Results 91 to 100 of about 1,916,317 (370)

A Survey of Secure Computation Using Trusted Execution Environments [PDF]

open access: yesarXiv, 2023
As an essential technology underpinning trusted computing, the trusted execution environment (TEE) allows one to launch computation tasks on both on- and off-premises data while assuring confidentiality and integrity. This article provides a systematic review and comparison of TEE-based secure computation protocols.
arxiv  

Evaluation of computer ethics: confirmatory factor models using PROC CALIS [PDF]

open access: yes, 2008
The computer is considered one of the most essential technological advances and has become an everyday tool. Many tertiary institutions have become heavily dependent on computers, Internet and informations systems for educational purpose.
Ismail, Zuraini, Masrom, Maslin
core  

Modeling Security Policy and the Effect for End-Users [PDF]

open access: yes, 2013
Many "good practices" in computer security are based on assumptions and local evidence that do not generalize. There are few quantifiable methods of establishing or refuting the validity of these practices from a user perspective.
Jones, K., Salako, K.
core   +1 more source

Secure Computation Framework for Multiple Data Providers Against Malicious Adversaries [PDF]

open access: yessubmission of CCS 2020, 2020
Due to the great development of secure multi-party computation, many practical secure computation schemes have been proposed. As an example, different secure auction mechanisms have been widely studied, which can protect bid privacy while satisfying various economic properties.
arxiv  

Body contour adaptation for weight‐loss and bolus for head and neck radiotherapy on Ethos version 2.0 and HyperSight: Synthetic CT versus direct calculation

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Purpose In radiotherapy, body contour inaccuracies may compromise the delineation of adjacent structures and affect calculated dose. Here, we evaluate the un‐editable body contours auto‐generated by Ethos versions 1.0 (v1) and 2.0 (v2) treatment planning softwares for two simulated cases: weight‐loss and bolus application, particularly ...
Abby Yashayaeva   +2 more
wiley   +1 more source

SEML: Self-Supervised Information-Enhanced Meta-learning for Few-Shot Text Classification

open access: yesInternational Journal of Computational Intelligence Systems, 2023
Training a deep-learning text classification model usually requires a large amount of labeled data, yet labeling data are usually labor-intensive and time-consuming.
Hui Li   +5 more
doaj   +1 more source

Considerations for Cloud Security Operations [PDF]

open access: yesOracle CSO Advisory Board, Cloud Security Session, January, 2016, 2016
Information Security in Cloud Computing environments is explored. Cloud Computing is presented, security needs are discussed, and mitigation approaches are listed. Topics covered include Information Security, Cloud Computing, Private Cloud, Public Cloud, SaaS, PaaS, IaaS, ISO 27001, OWASP, Secure SDLC.
arxiv  

Information Security Games: A Survey [PDF]

open access: yesarXiv, 2021
We introduce some preliminaries about game theory and information security. Then surveying a subset of the literature, we identify opportunities for future research.
arxiv  

Effects of a Comprehensive Computer Security Policy on Human Computer Security Policy Compliance [PDF]

open access: yes, 2016
It is well known that humans are the weakest link in computer security, and that developing and maintaining a culture of computer security is essential for managing the human aspect of computer security. It is less well known how a comprehensive computer
Acuña, Dennis C.
core   +5 more sources

Routine machine quality assurance tests for a self‐shielded gyroscopic radiosurgery system

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Purpose This report describes routine machine quality assurance (QA) (daily, monthly, and annual QA) tests for the Zap‐X® Gyroscopic Radiosurgery® platform. Methods Following the recommendations of the American Association of Physicists in Medicine Task Group (AAPM TG)‐142 and Medical Physics Practice guideline (MPPG) 8.b, routine machine QA ...
Yongsook C. Lee   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy