Results 91 to 100 of about 1,916,317 (370)
A Survey of Secure Computation Using Trusted Execution Environments [PDF]
As an essential technology underpinning trusted computing, the trusted execution environment (TEE) allows one to launch computation tasks on both on- and off-premises data while assuring confidentiality and integrity. This article provides a systematic review and comparison of TEE-based secure computation protocols.
arxiv
Evaluation of computer ethics: confirmatory factor models using PROC CALIS [PDF]
The computer is considered one of the most essential technological advances and has become an everyday tool. Many tertiary institutions have become heavily dependent on computers, Internet and informations systems for educational purpose.
Ismail, Zuraini, Masrom, Maslin
core
Modeling Security Policy and the Effect for End-Users [PDF]
Many "good practices" in computer security are based on assumptions and local evidence that do not generalize. There are few quantifiable methods of establishing or refuting the validity of these practices from a user perspective.
Jones, K., Salako, K.
core +1 more source
Secure Computation Framework for Multiple Data Providers Against Malicious Adversaries [PDF]
Due to the great development of secure multi-party computation, many practical secure computation schemes have been proposed. As an example, different secure auction mechanisms have been widely studied, which can protect bid privacy while satisfying various economic properties.
arxiv
Abstract Purpose In radiotherapy, body contour inaccuracies may compromise the delineation of adjacent structures and affect calculated dose. Here, we evaluate the un‐editable body contours auto‐generated by Ethos versions 1.0 (v1) and 2.0 (v2) treatment planning softwares for two simulated cases: weight‐loss and bolus application, particularly ...
Abby Yashayaeva+2 more
wiley +1 more source
SEML: Self-Supervised Information-Enhanced Meta-learning for Few-Shot Text Classification
Training a deep-learning text classification model usually requires a large amount of labeled data, yet labeling data are usually labor-intensive and time-consuming.
Hui Li+5 more
doaj +1 more source
Considerations for Cloud Security Operations [PDF]
Information Security in Cloud Computing environments is explored. Cloud Computing is presented, security needs are discussed, and mitigation approaches are listed. Topics covered include Information Security, Cloud Computing, Private Cloud, Public Cloud, SaaS, PaaS, IaaS, ISO 27001, OWASP, Secure SDLC.
arxiv
Information Security Games: A Survey [PDF]
We introduce some preliminaries about game theory and information security. Then surveying a subset of the literature, we identify opportunities for future research.
arxiv
Effects of a Comprehensive Computer Security Policy on Human Computer Security Policy Compliance [PDF]
It is well known that humans are the weakest link in computer security, and that developing and maintaining a culture of computer security is essential for managing the human aspect of computer security. It is less well known how a comprehensive computer
Acuña, Dennis C.
core +5 more sources
Routine machine quality assurance tests for a self‐shielded gyroscopic radiosurgery system
Abstract Purpose This report describes routine machine quality assurance (QA) (daily, monthly, and annual QA) tests for the Zap‐X® Gyroscopic Radiosurgery® platform. Methods Following the recommendations of the American Association of Physicists in Medicine Task Group (AAPM TG)‐142 and Medical Physics Practice guideline (MPPG) 8.b, routine machine QA ...
Yongsook C. Lee+6 more
wiley +1 more source