Showing 1 - 20 results of 27 for search 'role-based process', query time: 0.19s Refine Results
  1. 1

    Models of data processing and logical access segregation considering the heterogeneity of entities in information systems by Сергій Семенов, Сергій Енгаличев, Максим Почебут, Оксана Сітнікова

    Published 2024-06-01
    “…The tasks to be solved include: conducting a comparative analysis of modern data access distribution models, integrating simpler role-based models, synthesizing hierarchical role-based models, developing enforced typing models based on trust relationships, and presenting the main provisions of the security policy integration process. …”
    Get full text
    Article
  2. 2

    Researches on role-based middleware in wireless sensor networks by LUO Juan, GU Chuan-li, LI Ren-fa

    Published 2011-01-01
    “…According to the diversity and difference of the role played by nodes in WSN,the role mapping framework model in WSN was proposed.A role-based middleware for wireless sensor networks(RobMSN) was designed based on that model.From the view of the formal semantics and specifications of the middleware,the role mapping specifications solve the problem of semantic conflicts in role mapping abstract,making the role mapping context fully reflected in the role specifications of middleware.Applications will be mapped as the specific roles of node which played in the wireless sensor networks using RobMSN,it can be cross-platform and implement dynamic application services.Finally,an appli-cation development example was used to illustrate the design and development process of RobMSN middleware.…”
    Get full text
    Article
  3. 3
  4. 4

    Trustworthy AI: Securing Sensitive Data in Large Language Models by Georgios Feretzakis, Vassilios S. Verykios

    Published 2024-12-01
    “…Large language models (LLMs) have transformed Natural Language Processing (NLP) by enabling robust text generation and understanding. …”
    Get full text
    Article
  5. 5

    An Approach to Data Processing for the Smart District Heating System by A. V. Sednin, A. V. Zherelo

    Published 2022-06-01
    “…Approaches to further processing of the collected data are shown, differing in the way of parallel data processing. …”
    Get full text
    Article
  6. 6

    Research on automatic processing system of financial information in colleges and universities based on NLP-KG fusion algorithm by Jin Lei, Mengke Wei, Yiwen She, Weixia Wang

    Published 2025-12-01
    “…At a time when information technology is deeply embedded in the management of colleges and universities and the automatic demand for financial information processing is urgent, the automatic processing system of financial information in colleges and universities based on NLP and KG fusion algorithm has come into being, which can efficiently process massive data, improve work efficiency an scientific decision-making, but its data security and privacy protection are extremely critical. …”
    Get full text
    Article
  7. 7

    The Experiences of Syrian Female Students During the Distance Education and the Insights of Religious Culture and Ethics Teachers into the Process by İshak Tekin, Mustafa Fatih Ay

    Published 2024-12-01
    “…However, Syrian girls may face disadvantages in their education due to traditional gender roles. Based on this premise, this study aims to examine the educational processes of Syrian girls during the COVID-19 pandemic from the perspectives of teachers, parents, and the students themselves. …”
    Get full text
    Article
  8. 8

    Improved Private Data Protection Scheme for Blockchain Smart Contracts by Sheng Hu

    Published 2023-01-01
    “…Secondly, we incorporate the role-based access control (RBAC) model with smart contracts to finely divide user privileges, construct an interdomain role-based access control (ID-RBAC) model, and provide detailed access authentication process designs for both within and between domains. …”
    Get full text
    Article
  9. 9

    Research on electronic medical record access control based on blockchain by Yongbin Zhao, Meng Cui, Lijuan Zheng, Rui Zhang, Lili Meng, Dong Gao, Yu Zhang

    Published 2019-11-01
    “…In view of these problems, a blockchain-based electronic medical record access control research scheme based on the role-based access control model is proposed in this article. …”
    Get full text
    Article
  10. 10

    "Black Hole" Debt Restructuring and Banking Measures Strengthening Performance and Role of Intermediation: Islamic and Commercial Bank In Indonesian by Muhammad Iqbal Fasa, Loni Hendri, Suharto Suharto

    Published 2021-02-01
    “…Second, credit restructuring needs some sorting process, which will exclude unpotential debitur. Third, uncertainty of recovery process of debitur as impact of COVID-19. …”
    Get full text
    Article
  11. 11

    Enhancing Smart Home Security: Blockchain-Enabled Federated Learning with Knowledge Distillation for Intrusion Detection by Mohammed Shalan, Md Rakibul Hasan, Yan Bai, Juan Li

    Published 2025-02-01
    “…Blockchain technology is integrated to provide decentralized, tamper-resistant access control through Role-Based Access Control (RBAC), allowing only authenticated devices to participate in the federated learning process. …”
    Get full text
    Article
  12. 12

    A blockchain-based access control method for large-scale electronic medical records by Zhen Chu, Wangjie Qiu, Tianyu Lei, Jinchun He, Qinnan Zhang

    Published 2025-05-01
    “…To bridge these critical gaps, we propose a novel role-based access control (RBAC) framework that enables secure and efficient management of large-scale, high-frequency data access. …”
    Get full text
    Article
  13. 13

    A Comprehensive Integrated Security Model with Advanced Access Control for Enhancing WSN Computing in IoT Frameworks by Navaneethan S., Arun A.

    Published 2025-01-01
    “…The model employs a comprehensive approach encompassing Access Control Processes, Integrated Encryption Processes, and Re-Encryption Processes to enhance data confidentiality and integrity. …”
    Get full text
    Article
  14. 14

    Developing a Cloud-Native Internship Management Platform: Enhanced Efficiency and Integration through Object-Oriented Architecture by Pratomo Setiaji, Soni Adiyono, Adhie Prayogo, Nita Kurniasari

    Published 2025-03-01
    “…The platform ensures scalability, role-based access control, and secure data encryption. …”
    Get full text
    Article
  15. 15

    Actors, Roles, and Behaviours by Bartlomiej Walczak

    Published 2023-05-01
    “…Applying these concepts to ADVISE methodology allows for more nuanced and stricter process by focusing on Actions in Phase 1 and Decisions in Phase 2. …”
    Get full text
    Article
  16. 16

    Life strategies of modern young men (on the materials of a sociological research) by Nadezhda Afanasevna Frolova

    Published 2023-03-01
    “…The relevance of the scientific research is due, on the one hand, to demographic processes, which are associated, inter alia, with high mortality of men, and, on the other, to the crisis of masculinity and the transformation of masculinity in modern society, which have entailed the problems of role-based self-identification and self-realization of men. …”
    Get full text
    Article
  17. 17

    RACHEIM: Reinforced Reliable Computing in Cloud by Ensuring Restricted Access Control by Urvashi Rahul Saxena, Rajan Kadel

    Published 2025-06-01
    “…As the number of service users increases, so does the demand for computational resources, leading data owners to outsource processing tasks to remote cloud servers. The internet-based delivery of cloud computing services consequently expands the attack surface and impacts the trust relationship between the service user and the service provider. …”
    Get full text
    Article
  18. 18

    Integrating Blockchain, SSI, and RBAC for the Secure Management of Defense Heritage Buildings by Gavina Baralla, Luisanna Cocco, Marco Di Francesco, Roberto Tonelli

    Published 2025-01-01
    “…Central to our system is the innovative dual-layer access control that combines SSI with Role-Based Access Control (RBAC), ensuring decentralized and secure management of identities and access permissions. …”
    Get full text
    Article
  19. 19

    Leveraging Grammatical Roles for Measuring Semantic Similarity Between Texts by Md. Atabuzzaman, Md Shajalal, M. Elius Ahmed, Masud Ibn Afjal, Masaki Aono

    Published 2021-01-01
    “…Assessing the textual similarity is a prerequisite in almost all applications in the field of language processing and information retrieval. However, the diversity in the sentence structure makes it formidable to estimate the similarity. …”
    Get full text
    Article
  20. 20

    BlockArc: A Blockchain Based Smart Contract for Reward System in E-Commerce by Pooja Patil, Aryan Singh, Aryan Raut, Aakash Sharma, Adarsh Rathod

    Published 2025-07-01
    “…Security is reinforced using cryptographic hashing, Zero-Knowledge Proofs (ZKPs), and Role-Based Access Control (RBAC) to prevent fraudulent activities. …”
    Get full text
    Article