Results 51 to 60 of about 1,180 (196)
Security Outsourcing Algorithms by Unimodular Matrix Encryption Method
The large-scale MMC (matrix multiplication computation), MIC (matrix inversion computation) and MDC (matrix determinant computation) algorithm in secure outsourcing computing is widely researched and applied, while its existing problems are also ...
ZHANG Shengxia, TIAN Chengliang
doaj +1 more source
Advanced IT Outsourcing By Using Cloud Computing Model
In this paper we will discuss Outsourcing is the commissioning of a third party (or a number of third parties) to manage a client organization.s IT assets, people and/ or activities to required results. Business process outsourcing (BPO) is a more comprehensive definition of the current situation within the outsourcing domain.
Amanbir kaur Chahal, Gurpreet Singh
openaire +2 more sources
From Open Banking Regulation to Platform Orchestration: The Evolution of Digital Platform Governance
ABSTRACT This study contributes to information systems (IS) scholarship by extending platform governance theory to regulatory contexts, explaining how regulatory forces co‐evolve with technological architectures to shape openness and control. This research examines the evolution of platform governance in the context of open banking, where regulatory ...
Priyadharshini Muthukannan +3 more
wiley +1 more source
Secure Outsourcing Algorithm of Polynomials in Cloud Computing
In the era of information explosion, people have to deal with huge amount of data. It is a great computation burden for the resource- constrained clients. Cloud computing connects large amounts of network resources, and forms a vast pool of resources. It provides much con- venience for people.
Xianlin Zhou +5 more
openaire +1 more source
Catch Me If You Can: The Dynamic Nature of Bias in Machine Learning Applications
ABSTRACT Bias in machine learning (ML) applications represents systematic differences between expected and actual values of the predicted outputs, such that certain individuals or groups are systematically and disproportionately (dis)advantaged. This paper investigates the dynamic nature of bias in ML applications.
Monideepa Tarafdar, Irina Rets, Yang Hu
wiley +1 more source
To reduce a user's decryption cost and protect the private information from being leaked, Green et al. proposed an approach outsourcing the decryption of the attribute based encryption (ABE) scheme to the cloud server.
Yongjian Liao +2 more
doaj +1 more source
Co‐Designing and Evaluating a Digital Competencies Toolkit for Nursing Students
ABSTRACT Aim To offer a student‐focused critical evaluation of the content and use of a digital competencies discipline‐specific toolkit that was co‐designed with students, offering ideas for training and development across several digital skills areas, such as digital creation, research, communication, innovation, and wellbeing.
Konstantina Martzoukou +3 more
wiley +1 more source
Abstract Cultural entrepreneurship research emphasizes entrepreneurs’ use of cultural resources to influence audience evaluations through resonance. However, the process by which such cultural resonance is achieved remains underexplored, particularly as an intermediary outcome.
Xiumei Li +3 more
wiley +1 more source
Cloud Computing Security: A Survey
Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Clouds bring out a wide range of benefits including configurable computing
Issa M. Khalil +2 more
doaj +1 more source
ABSTRACT Academic Summary By integrating artificial intelligence (AI) platforms into their processes, firms aim to enhance their strategic capabilities and gain a competitive advantage. This study investigates the impact of such platforms on value generation within solution‐based strategies, proposing two connected mechanisms.
Yancy Vaillant +2 more
wiley +1 more source

