Results 11 to 20 of about 359,604 (243)
Redistributed Records Collections Personality Matching using Encrypted Cryptosystem
Sensitive information is gradually distributed in the cloud in this project's cloud computing and processing services to reduce costs, which raises concerns regarding data privacy.
semanticscholar +1 more source
The medical science DMZ: a network design pattern for data-intensive medical science [PDF]
: Objective We describe a detailed solution for maintaining high-capacity, data-intensive network flows (eg, 10, 40, 100 Gbps+) in a scientific, medical context while still adhering to security and privacy laws and regulations. Materials and Methods
Balas, Edward +8 more
core +1 more source
Conclave: secure multi-party computation on big data (extended TR) [PDF]
Secure Multi-Party Computation (MPC) allows mutually distrusting parties to run joint computations without revealing private data. Current MPC algorithms scale poorly with data size, which makes MPC on "big data" prohibitively slow and inhibits its ...
Araki Toshinori +20 more
core +1 more source
Especially in the Big Data era, the usage of different classification methods is increasing day by day. The success of these classification methods depends on the effectiveness of learning methods.
Çatak, Ferhat Özgür
core +1 more source
Security oriented e-infrastructures supporting neurological research and clinical trials [PDF]
The neurological and wider clinical domains stand to gain greatly from the vision of the grid in providing seamless yet secure access to distributed, heterogeneous computational resources and data sets.
Ajayi, O. +3 more
core +3 more sources
Confidentiality-Preserving Publish/Subscribe: A Survey
Publish/subscribe (pub/sub) is an attractive communication paradigm for large-scale distributed applications running across multiple administrative domains.
Felber, Pascal +3 more
core +1 more source
An Effective Federated Object Detection Framework with Dynamic Differential Privacy
The proliferation of data across multiple domains necessitates the adoption of machine learning models that respect user privacy and data security, particularly in sensitive scenarios like surveillance and medical imaging.
Baoping Wang +3 more
doaj +1 more source
Grid infrastructures for secure access to and use of bioinformatics data: experiences from the BRIDGES project [PDF]
The BRIDGES project was funded by the UK Department of Trade and Industry (DTI) to address the needs of cardiovascular research scientists investigating the genetic causes of hypertension as part of the Wellcome Trust funded (£4.34M) cardiovascular ...
Bayer, M. +3 more
core +2 more sources
EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity
Electronic information is increasingly often shared among entities without complete mutual trust. To address related security and privacy issues, a few cryptographic techniques have emerged that support privacy-preserving information sharing and ...
Blundo, Carlo +2 more
core +1 more source
Pseudo Identities Based on Fingerprint Characteristics [PDF]
This paper presents the integrated project TURBINE which is funded under the EU 7th research framework programme. This research is a multi-disciplinary effort on privacy enhancing technology, combining innovative developments in cryptography and ...
Akkermans, Ton +19 more
core +3 more sources

