Results 31 to 40 of about 259,266 (214)

Confidential Token-Based License Management [PDF]

open access: yes, 2021
In a global economy with many competitive participants, licensing and tracking of 3D printed parts is desirable if not mandatory for many use-cases. We investigate a blockchain-based approach, as blockchains provide many attractive features, like decentralized architecture and high security assurances.
arxiv   +1 more source

To Warn or Not to Warn? Genetic Information, Families, and Physician Liability

open access: yesMcGill Journal of Medicine, 2020
Genetic testing raises a number of legal issues. Physicians providing genetic testing may be faced with questions related to privacy, confidentiality, and the duty to warn.
Jennifer L Gold
doaj   +1 more source

Postępowanie kontrolne wobec osób posiadających poświadczenie bezpieczeństwa a ochrona informacji dotyczących jednostki

open access: yesOpolskie Studia Administracyjno-Prawne, 2019
This text presents considerations regarding control follow-up for persons who have a security clearance, the proceeding being aimed at verifying whether the said person still guarantees the confidentiality of secret information.
Krzysztof Chochowski
doaj   +1 more source

AI-Driven Confidential Computing across Edge-to-Cloud Continuum [PDF]

open access: yesarXiv, 2023
With the meteoric growth of technology, individuals and organizations are widely adopting cloud services to mitigate the burdens of maintenance. Despite its scalability and ease of use, many users who own sensitive data refrain from fully utilizing cloud services due to confidentiality concerns.
arxiv  

Gender Differences in the Principles of Mediation Relations

open access: yesВестник Кемеровского государственного университета, 2022
Principles of mediation in everyday communication provide a psychologically safe environment that promotes constructive resolution of conflicts and prevents their escalation.
A. Yu. Butkevich
doaj   +1 more source

IoTTPS: Ensemble RKSVM Model-Based Internet of Things Threat Protection System

open access: yesSensors, 2023
An Internet of Things (IoT) network is prone to many ways of threatening individuals. IoT sensors are lightweight, lack complicated security protocols, and face threats to privacy and confidentiality.
Urooj Akram   +8 more
doaj   +1 more source

A Conceptual Model to Explain Ethical Marketing in Consumers’ Willingness to Buy through the Internet according to the Trust Icon [PDF]

open access: yesکاوش‌های مدیریت بازرگانی, 2017
The present study aims at investigating the impact of ethical marketing in consumers’ willingness to buy through the Internet according to the trust icon.
Mohammad Safari   +2 more
doaj   +1 more source

Vulnerabilities and Limitations of MQTT Protocol Used between IoT Devices

open access: yesApplied Sciences, 2019
With the proliferation of smart devices capable of communicating over a network using different protocols, each year more and more successful attacks are recorded against these, underlining the necessity of developing and implementing mechanisms to ...
Dan Dinculeană, Xiaochun Cheng
doaj   +1 more source

Generalized Multiple Access Channels with Confidential Messages [PDF]

open access: yesarXiv, 2006
A discrete memoryless generalized multiple access channel (GMAC) with confidential messages is studied, where two users attempt to transmit common information to a destination and each user also has private (confidential) information intended for the destination.
arxiv  

PC4PM: A Tool for Privacy/Confidentiality Preservation in Process Mining [PDF]

open access: yesarXiv, 2021
Process mining enables business owners to discover and analyze their actual processes using event data that are widely available in information systems. Event data contain detailed information which is incredibly valuable for providing insights. However, such detailed data often include highly confidential and private information.
arxiv  

Home - About - Disclaimer - Privacy