Results 311 to 320 of about 23,296,124 (362)
Some of the next articles are maybe not open access.

A Privacy-Preserving and Untraceable Group Data Sharing Scheme in Cloud Computing

IEEE Transactions on Dependable and Secure Computing, 2021
With the development of cloud computing, the great amount of storage data requires safe and efficient data sharing. In multiparty storage data sharing, first, the confidentiality of shared data is ensured to achieve data privacy preservation. Second, the
Jian Shen   +3 more
semanticscholar   +1 more source

Data Sharing

NASN School Nurse, 2019
The data life cycle starts with defining what data are needed, to collecting, storing, protecting, using, sharing, retiring, and destroying data. A May 2019 NASN School Nurse article, “Data Governance and Stewardship,” addressed who is accountable for the data life cycle within a school system.
Martha Dewey Bergren, Kathleen Johnson
openaire   +2 more sources

LVBS: Lightweight Vehicular Blockchain for Secure Data Sharing in Disaster Rescue

IEEE Transactions on Dependable and Secure Computing, 2020
In disaster areas, a large amount of data (e.g., rescue commands, road damage, and rescue experience) should be delivered among ground rescuing vehicles for safe driving and efficient rescue. When communication infrastructures are destroyed by disasters,
Zhou Su   +3 more
semanticscholar   +1 more source

Data-driven secure, resilient and sustainable supply chains: gaps, opportunities, and a new generalised data sharing and data monetisation framework

International Journal of Production Research, 2021
The increasing exposure of global supply chains to severe disruptions such as the ones related to the COVID-19 pandemic, clearly demonstrated the need for novel data-driven risk management paradigms that monetise data from internal and external ...
Dimitrios Bechtsis   +3 more
semanticscholar   +1 more source

Blockchain for Secure and Efficient Data Sharing in Vehicular Edge Computing and Networks

IEEE Internet of Things Journal, 2019
The drastically increasing volume and the growing trend on the types of data have brought in the possibility of realizing advanced applications such as enhanced driving safety, and have enriched existing vehicular services through data sharing among ...
Jiawen Kang   +6 more
semanticscholar   +1 more source

Secure Health Data Sharing for Medical Cyber-Physical Systems for the Healthcare 4.0

IEEE journal of biomedical and health informatics, 2020
The recent spades of cyber attacks have compromised end-users’ data security and privacy in Medical Cyber-Physical Systems (MCPS) in the era of Health 4.0.
Han Qiu   +3 more
semanticscholar   +1 more source

Federated-Learning-Empowered Collaborative Data Sharing for Vehicular Edge Networks

IEEE Network, 2021
The Internet of Vehicles connects all vehicles and shares dynamic vehicular data via wireless communications to effectively control vehicles and improve traffic efficiency.
Xiuhua Li   +5 more
semanticscholar   +1 more source

Data

Epidemiology, 2009
This question (to share or to not share data) was the topic of the "The Changing Face Hof Epidemiology" symposium at the 2008 Annual Meeting of the Society for Epidemiological Research. The 2 presenters, Daniel Levy and Graham Colditz, offered their perspectives based on years of experience as principal investigators for the Framing ham Study and the ...
openaire   +3 more sources

A Secure and Verifiable Data Sharing Scheme Based on Blockchain in Vehicular Social Networks

IEEE Transactions on Vehicular Technology, 2020
The vehicular social networks (VSNs) supports diverse kinds of services such as traffic management, road safety, and sharing data (videos, audios, roads photos, air quality, and so on).
K. Fan   +6 more
semanticscholar   +1 more source

Secure Keyword Search and Data Sharing Mechanism for Cloud Computing

IEEE Transactions on Dependable and Secure Computing, 2020
The emergence of cloud infrastructure has significantly reduced the costs of hardware and software resources in computing infrastructure. To ensure security, the data is usually encrypted before it's outsourced to the cloud.
Chunpeng Ge   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy