|
|
|
Yunpeng Ma and Ferenc Mészáros
This article reviewed the urban vehicle access control policies derived from disparate spatiotemporal dimensions that aim to eliminate the negative externalities of traffic caused by urbanization. Urban access regulations are important tools often requir...
ver más
|
|
|
|
|
|
|
Abner Perez-Haro and Arturo Diaz-Perez
Policy mining is an automated procedure for generating access rules by means of mining patterns from single permissions, which are typically registered in access logs. Attribute-based access control (ABAC) is a model which allows security administrators ...
ver más
|
|
|
|
|
|
|
Xin Geng, Yinghong Wen, Zhisong Mo and Yu Liu
The construction of multilayer rail transit systems is a necessary way to realize ?modern metropolitan areas on rail?, improve resource sharing, and increase travel services, where data integration is of utmost importance. To break data silos and realize...
ver más
|
|
|
|
|
|
|
Vangelis Malamas, George Palaiologos, Panayiotis Kotzanikolaou, Mike Burmester and Dimitris Glynos
Although there are several access control systems in the literature for flexible policy management in multi-authority and multi-domain environments, achieving interoperability and scalability, without relying on strong trust assumptions, is still an open...
ver más
|
|
|
|
|
|
|
Ghada Tayem and Mohammad Tayeh
Lines of credit constitute an integral part of a firm?s liquidity policy; however, there is limited research on lines of credit in emerging markets. This study fills this gap by examining firm incentives to access and draw from lines of credit using the ...
ver más
|
|
|
|
|
|
|
Tao Feng, Dewei Wang and Renbin Gong
When choosing a third-party cloud storage platform, the confidentiality of data should be the primary concern. To address the issue of one-to-many access control during data sharing, it is important to encrypt data with an access policy that enables fine...
ver más
|
|
|
|
|
|
|
Saad Inshi, Rasel Chowdhury, Hakima Ould-Slimane and Chamseddine Talhi
Predicting context-aware activities using machine-learning techniques is evolving to become more readily available as a major driver of the growth of IoT applications to match the needs of the future smart autonomous environments. However, with today?s i...
ver más
|
|
|
|
|
|
|
Leina Abdelgalil and Mohamed Mejri
Electronic health records (EHRs) play an important role in our life. However, most of the
time, they are scattered and saved on different databases belonging to distinct institutions (hospitals,
laboratories, clinics, etc.) geographically distributed acr...
ver más
|
|
|
|
|
|
|
Dong-Her Shih, Ting-Wei Wu, Ming-Hung Shih, Guan-Wei Chen and David C. Yen
The Industrial Internet of Things (IIoT) plays an important role in Industry 4.0, but the existing IIoT systems could be vulnerable to a single point of failure and malicious attacks, failing to provide reliable services. IIoT devices have some particula...
ver más
|
|
|
|
|
|
|
Peng Zhai, Jingsha He and Nafei Zhu
The integration of information systems and physical systems is the development trend of today?s manufacturing industry. Intelligent manufacturing is a new model of manufacturing, based on advanced manufacturing technology with human?machine?material coll...
ver más
|
|
|
|