Results 21 to 30 of about 974,570 (322)

THE POSSIBLE CONFIDENTIALITY: THE PUBLIC ADMINISTRATION AS PARTY IN THE ALTERNATIVE DISPUTE RESOLUTION MECHANISM

open access: yesRevista Eletrônica de Direito Processual, 2017
This article debates the tension that exists between confidentiality, usual in ADRs, and the publicity principle, that rules the Public Administration in Brazil.
Carlos Alberto de Salles
doaj   +1 more source

Efficient Security Mechanisms for mHealth Applications Using Wireless Body Sensor Networks

open access: yesSensors, 2012
Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN) for health monitoring ...
Prasan Kumar Sahoo
doaj   +1 more source

Confidential Care for Adolescents in the U.S. Health Care System

open access: yesJournal of Patient-Centered Research and Reviews, 2019
In providing care for adolescents, maintaining confidentiality should be considered a human right and an evidence-based component of quality care. Unfortunately, complexities in the U.S.
Priya R. Pathak, Adriana Chou
doaj   +1 more source

Confidentiality and Disclosure in Accreditation [PDF]

open access: yes, 1994
The law and the internal policies of accrediting entities have protected the confidentiality of accreditation information, but regulators who rely on accreditation decisions for public purposes are demanding greater access to this information.
Jost, Timothy Stoltzfus
core   +2 more sources

Launching the Society for Privacy and Confidentiality Research to Own the Journal of Privacy and Confidentiality

open access: yesThe Journal of Privacy and Confidentiality
We describe the launching of the Society for Privacy and Confidentiality Research (SPCR). SPCR is the new owner of the Journal of Privacy and Confidentiality, with the goal of ensuring a sustainable future for the Journal, and continuing to publish the ...
John M. Abowd   +6 more
doaj   +1 more source

Privacy and Cryptocurrencies—A Systematic Literature Review

open access: yesIEEE Access, 2020
Our transaction history in the current centralized banking system has the ability to reveal a lot of private information for each spender, both to the banking system itself, but also to those entities that surround it (e.g., governments, industry etc ...
Lasse Herskind   +2 more
doaj   +1 more source

To Warn or Not to Warn? Genetic Information, Families, and Physician Liability

open access: yesMcGill Journal of Medicine, 2020
Genetic testing raises a number of legal issues. Physicians providing genetic testing may be faced with questions related to privacy, confidentiality, and the duty to warn.
Jennifer L Gold
doaj   +1 more source

Postępowanie kontrolne wobec osób posiadających poświadczenie bezpieczeństwa a ochrona informacji dotyczących jednostki

open access: yesOpolskie Studia Administracyjno-Prawne, 2019
This text presents considerations regarding control follow-up for persons who have a security clearance, the proceeding being aimed at verifying whether the said person still guarantees the confidentiality of secret information.
Krzysztof Chochowski
doaj   +1 more source

Nonmalleable Information Flow: Technical Report

open access: yes, 2017
Noninterference is a popular semantic security condition because it offers strong end-to-end guarantees, it is inherently compositional, and it can be enforced using a simple security type system.
Arden, Owen   +2 more
core   +1 more source

A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC [PDF]

open access: yes, 2020
Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing,
Kim, Jin-Woo   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy