no code implementations • 5 Jul 2021 • Ravi Teja Batchu, Abeer Alsadoon, P. W. C. Prasad, Rasha S. Ali, Tarik A. Rashid, Ghossoon Alsadoon, Oday D. Jerew
The proposed model has been developed for access control to data through the authentication of users in healthcare to reduce data manipulation or theft.