Results 51 to 60 of about 1,065,019 (294)

Noise Infusion as a Confidentiality Protection Measure for Graph-Based Statistics [PDF]

open access: yes, 2015
We use the bipartite graph representation of longitudinally linked employer-employee data, and the associated projections onto the employer and employee nodes, respectively, to characterize the set of potential statistical summaries that the trusted ...
Abowd, John M., McKinney, Kevin L.
core   +3 more sources

Association Between Symptomatic Knee Osteoarthritis and Target Glycemic Control in Individuals With Type 2 Diabetes

open access: yesArthritis Care &Research, EarlyView.
Objective Knee osteoarthritis (OA) commonly affects individuals with type 2 diabetes (T2DM) and is associated with increased risk of diabetes‐related complications. To better understand potential mechanisms, we examined the association between symptomatic knee OA and glycemic control in individuals with T2DM.
Lauren K. King   +10 more
wiley   +1 more source

Clinical, histological, and serological predictors of renal function loss in lupus nephritis.

open access: yesArthritis Care &Research, Accepted Article.
Objective Kidney survival is the ultimate goal in lupus nephritis (LN) management, but long‐term predictors remain inadequately studied, requiring long‐term follow‐up. This study aimed to identify baseline and early longitudinal predictors of kidney survival in the Accelerating Medicines Partnership LN longitudinal cohort.
Shangzhu Zhang   +21 more
wiley   +1 more source

Physicians' attitudes towards eprescribing: a comparative web survey in Austria and Sweden

open access: yesJournal of Innovation in Health Informatics, 2009
Background The eHealth Action Plan required the member states of the European Union (EU) to provide online services such as eprescribing of pharmaceuticals by the end of 2008.
Thomas Steinschaden   +2 more
doaj   +1 more source

Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits

open access: yes, 2015
Motivated by the problem of simultaneously preserving confidentiality and usability of data outsourced to third-party clouds, we present two different database encryption schemes that largely hide data but reveal enough information to support a wide ...
Basin D.   +8 more
core   +1 more source

Real‐world trends in prenatal antirheumatic drug utilization in Ontario, Canada: A cross‐sectional time‐series analysis

open access: yesArthritis Care &Research, Accepted Article.
Objectives This study aimed to describe real‐world trends in preconception and prenatal use of antirheumatic drugs among pregnant individuals with rheumatic diseases in Ontario, Canada. Methods We conducted a time‐series analysis using repeated cross‐sectional data to examine annual patterns of disease‐modifying antirheumatic drug (DMARD) use among ...
Shenthuraan Tharmarajah   +6 more
wiley   +1 more source

The Future of the Journal of Privacy and Confidentiality

open access: yesThe Journal of Privacy and Confidentiality, 2018
The Journal of Privacy and Confidentiality (JPC) is the only journal to actively solicit contributions from the multi-faceted community of researchers and practitioners for whom privacy is a primary intellectual or operational concern, for dissemination ...
Cynthia Dwork
doaj   +1 more source

End‐to‐End Sensing Systems for Breast Cancer: From Wearables for Early Detection to Lab‐Based Diagnosis Chips

open access: yesAdvanced Materials Technologies, EarlyView.
This review explores advances in wearable and lab‐on‐chip technologies for breast cancer detection. Covering tactile, thermal, ultrasound, microwave, electrical impedance tomography, electrochemical, microelectromechanical, and optical systems, it highlights innovations in flexible electronics, nanomaterials, and machine learning.
Neshika Wijewardhane   +4 more
wiley   +1 more source

Best Practices for Establishment of a National Information Security Incident Management Capability (ISIMC)

open access: yesThe African Journal of Information and Communication, 2019
The South African Government’s National Cybersecurity Policy Framework (NCPF) of 2012 provides for the establishment of a national computer security incident response team (CSIRT) in the form of the National Cybersecurity Hub—more correctly referred to ...
Morné Pretorius, Hombakazi Ngejane
doaj   +1 more source

Confidentiality in Patent Dispute Resolution: Antitrust implications [PDF]

open access: yes, 2018
nformation is crucial to the functioning of the patent system, as it is for other markets. Nevertheless, patent licensing terms are often subject to confidentiality agreements.
Patterson, Mark R.
core   +1 more source

Home - About - Disclaimer - Privacy