Results 111 to 120 of about 796,593 (318)
Abstract Racism, as a covert but pervasive presence in teacher education in England, remains a major structural issue and its effects on student teachers who are Black and Asian are real and troubling. Their personal stories reveal multiple challenges and present empirical evidence that can usefully be analysed to examine their experience of daily ...
Diane Warner
wiley +1 more source
Public health datasets increasingly use geographic identifiers such as an individual's address. Geocoding these addresses often provides new insights since it becomes possible to examine spatial patterns and associations. Address information is typically
P. Zandbergen
semanticscholar +1 more source
Verification of Confidentiality of Multi-threaded Programs [PDF]
An introduction of Slalom project: motivation, plans and some ...
Ngo, Minh Tri
core +1 more source
Motivated by the problem of simultaneously preserving confidentiality and usability of data outsourced to third-party clouds, we present two different database encryption schemes that largely hide data but reveal enough information to support a wide ...
Basin D.+8 more
core +1 more source
Abstract Early childhood has increasingly been acknowledged as a vital time for all children. Inclusive and quality education is part of the United Nations Sustainable Development Goals, with the further specification that all children have access to quality pre‐primary education.
Laura H. V. Wright+8 more
wiley +1 more source
Service Experience at Passport Seva Kendra
Richa Saxena, Sapna Popli, Abhishek
doaj +1 more source
Recent years have seen increasing popularity of storing and managing personal multimedia data using online services. Preserving confidentiality of online personal data while offering efficient functionalities thus becomes an important and pressing ...
Wenjun Lu, Avinash L. Varna, Min Wu
semanticscholar +1 more source
A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC [PDF]
Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing,
Kim, Jin-Woo+3 more
core +1 more source
Background Smartphones are becoming ubiquitous in health care settings. The increased adoption of mobile technology such as smartphones may be attributed to their use as a point-of-care information source and to perceived improvements in clinical ...
K. Tran+5 more
semanticscholar +1 more source
Pre-litigation Mediation as a Privacy Policy: Exploring the Interaction of Economics and Privacy [PDF]
Pre-litigation mediation is a perfect example of the economic trade-offs that exist in privacy policy. In pre-litigation mediation, costs and confidentiality work independently.
Costello, Thomas J (TJ)
core +1 more source