Results 71 to 80 of about 259,266 (214)

La Seguridad Informática

open access: yesCiencia UNEMI, 2011
The current trend of technological advances has provided people with a series of facilities, as much in the workplace as in their private life the home, social life and communications, etc.
Rocha-Haro, Cristhian Alexander
doaj  

Content-based data leakage detection using extended fingerprinting [PDF]

open access: yesarXiv, 2013
Protecting sensitive information from unauthorized disclosure is a major concern of every organization. As an organizations employees need to access such information in order to carry out their daily work, data leakage detection is both an essential and challenging task. Whether caused by malicious intent or an inadvertent mistake, data loss can result
arxiv  

Knowledge and Practice of Patients’ Data Sharing and Confidentiality Among Nurses in Jordan

open access: yesJournal of Multidisciplinary Healthcare, 2020
Sawsan Abuhammad,1 Karem H Alzoubi,2 Sayer I Al-Azzam,2 Reema A Karasneh3 1Department of Maternal and Child Health, Jordan University of Science and Technology, Irbid 22110, Jordan; 2Department of Clinical Pharmacy, Jordan University of Science and ...
Abuhammad S   +3 more
doaj  

Parametric and Probabilistic Model Checking of Confidentiality in Data Dispersal Algorithms (Extended Version) [PDF]

open access: yesarXiv, 2016
Recent developments in cloud storage architectures have originated new models of online storage as cooperative storage systems and interconnected clouds. Such distributed environments involve many organizations, thus ensuring confidentiality becomes crucial: only legitimate clients should recover the information they distribute among storage nodes ...
arxiv  

TEEMATE: Fast and Efficient Confidential Container using Shared Enclave [PDF]

open access: yesarXiv
Confidential container is becoming increasingly popular as it meets both needs for efficient resource management by cloud providers, and data protection by cloud users. Specifically, confidential containers integrate the container and the enclave, aiming to inherit the design-wise advantages of both (i.e., resource management and data protection ...
arxiv  

MIMO Gaussian Broadcast Channels with Common, Private and Confidential Messages [PDF]

open access: yesarXiv, 2016
The two-user multiple-input multiple-output (MIMO) Gaussian broadcast channel (BC) with common, private and confidential messages is considered. The transmitter sends a common message to both users, a confidential message to User 1 and a private (non-confidential) message to User 2.
arxiv  

Confidential [PDF]

open access: bronze, 1951
Edward T. Blake
openalex   +1 more source

The mediation procedure in Romania

open access: yesEIRP Proceedings, 2009
The mediation activity as an alternative way of solving conflicts occupies an important place in modernsociety. Currently, the mediation reached its maturity worldwide being adopted without reservations.The future of solving conflicts is undoubtedly ...
Alexandrina Zaharia, Monica Saleh-Ali
doaj  

Home - About - Disclaimer - Privacy