Results 31 to 40 of about 451,533 (228)

Benefits of Location-Based Access Control:A Literature Study [PDF]

open access: yes, 2010
Location-based access control (LBAC) has been suggested as a means to improve IT security. By 'grounding' users and systems to a particular location, \ud attackers supposedly have more difficulty in compromising a system.
Cleeff, André van   +2 more
core   +2 more sources

Secure and Fault-Tolerant IoT-Based Healthcare System for Reliable Decision-Making

open access: yesShifra
Internet of Things (IoT) integration has revolutionized healthcare, offering personalized medical care through remote patient monitoring and telemedicine. However, challenges remain in critical healthcare scenarios, such as data security vulnerabilities
Aparna Achanta   +3 more
doaj   +1 more source

Are Personal Health Records Safe? A Review of Free Web-Accessible Personal Health Record Privacy Policies

open access: yesJournal of Medical Internet Research, 2012
BackgroundSeveral obstacles prevent the adoption and use of personal health record (PHR) systems, including users’ concerns regarding the privacy and security of their personal health information.
Carrión Señor, Inmaculada   +2 more
doaj   +1 more source

Reliability

open access: yes, 2006
This special volume of Statistical Sciences presents some innovative, if not provocative, ideas in the area of reliability, or perhaps more appropriately named, integrated system assessment.
Anderson-Cook, Christine   +2 more
core   +1 more source

Soft Constraint Programming to Analysing Security Protocols

open access: yes, 2003
Security protocols stipulate how the remote principals of a computer network should interact in order to obtain specific security goals. The crucial goals of confidentiality and authentication may be achieved in various forms, each of different strength.
Bella, Giampaolo, Bistarelli, Stefano
core   +2 more sources

Nonmalleable Information Flow: Technical Report

open access: yes, 2017
Noninterference is a popular semantic security condition because it offers strong end-to-end guarantees, it is inherently compositional, and it can be enforced using a simple security type system.
Arden, Owen   +2 more
core   +1 more source

Modeling Adversaries in a Logic for Security Protocol Analysis [PDF]

open access: yes, 2012
Logics for security protocol analysis require the formalization of an adversary model that specifies the capabilities of adversaries. A common model is the Dolev-Yao model, which considers only adversaries that can compose and replay messages, and ...
Halpern, Joseph Y., Pucella, Riccardo
core   +1 more source

Deep Space Network information system architecture study [PDF]

open access: yes, 1992
The purpose of this article is to describe an architecture for the Deep Space Network (DSN) information system in the years 2000-2010 and to provide guidelines for its evolution during the 1990s.
Atkinson, D. J.   +9 more
core   +1 more source

Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology

open access: yesMolecular Oncology, EarlyView.
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts   +8 more
wiley   +1 more source

Representative Names of Computing Degree Programs Worldwide [PDF]

open access: yes, 2018
Through the auspices of ACM and with support from the IEEE Computer Society, a task group charged to prepare the IT2017 report conducted an online international survey of computing faculty members about their undergraduate degree programs in computing ...
Clear, Alison   +5 more
core   +2 more sources

Home - About - Disclaimer - Privacy