Results 51 to 60 of about 259,266 (214)

Gaussian MIMO Broadcast Channels with Common and Confidential Messages [PDF]

open access: yesarXiv, 2010
We study the two-user Gaussian multiple-input multiple-output (MIMO) broadcast channel with common and confidential messages. In this channel, the transmitter sends a common message to both users, and a confidential message to each user which is kept perfectly secret from the other user. We obtain the entire capacity region of this channel.
arxiv  

CoVE: Towards Confidential Computing on RISC-V Platforms [PDF]

open access: yesarXiv, 2023
Multi-tenant computing platforms are typically comprised of several software and hardware components including platform firmware, host operating system kernel, virtualization monitor, and the actual tenant payloads that run on them (typically in a virtual machine, container, or application).
arxiv  

Quantitative Metrics and Risk Assessment: The Three Tenets Model of Cybersecurity [PDF]

open access: yesTechnology Innovation Management Review, 2013
Progress in operational cybersecurity has been difficult to demonstrate. In spite of the considerable research and development investments made for more than 30 years, many government, industrial, financial, and consumer information systems continue to ...
Jeff Hughes, George Cybenko
doaj  

Half of Vermont Academic and Public Libraries Lack Written Confidentiality Policies Despite Directors’ Support for Principles of Patron Confidentiality

open access: yesEvidence Based Library and Information Practice, 2008
A Review of: Magi, Trina J., “The Gap between Theory and Practice: A Study of the Prevalence and Strength of Patron Confidentiality Policies in Public and Academic Libraries.” Library & Information Science Research 29 (2007): 455-70 ...
Stephanie Walker
doaj   +1 more source

The Future of the Journal of Privacy and Confidentiality

open access: yesThe Journal of Privacy and Confidentiality, 2018
The Journal of Privacy and Confidentiality (JPC) is the only journal to actively solicit contributions from the multi-faceted community of researchers and practitioners for whom privacy is a primary intellectual or operational concern, for dissemination ...
Cynthia Dwork
doaj   +1 more source

Physicians’ Attitudes toward Adolescent Confidentiality Services: Scale Development and Validation

open access: yesSlovenian Journal of Public Health, 2020
Confidentiality is one of the oldest ethical principles in healthcare. However, confidentiality in adolescent healthcare is not a universally-accepted doctrine among scholars.
Jeremić Stojković Vida   +2 more
doaj   +1 more source

Relay Broadcast Channel with Confidential Messages [PDF]

open access: yesarXiv, 2013
We investigate the effects of an additional relay node on the secrecy of broadcast channels by considering the model of relay broadcast channels with confidential messages. We show that this additional relay node can increase the achievable secrecy rate region of the broadcast channels with confidential messages.
arxiv  

Central Questions of Anonymization: A Case Study of Secondary Use of Qualitative Data

open access: yesForum: Qualitative Social Research, 2005
Anonymization—the removal of identifying information from data—is one way of preparing data for secondary use. This process has not received much attention from scholars, but close examination shows that it is full of methodological, ethical and ...
Denise Thomson   +4 more
doaj  

New Frontiers and Old Challenges: How to Manage Incidental Findings When Forensic Diagnosis Goes Beyond

open access: yesDiagnostics, 2020
Incidental findings (IFs) are well known in medical research and clinical practice as unexpected findings having potential health or reproductive importance for an individual.
Luciana Caenazzo   +2 more
doaj   +1 more source

Best Practices for Establishment of a National Information Security Incident Management Capability (ISIMC)

open access: yesThe African Journal of Information and Communication, 2019
The South African Government’s National Cybersecurity Policy Framework (NCPF) of 2012 provides for the establishment of a national computer security incident response team (CSIRT) in the form of the National Cybersecurity Hub—more correctly referred to ...
Morné Pretorius, Hombakazi Ngejane
doaj   +1 more source

Home - About - Disclaimer - Privacy