Results 121 to 130 of about 3,580,379 (342)
Privacy self-regulation and the changing role of the state: from public law to social and technical mechanisms of governance [PDF]
This paper provides a structured overview of different self-governance mechanisms for privacy and data protection in the corporate world, with a special focus on Internet privacy.
Bendrath, Ralf
core
Objective Explore moderators and mediators influenced changes in pain and function in people with knee osteoarthritis (OA) receiving a new model of primary care service delivery (PARTNER), at 12 months (ACTRN12617001595303). Methods Secondary analyses of a cluster randomized controlled trial comparing PARTNER to usual general practitioner‐delivered ...
Abdolhay Farivar+12 more
wiley +1 more source
Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing
Cloud computing has provided services for users as a software paradigm. However, it is difficult to ensure privacy information security because of its opening, virtualization, and service outsourcing features.
Changbo Ke+4 more
doaj +1 more source
Measuring privacy leakage in term of Shannon entropy
Differential privacy is a privacy scheme in which a database is modified such that each users personal data are protected without affecting significantly the characteristics of the whole data.
Ricky Aditya, Boris Skoric
doaj +1 more source
Early evaluation of security functionality in software projects - some experience on using the common criteria in a quality management process [PDF]
This paper documents the experiences of assurance evaluation during the early stage of a large software development project. This project researches, contracts and integrates privacy-respecting software to business environments.
Fritsch, Lothar, Scherner, Tobias
core
This study explores the energy conversion in powder bed fusion of polymers using laser beam for polyamide 12 and polypropylene powders. It combines material and process data, using dimensionless parameters and numerical models, to enable the prediction of suitable printing parameters.
Christian Schlör+9 more
wiley +1 more source
PCM Tool: Privacy Requirements Specification in Agile Software Development
Recent research has pointed out that software developers face difficulties to specify requirements for privacy-sensitive systems. To help addressing this issue, this paper presents a tool, called PCM Tool, that supports the Privacy Criteria Method (PCM) -
M. Peixoto+5 more
semanticscholar +1 more source
Unlocking structural efficiency, this work integrates homogenization‐based topology optimization with functionally graded triply periodic minimal surface lattices to create highly efficient, customizable lattice structures. Key achievements include the development of a versatile MATLAB framework, optimization of mechanical properties for additive ...
Mirhan Ozdemir+4 more
wiley +1 more source
Privacy Engineering Meets Software Engineering. On the Challenges of Engineering Privacy ByDesign
Current day software development relies heavily on the use of service architectures and on agile iterative development methods to design, implement, and deploy systems. These practices result in systems made up of multiple services that introduce new data flows and evolving designs that escape the control of a single designer.
Kostova, Blagovesta+2 more
openaire +2 more sources
Laser powder‐bed fusion (L‐PBF) can produce dense WE43 magnesium alloy parts, but their mechanical properties are limited by a nonhomogeneous microstructure. This study investigates the effects of varying direct aging (T5) and artificial age‐hardening (T6) conditions on microstructure and strength. Optimized T6 treatment significantly improves strength
Prathviraj Upadhyaya+5 more
wiley +1 more source