Results 71 to 80 of about 259,266 (214)
The current trend of technological advances has provided people with a series of facilities, as much in the workplace as in their private life the home, social life and communications, etc.
Rocha-Haro, Cristhian Alexander
doaj
Content-based data leakage detection using extended fingerprinting [PDF]
Protecting sensitive information from unauthorized disclosure is a major concern of every organization. As an organizations employees need to access such information in order to carry out their daily work, data leakage detection is both an essential and challenging task. Whether caused by malicious intent or an inadvertent mistake, data loss can result
arxiv
Knowledge and Practice of Patients’ Data Sharing and Confidentiality Among Nurses in Jordan
Sawsan Abuhammad,1 Karem H Alzoubi,2 Sayer I Al-Azzam,2 Reema A Karasneh3 1Department of Maternal and Child Health, Jordan University of Science and Technology, Irbid 22110, Jordan; 2Department of Clinical Pharmacy, Jordan University of Science and ...
Abuhammad S+3 more
doaj
Parametric and Probabilistic Model Checking of Confidentiality in Data Dispersal Algorithms (Extended Version) [PDF]
Recent developments in cloud storage architectures have originated new models of online storage as cooperative storage systems and interconnected clouds. Such distributed environments involve many organizations, thus ensuring confidentiality becomes crucial: only legitimate clients should recover the information they distribute among storage nodes ...
arxiv
TEEMATE: Fast and Efficient Confidential Container using Shared Enclave [PDF]
Confidential container is becoming increasingly popular as it meets both needs for efficient resource management by cloud providers, and data protection by cloud users. Specifically, confidential containers integrate the container and the enclave, aiming to inherit the design-wise advantages of both (i.e., resource management and data protection ...
arxiv
MIMO Gaussian Broadcast Channels with Common, Private and Confidential Messages [PDF]
The two-user multiple-input multiple-output (MIMO) Gaussian broadcast channel (BC) with common, private and confidential messages is considered. The transmitter sends a common message to both users, a confidential message to User 1 and a private (non-confidential) message to User 2.
arxiv
The mediation procedure in Romania
The mediation activity as an alternative way of solving conflicts occupies an important place in modernsociety. Currently, the mediation reached its maturity worldwide being adopted without reservations.The future of solving conflicts is undoubtedly ...
Alexandrina Zaharia, Monica Saleh-Ali
doaj