Results 71 to 80 of about 3,073,944 (343)
Secure Data Processing in the Cloud [PDF]
Data protection is a key issue in the adoption of cloud services. The project “RestAssured – Secure Data Processing in the Cloud,” financed by the European Union’s Horizon 2020 research and innovation programme, addresses the challenge of data protection in the cloud with a combination of innovative security solutions, data lifecycle management ...
Mann, Zoltán Ádám +7 more
openaire +3 more sources
Security policy refinement using data integration: a position paper.
In spite of the wide adoption of policy-based approaches for security management, and many existing treatments of policy verification and analysis, relatively little attention has been paid to policy refinement: the problem of deriving lower-level ...
Craven, R +4 more
core +1 more source
ABSTRACT Background Managing long COVID in people with multiple sclerosis and related disorders (pwMSRD) is complex due to overlapping symptoms. To address evidence gaps, we evaluated long COVID susceptibility in pwMSRD versus controls and its associations with multi‐domain function and disability.
Chen Hu +15 more
wiley +1 more source
The multi-access edge computing (MEC) has higher computing power and lower latency than user equipment and remote cloud computing, enabling the continuing emergence of new types of services and mobile application.
Haowei Lin +3 more
doaj +1 more source
Distributed storage for data security [PDF]
5 pages, submitted to ITW ...
Annina Bracher, Amos Lapidoth, Eran Hof
openaire +3 more sources
Objective Social determinants of health (SDoH) can impact outcomes but are not routinely screened for in US outpatient rheumatology clinics. This study determined the feasibility of routine point‐of‐care SDoH screening among patients with systemic lupus erythematosus (SLE) and associated barriers and facilitators at the physician, care team, and ...
S. Sam Lim +11 more
wiley +1 more source
Group recommendation based on hybrid trust metric
Group recommendation is a special service type which has the ability to satisfy a group’s common interest and find the preferred items for group users. Deep mining of trust relationship between group members can contribute to the improvement of accuracy ...
Haiyan Wang, Dongdong Chen, Jiawei Zhang
doaj +1 more source
The rapid development of location-based social networks (LBSNs) produces the increasing number of check-in records and corresponding heterogeneous information which bring big challenges of points-of-interest (POIs) recommendation in our daily lives.
Bin Xia +4 more
doaj +1 more source
The Data Breach Dilemma: Proactive Solutions for Protecting Consumers’ Personal Information [PDF]
Data breaches are an increasingly common part of consumers’ lives. No institution is immune to the possibility of an attack. Each breach inevitably risks the release of consumers’ personally identifiable information and the strong possibility of identity
Marcus, Daniel J.
core +1 more source
Objectives Australian evidence on lived and care experiences of chronic musculoskeletal shoulder pain (CMSP), irrespective of disorder classification or disease, is limited. However, such evidence is important for person‐centred care and informing local service pathways and care guidelines or standards.
Sonia Ranelli +8 more
wiley +1 more source

