Results 61 to 70 of about 252,498 (298)

Towards a Unified European View of Clinical Evidence: What ‘Health Technology Assessment Organizations’ Can Learn from Regulatory Experience

open access: yesJournal of Market Access & Health Policy
The harmonization of pharmaceutical regulations within the European Union has been a crucial step towards ensuring high safety standards and efficient access to innovative medicines.
Karl Broich, Wiebke Löbker
doaj   +1 more source

Obligations of trust for privacy and confidentiality in distributed transactions [PDF]

open access: yes, 2009
Purpose – This paper aims to describe a bilateral symmetric approach to authorization, privacy protection and obligation enforcement in distributed transactions.
Anne Anderson   +4 more
core   +1 more source

Constructing Authorization Systems Using Assurance Management Framework [PDF]

open access: yesIEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 2010
Model-driven approach has recently received much attention in developing secure software and systems. In addition, software developers have attempted to employ such an emerging approach in the early stage of software development life cycle. However, security concerns are rarely considered and practiced due to the lack of appropriate systematic ...
null Hongxin Hu, null Gail-Joon Ahn
openaire   +1 more source

Prevalence and Trajectory of Household Material Hardship Among Children With Advanced Cancer

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background/Objectives Families of children with advanced cancer living in poverty experience inferior outcomes including poor parent mental health and worse child quality of life. Household material hardship (HMH: food, housing, transportation, and/or utility insecurity) is a modifiable poverty exposure—and potential intervention target—that ...
Sarah Wright   +13 more
wiley   +1 more source

A Fair and Congestion-Aware Flight Authorization Framework for Unmanned Traffic Management

open access: yesAerospace
With the expected increase in drone operations, inter-operator fairness issues and congestion problems are expected to arise due to the strategic authorization approach mandated in European regulation. As an alternative, the proposed authorization method
David Carramiñana   +2 more
doaj   +1 more source

Personal Privacy and Common Goods: A Framework for Balancing Under the National Health Information Privacy Rule [PDF]

open access: yes, 2002
In this Article, we discuss how these principles for balancing apply in a number of important contexts where individually identifiable health data are shared. In Part I, we analyze the modern view favoring autonomy and privacy.
Gostin, Lawrence O.   +1 more
core   +2 more sources

Financial Burden Associated With Hospitalisation Among Families of Childhood Brain Tumours in Australia

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Families of children with cancer experience significant financial strain, even with universal healthcare. Indirect costs, such as productivity losses and non‐medical expenses, are rarely included in economic evaluations, and little is known about how effectively financial aid programmes alleviate this burden. Childhood brain tumours
Megumi Lim   +8 more
wiley   +1 more source

Temporal Defeasible Role–Group–Task Access Control: A Logic-Based Framework for Explainable Authorization

open access: yesIEEE Access
This paper introduces TDL-RGTA, a formal Temporal Defeasible Logic framework that enhances Role-Based Access Control (RBAC) by integrating organizational groups and contextual tasks into a dynamic, logic-based authorization model.
Hebah I. Abu Kaf   +2 more
doaj   +1 more source

Video Chat Application for Facebook [PDF]

open access: yes, 2011
This project is mainly written for the facebook users. In today’s world, there are many social networking sites available. Among those social networking web sites, facebook is widely used web site.
Chokshi, Shirali
core   +1 more source

A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications

open access: yes, 2017
Cloud computing is significantly reshaping the computing industry built around core concepts such as virtualization, processing power, connectivity and elasticity to store and share IT resources via a broad network.
Ethelbert, Obinna   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy