMMELA: Policy Administration Methodology using Machine Learning.
    Gumma V; Mitra B; Dey S; Patel PS; Suman S; Das S; Vaidya J
    SECRYPT; 2022 Jul; 2022():147-157. PubMed ID: 36561130
    [TBL] [Abstract][Full Text] [Related]  

  • 6. An Efficient Attribute-Based Access Control (ABAC) Policy Retrieval Method Based on Attribute and Value Levels in Multimedia Networks.
    Liu M; Yang C; Li H; Zhang Y
    Sensors (Basel); 2020 Mar; 20(6):. PubMed ID: 32245041
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Security Analysis of ABAC under an Administrative Model.
    Jha S; Sural S; Atluri V; Vaidysa J
    IET Inf Secur; 2019 Mar; 13(2):96-103. PubMed ID: 31214270
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Contemporaneous Update and Enforcement of ABAC Policies.
    Talegaon S; Batra G; Atluri V; Sural S; Vaidya J
    Proc ACM Symp Access Control Model Technol; 2022 Jun; 2022():31-42. PubMed ID: 36507921
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Enabling the Deployment of ABAC Policies in RBAC Systems.
    Batra G; Atluri V; Vaidya J; Sural S
    Data Appl Secur Priv XXXII (2018); 2018 Jul; 10980():51-68. PubMed ID: 30687849
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Deploying ABAC policies using RBAC Systems.
    Batra G; Atluri V; Vaidya J; Sural S
    J Comput Secur; 2019; 27(4):483-506. PubMed ID: 31929684
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Enabling Workforce Optimization in Constrained Attribute-Based Access Control Systems.
    Roy A; Sural S; Majumdar AK; Vaidya J; Atluri V
    IEEE Trans Emerg Top Comput; 2021; 9(4):1901-1913. PubMed ID: 34900448
    [TBL] [Abstract][Full Text] [Related]  

  • 12. The need for the use of XACML access control policy in a distributed EHR and some performance considerations.
    Sucurovic S; Milutinovic V
    Stud Health Technol Inform; 2008; 137():346-52. PubMed ID: 18560096
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Incremental Maintenance of ABAC Policies.
    Batra G; Atluri V; Vaidya J; Sural S
    CODASPY; 2021 Apr; 2021():185-196. PubMed ID: 33977290
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Enabling Attribute-Based Access Control in Linux Kernel.
    Sai Varshith HO; Vaidya J; Sural S; Atluri V
    Asia CCS 22 (2022); 2022 May; 2022():1237-1239. PubMed ID: 36625496
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Managing Attribute-Based Access Control Policies in a Unified Framework using Data Warehousing and In-Memory Database.
    Singh MP; Sural S; Vaidya J; Atluri V
    Comput Secur; 2019 Sep; 86():183-205. PubMed ID: 31662590
    [TBL] [Abstract][Full Text] [Related]  

  • 16. HyPE: A Hybrid Approach toward Policy Engineering in Attribute-Based Access Control.
    Das S; Sural S; Vaidya J; Atluri V
    IEEE Lett Comput Soc; 2018; 1(2):25-29. PubMed ID: 30906923
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Optimal Employee Recruitment in Organizations under Attribute-Based Access Control.
    Roy A; Sural S; Majumdar AK; Vaidya J; Atluri V
    ACM Trans Manag Inf Syst; 2021 Jan; 12(1):. PubMed ID: 33927914
    [TBL] [Abstract][Full Text] [Related]  

  • 18. XACML for Mobility (XACML4M)-An Access Control Framework for Connected Vehicles.
    Ashutosh A; Gerl A; Wagner S; Brunie L; Kosch H
    Sensors (Basel); 2023 Feb; 23(4):. PubMed ID: 36850360
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage.
    Wang S; Gao T; Zhang Y
    PLoS One; 2018; 13(11):e0206126. PubMed ID: 30383840
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems.
    Mell P; Shook J; Harang R; Gavrila S
    J Wirel Mob Netw Ubiquitous Comput Dependable Appl; 2017 Mar; 8(1):4-25. PubMed ID: 28758045
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 5.