9 research outputs found

    Policy resolution of shared data in online social networks

    Get PDF
    Online social networks have practically a go-to source for information divulging, social exchanges and finding new friends. The popularity of such sites is so profound that they are widely used by people belonging to different age groups and various regions. Widespread use of such sites has given rise to privacy and security issues. This paper proposes a set of rules to be incorporated to safeguard the privacy policies of related users while sharing information and other forms of media online. The proposed access control network takes into account the content sensitivity and confidence level of the accessor to resolve the conflicting privacy policies of the co-owners

    Trust Enhanced Role Based Access Control Using Genetic Algorithm

    Get PDF
    Improvements in technological innovations have become a boon for business organizations, firms, institutions, etc. System applications are being developed for organizations whether small-scale or large-scale. Taking into consideration the hierarchical nature of large organizations, security is an important factor which needs to be taken into account. For any healthcare organization, maintaining the confidentiality and integrity of the patients’ records is of utmost importance while ensuring that they are only available to the authorized personnel. The paper discusses the technique of Role-Based Access Control (RBAC) and its different aspects. The paper also suggests a trust enhanced model of RBAC implemented with selection and mutation only ‘Genetic Algorithm’. A practical scenario involving healthcare organization has also been considered. A model has been developed to consider the policies of different health departments and how it affects the permissions of a particular role. The purpose of the algorithm is to allocate tasks for every employee in an automated manner and ensures that they are not over-burdened with the work assigned. In addition, the trust records of the employees ensure that malicious users do not gain access to confidential patient data

    A multi-targeted approach to suppress tumor-promoting inflammation

    Get PDF
    Cancers harbor significant genetic heterogeneity and patterns of relapse following many therapies are due to evolved resistance to treatment. While efforts have been made to combine targeted therapies, significant levels of toxicity have stymied efforts to effectively treat cancer with multi-drug combinations using currently approved therapeutics. We discuss the relationship between tumor-promoting inflammation and cancer as part of a larger effort to develop a broad-spectrum therapeutic approach aimed at a wide range of targets to address this heterogeneity. Specifically, macrophage migration inhibitory factor, cyclooxygenase-2, transcription factor nuclear factor-κB, tumor necrosis factor alpha, inducible nitric oxide synthase, protein kinase B, and CXC chemokines are reviewed as important antiinflammatory targets while curcumin, resveratrol, epigallocatechin gallate, genistein, lycopene, and anthocyanins are reviewed as low-cost, low toxicity means by which these targets might all be reached simultaneously. Future translational work will need to assess the resulting synergies of rationally designed antiinflammatory mixtures (employing low-toxicity constituents), and then combine this with similar approaches targeting the most important pathways across the range of cancer hallmark phenotypes

    Development and Integration of E-learning Services Using REST APIs

    No full text
    E-Learning systems have gained a lot of traction amongst students and academicians due to their flexible nature in terms of location independence, time, effort, cost and other resources. The rapidly changing nature of the education domain makes the design, development, testing, and maintenance of E-Learning systems complex and expensive. In order to adapt to the changing policies of educational institutes as well as improve the performance of students, the paper presents a Service-Oriented Architecture (SOA) approach to minimize the cost and time associated with the development of E-Learning systems. The paper illustrates the development of independent E-Learning web services and how they can be combined to implement the required policies of respective education institutes. The paper also presents a sample policy implemented using developed web services to achieve the required objectives

    Construction management Graduation Project

    No full text
    Project management is the discipline of carefully projecting or planning, organizing, motivating and controlling resources to achieve specific goals Project scope: is the part of project planning that involves determining and documenting a list of specific project goals deliverable, tasks, costs and deadlines

    The epidemiology of hepatitis C virus in Iran: Systematic review and meta-analyses

    No full text

    A multi-targeted approach to suppress tumor-promoting inflammation

    No full text
    corecore