These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

141 related articles for article (PubMed ID: 32245041)

  • 1. An Efficient Attribute-Based Access Control (ABAC) Policy Retrieval Method Based on Attribute and Value Levels in Multimedia Networks.
    Liu M; Yang C; Li H; Zhang Y
    Sensors (Basel); 2020 Mar; 20(6):. PubMed ID: 32245041
    [TBL] [Abstract][Full Text] [Related]  

  • 2. PolTree: A Data Structure for Making Efficient Access Decisions in ABAC.
    Nath R; Das S; Sural S; Vaidya J; Atluri V
    Proc ACM Symp Access Control Model Technol; 2019 Jun; 2019():25-35. PubMed ID: 31346589
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Efficient bottom-up Mining of Attribute Based Access Control Policies.
    Talukdar T; Batra G; Vaidya J; Atluri V; Sural S
    IEEE Conf Collab Internet Comput; 2017 Oct; 2017():339-348. PubMed ID: 30506058
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Security Analysis of ABAC under an Administrative Model.
    Jha S; Sural S; Atluri V; Vaidysa J
    IET Inf Secur; 2019 Mar; 13(2):96-103. PubMed ID: 31214270
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation.
    Xu Q; Tan C; Fan Z; Zhu W; Xiao Y; Cheng F
    Sensors (Basel); 2018 May; 18(5):. PubMed ID: 29772840
    [TBL] [Abstract][Full Text] [Related]  

  • 6. The need for the use of XACML access control policy in a distributed EHR and some performance considerations.
    Sucurovic S; Milutinovic V
    Stud Health Technol Inform; 2008; 137():346-52. PubMed ID: 18560096
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Managing Attribute-Based Access Control Policies in a Unified Framework using Data Warehousing and In-Memory Database.
    Singh MP; Sural S; Vaidya J; Atluri V
    Comput Secur; 2019 Sep; 86():183-205. PubMed ID: 31662590
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Enabling Attribute-based Access Control in NoSQL Databases.
    Gupta E; Sural S; Vaidya J; Atluri V
    IEEE Trans Emerg Top Comput; 2023; 11(1):208-223. PubMed ID: 37274839
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Internet of Multimedia Things (IoMT): Opportunities, Challenges and Solutions.
    Zikria YB; Afzal MK; Kim SW
    Sensors (Basel); 2020 Apr; 20(8):. PubMed ID: 32325944
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage.
    Wang S; Gao T; Zhang Y
    PLoS One; 2018; 13(11):e0206126. PubMed ID: 30383840
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Deploying ABAC policies using RBAC Systems.
    Batra G; Atluri V; Vaidya J; Sural S
    J Comput Secur; 2019; 27(4):483-506. PubMed ID: 31929684
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things.
    Zhang Q; Li Y; Li Z; Yuan J; Gan Y; Luo X
    Sensors (Basel); 2019 Nov; 19(23):. PubMed ID: 31795236
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Enabling the Deployment of ABAC Policies in RBAC Systems.
    Batra G; Atluri V; Vaidya J; Sural S
    Data Appl Secur Priv XXXII (2018); 2018 Jul; 10980():51-68. PubMed ID: 30687849
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A Study on CP-ABE-based Medical Data Sharing System with Key Abuse Prevention and Verifiable Outsourcing in the IoMT Environment.
    Hwang YW; Lee IY
    Sensors (Basel); 2020 Aug; 20(17):. PubMed ID: 32878202
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Contemporaneous Update and Enforcement of ABAC Policies.
    Talegaon S; Batra G; Atluri V; Sural S; Vaidya J
    Proc ACM Symp Access Control Model Technol; 2022 Jun; 2022():31-42. PubMed ID: 36507921
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Poster: Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes.
    Das S; Sural S; Vaidya J; Atluri V
    Proc ACM Symp Access Control Model Technol; 2018 Jun; 2018():213-215. PubMed ID: 30687851
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Policy Adaptation in Hierarchical Attribute-Based Access Control Systems.
    DAS S; Sural S; Vaidya J; Atluri V
    ACM Trans Internet Technol; 2019 Nov; 19(3):. PubMed ID: 31885522
    [TBL] [Abstract][Full Text] [Related]  

  • 18. An efficient attribute-based access control system with break-glass capability for cloud-assisted industrial control system.
    Tu Y; Wang J; Yang G; Liu B
    Math Biosci Eng; 2021 Apr; 18(4):3559-3577. PubMed ID: 34198401
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Unified Fine-Grained Access Control for Personal Health Records in Cloud Computing.
    Li W; Liu BM; Liu D; Liu RP; Wang P; Luo S; Ni W
    IEEE J Biomed Health Inform; 2019 May; 23(3):1278-1289. PubMed ID: 29994490
    [TBL] [Abstract][Full Text] [Related]  

  • 20. PAMMELA: Policy Administration Methodology using Machine Learning.
    Gumma V; Mitra B; Dey S; Patel PS; Suman S; Das S; Vaidya J
    SECRYPT; 2022 Jul; 2022():147-157. PubMed ID: 36561130
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.