Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Content Type
      Content Type
      Clear All
      Content Type
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Item Type
    • Is Full-Text Available
    • Subject
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
4,388 result(s) for "Web services Access control."
Sort by:
OAuth 2 in action
This book teaches you practical use and deployment of OAuth 2 from the perspectives of a client, an authorization server, and a resource server. You'll begin with an overview of OAuth and its components and interactions. Next, you'll get hands-on and build an OAuth client, an authorization server, and a protected resource. Then you'll dig into tokens, dynamic client registration, and more advanced topics
Secured User Behaviour Based Access Framework for Web Service
There are many web applications around us providing their services using web services. In order to prevent malicious users from accessing the web services is an important challenge now. Hence this proposed access control model provides the user an effective way to prevent the malicious user by calculating the trust value of every user based on their behaviours such as success rate, failure rate, frequent of access, transaction timeout etc., in the web application. This model also notices and precludes IP address spoofing, SQL injection to allow only the authorized users and access appropriate information. Prototype implementation and simulation results show the proposed model is the effective one when it is compared with existing models.
Data Collection and Remote Control of an IoT Electronic Nose Using Web Services and the MQTT Protocol
An electronic nose is a device capable of characterizing samples of substances and products by their aroma. The development of such devices relies on a series of non-specific sensors that react to gases and generate different signals, which can be used for compound identification and sample classification. The deployment of such devices often requires the possibility of having remote access over the Internet to manage their operation and to collect the sampled data. In this context, the application of web technologies to the monitoring and supervision of these systems connected to the Internet, which can be considered as an Internet of Things (IoT) device, offers the advantage of not requiring the development of client-side applications. Users can employ a browser to connect to the IoT device and monitor or control its operation. Moreover, web design enables the development of cross-platform web monitoring systems. In addition, the inclusion of the MQTT protocol and the utilization of a virtual private network (VPN) enable a secure transmission and collection of the sampled data. In this work, all these technologies have been applied in the development of a system to manage and collect data to monitor rot in lemons treated with sodium benzoate before harvest.
Access Control for IoT: A Survey of Existing Research, Dynamic Policies and Future Directions
Internet of Things (IoT) provides a wide range of services in domestic and industrial environments. Access control plays a crucial role in granting access rights to users and devices when an IoT device is connected to a network. However, many challenges exist in designing and implementing an ideal access control solution for the IoT due to the characteristics of the IoT including but not limited to the variety of the IoT devices, the resource constraints on the IoT devices, and the heterogeneous nature of the IoT. This paper conducts a comprehensive survey on access control in the IoT, including access control requirements, authorization architecture, access control models, access control policies, access control research challenges, and future directions. It identifies and summarizes key access control requirements in the IoT. The paper further evaluates the existing access control models to fulfill the access control requirements. Access control decisions are governed by access control policies. The existing approaches on dynamic policies’ specification are reviewed. The challenges faced by the existing solutions for policies’ specification are highlighted. Finally, the paper presents the research challenges and future directions of access control in the IoT. Due to the variety of IoT applications, there is no one-size-fits-all solution for access control in the IoT. Despite the challenges encountered in designing and implementing the access control in the IoT, it is desired to have an access control solution to meet all the identified requirements to secure the IoT.
Staying Connected In The COVID-19 Pandemic: Telehealth At The Largest Safety-Net System In The United States
New York City Health + Hospitals is the largest safety-net health care delivery system in the United States. Before the coronavirus disease 2019 (COVID-19) pandemic, NYC Health + Hospitals served more than one million patients annually, including the most vulnerable New Yorkers, while billing fewer than five hundred telehealth visits monthly. Once the pandemic struck, we established a strategy to allow us to continue to serve our existing patients while treating the surge of new patients. Starting in March 2020, we were able to transform the system using virtual care platforms through which we conducted almost eighty-three thousand billable televisits in one month, as well as more than thirty thousand behavioral health encounters via telephone and video. Telehealth also enabled us to support patient-family communication, postdischarge follow-up, and palliative care for patients with COVID-19. Expanded Medicaid coverage and insurance reimbursement for telehealth played a pivotal role in this transformation. As we move to a new blend of virtual and in-person care, it is vital that the major regulatory and insurance changes undergirding our COVID-19 telehealth response be sustained to protect access for our most vulnerable patients.
Applications of Blockchain in Industry 4.0: a Review
As the key component of Industry 4.0, IoT has been widely used in various fields of industry. But cloud-based data storage, computation, and communication in IoT cause many issues, such as transmission delay, single point of failure, and privacy disclosure. Moreover, the centralized access control in IoT constrains its availability and scalability. Blockchain is a decentralized, tamper-proof, trustless, transparent, and immutable append-only database. The integration of Blockchain and IoT technologies has led to robust distributed applications, including smart healthcare, smart finance, smart supply chain, smart cities, smart manufacturing, smart government, smart agriculture, smart transportation, smart education, smart e-commerce, and smart grid. Blockchain should be consolidated with 5G and artificial intelligence to tackle the challenges associated with digital transformation in Industry 4.0.
Utilization and Experiences of Using Quit Now, a Nicotine and Tobacco Smoking Cessation Website: Thematic Analysis
British Columbia residents have access to a program called QuitNow that provides behavioral support and information about pharmacotherapy to nicotine and tobacco users. Web- or computer-based smoking cessation programs have been shown to yield an abstinence rate about 1.5 times higher when compared to a control. Although quantitative evidence reveals significant promise for web-based services like QuitNow, there is very little qualitative evidence available. Understanding website utilization and the experiences of end users is key to contextualizing the effectiveness of web-based cessation services and providing directions for enhancing these services. This qualitative interview study aims to delve into users' utilization and experiences of QuitNow, which is supplemented by Google Analytics data. We interviewed 10 QuitNow users using semistructured interviews to understand what they liked the most and the least about QuitNow. We transcribed these interviews and conducted an inductive thematic analysis using NVivo (QSR International) software to extract common themes about user experiences. We also gathered utilization metrics via Google Analytics (n=13,856 users) to understand which aspects of QuitNow were used the most and which were used the least during the study period. Thematic analysis yielded four major themes: (1) barriers to information access reduce opportunities to take action, (2) lack of clarity around pharmacological options is discouraging, (3) hearing from others is an important part of the journey, and (4) recognizing own agency throughout the quit process. These themes provided context and support for the Google Analytics data, which showed that end user activity, measured by indicators such as page views and average time spent on each page, was highest on pages about how to quit (10,393 page views), pharmacology information (1999 page views), and the community forum (11,560 page views). Results of this study point to several important implications for improving the website, as well as directions for enhancing cessation support services in general.
Insights Into Older Adult Patient Concerns Around the Caregiver Proxy Portal Use: Qualitative Interview Study
Electronic patient portals have become common and offer many potential benefits for patients' self-management of health care. These benefits could be especially important for older adult patients dealing with significant chronic illness, many of whom have caregivers, such as a spouse, adult child, or other family member or friend, who help with health care management. Patient portals commonly contain large amounts of personal information, including diagnoses, health histories, medications, specialist appointments, lab results, and billing and insurance information. Some health care systems provide proxy accounts for caregivers to access a portal on behalf of a patient. It is not well known how much and in what way caregivers are using patient portals on behalf of patients and whether patients see any information disclosure risks associated with such access. The objective of this study was to examine how older adult patients perceive the benefits and risks of proxy patient portal access by their caregivers. We conducted semistructured interviews with 10 older adult patients with chronic illness. We asked them about their relationship with their caregivers, their use of their patient portal, their caregiver's use of the portal, and their perceptions about the benefits and risks of their caregiver's use of the portals. We also asked them about their comfort level with caregivers having access to information about a hypothetical diagnosis of a stigmatized condition. Two investigators conducted a thematic analysis of the qualitative data. All patients identified caregivers. Some had given caregivers access to their portals, in all cases by sharing log-in credentials, rather than by setting up an official proxy account. Patients generally saw benefits in their caregivers having access to the information and functions provided by the portal. Patients generally reported that they would be uncomfortable with caregivers learning of stigmatized conditions and also with caregivers (except spouses) accessing financial billing information. Patients share their electronic patient portal credentials with caregivers to receive the benefits of those caregivers having access to important medical information but are unaware of all the information those caregivers can access. Better portal design could alleviate these unwanted information disclosures.
Detection and Mitigation of IoT-Based Attacks Using SNMP and Moving Target Defense Techniques
This paper proposes a solution for ensuring the security of IoT devices in the cloud environment by protecting against distributed denial-of-service (DDoS) and false data injection attacks. The proposed solution is based on the integration of simple network management protocol (SNMP), Kullback–Leibler distance (KLD), access control rules (ACL), and moving target defense (MTD) techniques. The SNMP and KLD techniques are used to detect DDoS and false data sharing attacks, while the ACL and MTD techniques are applied to mitigate these attacks by hardening the target and reducing the attack surface. The effectiveness of the proposed framework is validated through experimental simulations on the Amazon Web Service (AWS) platform, which shows a significant reduction in attack probabilities and delays. The integration of IoT and cloud technologies is a powerful combination that can deliver customized and critical solutions to major business vendors. However, ensuring the confidentiality and security of data among IoT devices, storage, and access to the cloud is crucial to maintaining trust among internet users. This paper demonstrates the importance of implementing robust security measures to protect IoT devices in the cloud environment and highlights the potential of the proposed solution in protecting against DDoS and false data injection attacks.
Are We Inclusive? Accessibility Challenges in Philippine E-Government Websites
Web accessibility is essential for e-government in the Philippines to ensure that all citizens, including those with disabilities, can access important information and services. This study evaluates government web accessibility using the Web Content Accessibility Guidelines 2.0 from the World Wide Web Consortium and web presence based on the Government Website Template Design guidelines. A combination of automated testing tools and visual inspections was used for the assessment. Results showed significant discrepancies between web presence and web accessibility. Web presence compliance ranged from 28% to 82.67%, averaging 53.43%. Web accessibility scored higher, with compliance rates ranging from 62.32% to 97.1% and an average of 82.5%. This indicates that while many government agencies have focused on accessibility, there is a need to improve their digital services and visibility. A well-structured and user-friendly website is vital. However, without expanded online services, mobile accessibility, and transactional features, the full potential of digital governance remains untapped. Future studies are directed to aid government agencies with adopting accessible design principles, conducting regular audits, collaborating with disability advocacy groups, and integrating assistive technologies to foster a more inclusive and efficient digital government ecosystem.