M Wilikens, S Feriti, A Sanna, M Masera - Proceedings of the seventh …, 2002 - dl.acm.org
This paper describes an application of authorization and access control based on the Role Based Access Control (RBAC) method and integrated in a comprehensive trust …
D Bakkiam Deebak… - … and Computation: Practice …, 2023 - Wiley Online Library
Abstract Internet of Things (IoT) and cyber‐physical systems demand proper real‐time data processing and analysis to fulfill the essential characteristics of seamless computing …
F Hansen, V Oleshchuk - Scandinavian conference in health …, 2003 - researchgate.net
The paper presents a Spatial Role-based Access Control (SRBAC) framework and its application to healthcare information systems that allows wireless access to information. The …
T Nicolaysen, R Sassoon, MB Line… - International Journal of …, 2010 - igi-global.com
In this article, the authors contrast the results of a series of interviews with agile software development organizations with a case study of a distributed agile development effort …
AA Izaara, R Ssembatya… - … Conference on Intelligent …, 2018 - ieeexplore.ieee.org
The increasing expansion of wireless systems and the extensive popularity and usage of mobile devices such as mobile phones and wireless tablets represents a great opportunity …
The establishment of an efficient access control system in healthcare intranets is a critical security issue directly related to the protection of patients' privacy. Our C-TMAC (Context and …
LA Slevin, A Macfie - IASTED-Software Engineering and Applications …, 2007 - Citeseer
This paper describes the testing the applicability of Role Based Access Control (RBAC) within an existing medical database in the Oncology Department at St. Bartholomew's …
E Sanzi, SA Demurjian, J Billings - 2017 5th IEEE International …, 2017 - ieeexplore.ieee.org
Access to sensitive information is traditionally achieved through an authentication and authorization process via a username/password combination to validate a user's identity that …