Search Results

Results (4)

Search Parameters:

Keyword: Authorization
Order results
Results per page
Open AccessArticle
9 Pages, 664 KB Download PDF

Towards Adoption of Authentication and Authorization in Identity Management and Single Sign On

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 5, Page # 492–500, 2018; DOI: 10.25046/aj030556
Abstract:

Identity and Access Management (IAM) and Single Sign on (SSO) are two security concepts that are related to each other. IAM governs the user access in an organization whereas SSO facilitates the user by authenticating to one centralized application and not having to re-authenticate when trying to access other applications. This paper addresses the different…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
12 Pages, 1,751 KB Download PDF

Cloud-Based Hierarchical Consortium Blockchain Networks for Timely Publication and Efficient Retrieval of Electronic Health Records

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 2, Page # 179–190, 2022; DOI: 10.25046/aj070218
Abstract:

Blockchain technology is seeing a trend of popularity and adoption in many different application areas. One such area is healthcare, as there is a need to develop a system that can reliably store and share electronic health records (EHRs) among hospital-based health facilities. In this paper, we present a cloud-based hierarchical consortium blockchain framework for…

Read More
(This article belongs to the SP12 (Special Issue on Multidisciplinary Sciences and Engineering 2021-22) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
9 Pages, 1,013 KB Download PDF

Ontology Based Privacy Preservation over Encrypted Data using Attribute-Based Encryption Technique

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 378–386, 2021; DOI: 10.25046/aj060244
Abstract:

The web documents are automatically interacting to discover the information by web mining, which is one of the applications of Cloud Computing (CC) technologies. These documents may be in the form of structured, semi-structured, or unstructured formats. In current web technologies, the Semantic Web is an extension for better enabling the people and computers to…

Read More
(This article belongs to Section Cybernetics in Computer Science (CCY))
Open AccessArticle
7 Pages, 953 KB Download PDF

A Novel Blockchain-Based Authentication and Access Control Model for Smart Environment

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 1, Page # 651–657, 2021; DOI: 10.25046/aj060171
Abstract:

With the increase of smart factories and smart cities following the recent 4th industrial revolution, internal user authentication and authorization have become an important issue. The user authentication model using the server-client structure has a problem of forgery of the access history caused by the log manipulation of the administrator and unclearness of the responsibility.…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Interdisciplinary Applications of Computer Science (CSI))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026