Results 111 to 120 of about 643,939 (333)
Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing
Cloud computing has provided services for users as a software paradigm. However, it is difficult to ensure privacy information security because of its opening, virtualization, and service outsourcing features.
Changbo Ke+4 more
doaj +1 more source
Objective This study aimed to improve contraception and reproductive planning documentation within rheumatology providers’ notes at a single academic center. Methods Female patients aged 18 to 45 years with autoimmune inflammatory rheumatic diseases were identified, and chart review was performed for documentation of contraception and pregnancy ...
Benjamin Moon+6 more
wiley +1 more source
Federated Learning and Differential Privacy: Software tools analysis, the Sherpa.ai FL framework and methodological guidelines for preserving data privacy [PDF]
Nuria Rodríguez-Barroso+8 more
openalex +1 more source
Measuring privacy leakage in term of Shannon entropy
Differential privacy is a privacy scheme in which a database is modified such that each users personal data are protected without affecting significantly the characteristics of the whole data.
Ricky Aditya, Boris Skoric
doaj +1 more source
Objective Our objective was to explore moderators and mediators influenced changes in pain and function in people with knee osteoarthritis (OA) receiving a new model of primary care service delivery (Optimizing Primary Care Management of Knee Osteoarthritis [PARTNER]), at 12 months (ACTRN: 12617001595303).
Abdolhay Farivar+12 more
wiley +1 more source
Privacy self-regulation and the changing role of the state : from public law to social and technical mechanisms of governance [PDF]
This paper provides a structured overview of different self-governance mechanisms for privacy and data protection in the corporate world, with a special focus on Internet privacy.
Bendrath, Ralf
core
On Making Emerging Trusted Execution Environments Accessible to Developers
New types of Trusted Execution Environment (TEE) architectures like TrustLite and Intel Software Guard Extensions (SGX) are emerging. They bring new features that can lead to innovative security and privacy solutions.
Asokan, N.+2 more
core +1 more source
Privacy Engineering Meets Software Engineering. On the Challenges of Engineering Privacy ByDesign
Current day software development relies heavily on the use of service architectures and on agile iterative development methods to design, implement, and deploy systems. These practices result in systems made up of multiple services that introduce new data flows and evolving designs that escape the control of a single designer.
Kostova, Blagovesta+2 more
openaire +2 more sources
Objective Social determinants of health (SDoH) can impact outcomes but are not routinely screened for in US outpatient rheumatology clinics. This study determined the feasibility of routine point‐of‐care SDoH screening among patients with systemic lupus erythematosus (SLE) and associated barriers and facilitators at the physician, care team, and ...
S. Sam Lim+11 more
wiley +1 more source
Enhancing Utility and Privacy of Data for Software Testing [PDF]
A fundamental problem in test outsourcing is how to allow a database-centric application (DCA) owner to release a smaller subset of its private data along with the application. In addition, the DCA owner needs tangible guarantees that the entities in this data are protected at a certain level of privacy, while retaining testing efficacy.
openaire +2 more sources