Results 111 to 120 of about 643,939 (333)

Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing

open access: yesJournal of Applied Mathematics, 2014
Cloud computing has provided services for users as a software paradigm. However, it is difficult to ensure privacy information security because of its opening, virtualization, and service outsourcing features.
Changbo Ke   +4 more
doaj   +1 more source

Improving Documentation Rates of Contraception and Reproductive Planning in Patients With Rheumatic Disease

open access: yesArthritis Care &Research, EarlyView.
Objective This study aimed to improve contraception and reproductive planning documentation within rheumatology providers’ notes at a single academic center. Methods Female patients aged 18 to 45 years with autoimmune inflammatory rheumatic diseases were identified, and chart review was performed for documentation of contraception and pregnancy ...
Benjamin Moon   +6 more
wiley   +1 more source

Federated Learning and Differential Privacy: Software tools analysis, the Sherpa.ai FL framework and methodological guidelines for preserving data privacy [PDF]

open access: green, 2020
Nuria Rodríguez-Barroso   +8 more
openalex   +1 more source

Measuring privacy leakage in term of Shannon entropy

open access: yesInternational Journal of Applied Sciences and Smart Technologies, 2019
Differential privacy is a privacy scheme in which a database is modified such that each users personal data are protected without affecting significantly the characteristics of the whole data.
Ricky Aditya, Boris Skoric
doaj   +1 more source

Moderators and Mediators of Pain and Function Outcomes in a New Service Delivery Model for Management of Knee Osteoarthritis in Primary Care: Secondary Exploratory Analysis of a Randomized Controlled Trial

open access: yesArthritis Care &Research, EarlyView.
Objective Our objective was to explore moderators and mediators influenced changes in pain and function in people with knee osteoarthritis (OA) receiving a new model of primary care service delivery (Optimizing Primary Care Management of Knee Osteoarthritis [PARTNER]), at 12 months (ACTRN: 12617001595303).
Abdolhay Farivar   +12 more
wiley   +1 more source

Privacy self-regulation and the changing role of the state : from public law to social and technical mechanisms of governance [PDF]

open access: yes, 2007
This paper provides a structured overview of different self-governance mechanisms for privacy and data protection in the corporate world, with a special focus on Internet privacy.
Bendrath, Ralf
core  

On Making Emerging Trusted Execution Environments Accessible to Developers

open access: yes, 2015
New types of Trusted Execution Environment (TEE) architectures like TrustLite and Intel Software Guard Extensions (SGX) are emerging. They bring new features that can lead to innovative security and privacy solutions.
Asokan, N.   +2 more
core   +1 more source

Privacy Engineering Meets Software Engineering. On the Challenges of Engineering Privacy ByDesign

open access: yes, 2020
Current day software development relies heavily on the use of service architectures and on agile iterative development methods to design, implement, and deploy systems. These practices result in systems made up of multiple services that introduce new data flows and evolving designs that escape the control of a single designer.
Kostova, Blagovesta   +2 more
openaire   +2 more sources

Screening for Social Determinants of Health in Patients With Systemic Lupus Erythematosus: A Point‐of‐Care Feasibility Study

open access: yesArthritis Care &Research, EarlyView.
Objective Social determinants of health (SDoH) can impact outcomes but are not routinely screened for in US outpatient rheumatology clinics. This study determined the feasibility of routine point‐of‐care SDoH screening among patients with systemic lupus erythematosus (SLE) and associated barriers and facilitators at the physician, care team, and ...
S. Sam Lim   +11 more
wiley   +1 more source

Enhancing Utility and Privacy of Data for Software Testing [PDF]

open access: yes2014 IEEE Seventh International Conference on Software Testing, Verification and Validation Workshops, 2014
A fundamental problem in test outsourcing is how to allow a database-centric application (DCA) owner to release a smaller subset of its private data along with the application. In addition, the DCA owner needs tangible guarantees that the entities in this data are protected at a certain level of privacy, while retaining testing efficacy.
openaire   +2 more sources

Home - About - Disclaimer - Privacy