These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

111 related articles for article (PubMed ID: 31929684)

  • 1. Deploying ABAC policies using RBAC Systems.
    Batra G; Atluri V; Vaidya J; Sural S
    J Comput Secur; 2019; 27(4):483-506. PubMed ID: 31929684
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Enabling the Deployment of ABAC Policies in RBAC Systems.
    Batra G; Atluri V; Vaidya J; Sural S
    Data Appl Secur Priv XXXII (2018); 2018 Jul; 10980():51-68. PubMed ID: 30687849
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Security Analysis of ABAC under an Administrative Model.
    Jha S; Sural S; Atluri V; Vaidysa J
    IET Inf Secur; 2019 Mar; 13(2):96-103. PubMed ID: 31214270
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Efficient bottom-up Mining of Attribute Based Access Control Policies.
    Talukdar T; Batra G; Vaidya J; Atluri V; Sural S
    IEEE Conf Collab Internet Comput; 2017 Oct; 2017():339-348. PubMed ID: 30506058
    [TBL] [Abstract][Full Text] [Related]  

  • 5. The need for the use of XACML access control policy in a distributed EHR and some performance considerations.
    Sucurovic S; Milutinovic V
    Stud Health Technol Inform; 2008; 137():346-52. PubMed ID: 18560096
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Contemporaneous Update and Enforcement of ABAC Policies.
    Talegaon S; Batra G; Atluri V; Sural S; Vaidya J
    Proc ACM Symp Access Control Model Technol; 2022 Jun; 2022():31-42. PubMed ID: 36507921
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Managing Attribute-Based Access Control Policies in a Unified Framework using Data Warehousing and In-Memory Database.
    Singh MP; Sural S; Vaidya J; Atluri V
    Comput Secur; 2019 Sep; 86():183-205. PubMed ID: 31662590
    [TBL] [Abstract][Full Text] [Related]  

  • 8. An Efficient Attribute-Based Access Control (ABAC) Policy Retrieval Method Based on Attribute and Value Levels in Multimedia Networks.
    Liu M; Yang C; Li H; Zhang Y
    Sensors (Basel); 2020 Mar; 20(6):. PubMed ID: 32245041
    [TBL] [Abstract][Full Text] [Related]  

  • 9. PolTree: A Data Structure for Making Efficient Access Decisions in ABAC.
    Nath R; Das S; Sural S; Vaidya J; Atluri V
    Proc ACM Symp Access Control Model Technol; 2019 Jun; 2019():25-35. PubMed ID: 31346589
    [TBL] [Abstract][Full Text] [Related]  

  • 10. PAMMELA: Policy Administration Methodology using Machine Learning.
    Gumma V; Mitra B; Dey S; Patel PS; Suman S; Das S; Vaidya J
    SECRYPT; 2022 Jul; 2022():147-157. PubMed ID: 36561130
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Health Information System Role-Based Access Control Current Security Trends and Challenges.
    de Carvalho Junior MA; Bandiera-Paiva P
    J Healthc Eng; 2018; 2018():6510249. PubMed ID: 29670743
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Policy Adaptation in Hierarchical Attribute-Based Access Control Systems.
    DAS S; Sural S; Vaidya J; Atluri V
    ACM Trans Internet Technol; 2019 Nov; 19(3):. PubMed ID: 31885522
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Optimal Employee Recruitment in Organizations under Attribute-Based Access Control.
    Roy A; Sural S; Majumdar AK; Vaidya J; Atluri V
    ACM Trans Manag Inf Syst; 2021 Jan; 12(1):. PubMed ID: 33927914
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Enabling Attribute-Based Access Control in Linux Kernel.
    Sai Varshith HO; Vaidya J; Sural S; Atluri V
    Asia CCS 22 (2022); 2022 May; 2022():1237-1239. PubMed ID: 36625496
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Poster: Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes.
    Das S; Sural S; Vaidya J; Atluri V
    Proc ACM Symp Access Control Model Technol; 2018 Jun; 2018():213-215. PubMed ID: 30687851
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Towards Supporting Attribute-Based Access Control in Hyperledger Fabric Blockchain.
    Pericherla A; Paul P; Sural S; Vaidya J; Atluri V
    IFIP Adv Inf Commun Technol; 2022 Jun; 648():360-376. PubMed ID: 36544863
    [TBL] [Abstract][Full Text] [Related]  

  • 17. On automated RBAC assessment by constructing a centralized perspective for microservice mesh.
    Das D; Walker A; Bushong V; Svacina J; Cerny T; Matyas V
    PeerJ Comput Sci; 2021; 7():e376. PubMed ID: 33817024
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Enabling Workforce Optimization in Constrained Attribute-Based Access Control Systems.
    Roy A; Sural S; Majumdar AK; Vaidya J; Atluri V
    IEEE Trans Emerg Top Comput; 2021; 9(4):1901-1913. PubMed ID: 34900448
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Incremental Maintenance of ABAC Policies.
    Batra G; Atluri V; Vaidya J; Sural S
    CODASPY; 2021 Apr; 2021():185-196. PubMed ID: 33977290
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Agent-Based Semantic Role Mining for Intelligent Access Control in Multi-Domain Collaborative Applications of Smart Cities.
    Ghazal R; Malik AK; Raza B; Qadeer N; Qamar N; Bhatia S
    Sensors (Basel); 2021 Jun; 21(13):. PubMed ID: 34206164
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.