ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Education
Technology
Pure sciences
Research
Social Sciences
Biology
Public health
Economy
Architecture and Urbanism
Medicine / Sub specialtie
all records (75)

Languages
English
Spanish
Portuguese

Countries
Indonesia
USA
Brazil
Austria
Ukraine
South Africa
Pakistan
Canada
Switzerland
Germany
all records (77)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
333.755  Articles
1 of 33.377 pages  |  10  records  |  more records»
In the medical industry, it is critical to ensure the confidentiality of patients’ personal health records when storing and managing them. Before cloud computing surfaced, heath providers used local servers and hard drives to store their records and dat... see more

Large Hadron Collider (LHC) is the largest scientific instrument ever created. It was built with the intention of testing the most extreme conditions of the matter. Taking into account the significant dangers of LHC operations, European Organization for N... see more

Utilization of contextual information considered very useful for improving access decision making process against systems resources, to be more effective in providing authorized service for a large number of end users.We selected model makes decisions bas... see more

The rapid development of information technology at this time also has an impact on the use of information technology in the university environment. XYZ University as a university that has quite a lot of students also applies information technology to supp... see more

Nowadays security has become an important aspect in information systems engineering. A mainstream method for information system security is Role-based Access Control (RBAC), which restricts system access to authorised users. While the benefits of RBAC are... see more

Medical records are well known to contain vital, sensitive and treasurable information about patients and it is therefore important to guard them against any form of unpermitted or unauthorized access. The motive behind this paper is to benchmark Role Bas... see more

Generally, the existing store management system does not provide any access control mechanism in order to manage resources. All levels of user have the same right to access the store and borrow the equipment. Therefore, the E-Store management system using... see more

Smart mobile devices and cloud computing are widely used today. While mobile and portable devices have different capabilities, architectures, operating systems, and communication channels than one another, government data are distributed over heterogeneou... see more

AbstractBackground: The aim of ward-based outreach teams (WBOTs) is to improve access to primary healthcare (PHC) services including health promotion and disease prevention in South Africa. Limited information is available in South Africa on user percepti... see more

1 of 33.377 pages  |  10  records  |  more records»