Results 21 to 30 of about 268,998 (233)
Background: Blockchain and distributed ledger technology is a disruptive force in healthcare. Methods: This article provides a globally relevant, interdisciplinary perspective intended to aid disparate group of actors, participants, and users that ...
Ron Ribitzky +8 more
doaj +1 more source
Development of Personal Name Authority Records and Identifiers
The library catalog uses authority control to gather topics and works relevant to the search query for improving the accuracy and completeness rate of retrieval results.
Wei-Min Fan
doaj +1 more source
A comparative cyber risk analysis between federated and self-sovereign identity management systems
Self-sovereign identity (SSI) is an emerging and promising concept that enables users to control their identity while enhancing security and privacy compared to other identity management (IDM) approaches.
Anhtuan Le +2 more
doaj +1 more source
Developing an IoT Identity Management System Using Blockchain
Identity (ID) management systems have evolved based on traditional data modelling and authentication protocols that are facing security, privacy, and trust challenges with the growth of Internet of Things (IoT).
Sitalakshmi Venkatraman, Sazia Parvin
doaj +1 more source
EIDM: A Ethereum-Based Cloud User Identity Management Protocol
In cloud system, user identity authentication is a key problem. If design defects persist in a cloud user identity authentication scheme, direct risks of sensitive data loss and severe information breach will be incurred.
Shangping Wang, Ru Pei, Yaling Zhang
doaj +1 more source
Authenticity has captivated scholars. But what is it? An emerging view considers it exaggerated favorability (self-enhancement), whereas traditional views regard it as self-accuracy and self-consistency.
Chengli Huang +7 more
doaj +1 more source
The growing influence of technology in the healthcare industry has led to the creation of innovative applications that improve convenience, accessibility, and diagnostic accuracy.
Sofia Sakka +6 more
doaj +1 more source
The proliferation of Internet of Things (IoT) devices in scientific research presents a critical challenge to data integrity and reproducibility. Ensuring the verifiable provenance of data from distributed, autonomous sensors is essential for academic ...
Andrej Gono +2 more
doaj +1 more source
Edge computing provides a unified platform for computing, networking, and storage resources, enabling data to be processed in a timely and efficient manner near the source.
Yongjun Ren +4 more
doaj +1 more source
Identity management ensures that users have appropriate access to resources, such as ICT services and data. Thereby, identity management does not only identify, authenticate, and authorize individuals, but also the hardware devices and software ...
Daniela Pöhn +2 more
doaj +1 more source

