Results 31 to 40 of about 259,266 (214)
Confidential Token-Based License Management [PDF]
In a global economy with many competitive participants, licensing and tracking of 3D printed parts is desirable if not mandatory for many use-cases. We investigate a blockchain-based approach, as blockchains provide many attractive features, like decentralized architecture and high security assurances.
arxiv +1 more source
To Warn or Not to Warn? Genetic Information, Families, and Physician Liability
Genetic testing raises a number of legal issues. Physicians providing genetic testing may be faced with questions related to privacy, confidentiality, and the duty to warn.
Jennifer L Gold
doaj +1 more source
This text presents considerations regarding control follow-up for persons who have a security clearance, the proceeding being aimed at verifying whether the said person still guarantees the confidentiality of secret information.
Krzysztof Chochowski
doaj +1 more source
AI-Driven Confidential Computing across Edge-to-Cloud Continuum [PDF]
With the meteoric growth of technology, individuals and organizations are widely adopting cloud services to mitigate the burdens of maintenance. Despite its scalability and ease of use, many users who own sensitive data refrain from fully utilizing cloud services due to confidentiality concerns.
arxiv
Gender Differences in the Principles of Mediation Relations
Principles of mediation in everyday communication provide a psychologically safe environment that promotes constructive resolution of conflicts and prevents their escalation.
A. Yu. Butkevich
doaj +1 more source
IoTTPS: Ensemble RKSVM Model-Based Internet of Things Threat Protection System
An Internet of Things (IoT) network is prone to many ways of threatening individuals. IoT sensors are lightweight, lack complicated security protocols, and face threats to privacy and confidentiality.
Urooj Akram+8 more
doaj +1 more source
A Conceptual Model to Explain Ethical Marketing in Consumers’ Willingness to Buy through the Internet according to the Trust Icon [PDF]
The present study aims at investigating the impact of ethical marketing in consumers’ willingness to buy through the Internet according to the trust icon.
Mohammad Safari+2 more
doaj +1 more source
Vulnerabilities and Limitations of MQTT Protocol Used between IoT Devices
With the proliferation of smart devices capable of communicating over a network using different protocols, each year more and more successful attacks are recorded against these, underlining the necessity of developing and implementing mechanisms to ...
Dan Dinculeană, Xiaochun Cheng
doaj +1 more source
Generalized Multiple Access Channels with Confidential Messages [PDF]
A discrete memoryless generalized multiple access channel (GMAC) with confidential messages is studied, where two users attempt to transmit common information to a destination and each user also has private (confidential) information intended for the destination.
arxiv
PC4PM: A Tool for Privacy/Confidentiality Preservation in Process Mining [PDF]
Process mining enables business owners to discover and analyze their actual processes using event data that are widely available in information systems. Event data contain detailed information which is incredibly valuable for providing insights. However, such detailed data often include highly confidential and private information.
arxiv