Results 71 to 80 of about 5,525,844 (353)
Arguing security: validating security requirements using structured argumentation [PDF]
This paper proposes using both formal and structured informal arguments to show that an eventual realized system can satisfy its security requirements. These arguments, called 'satisfaction arguments', consist of two parts: a formal argument based upon ...
Haley, Charles B. +3 more
core +2 more sources
Reconfigurable Security: Edge Computing-based Framework for IoT
In various scenarios, achieving security between IoT devices is challenging since the devices may have different dedicated communication standards, resource constraints as well as various applications.
Chen, Jyh-Cheng +3 more
core +1 more source
The Fascist Moment: Security, Exclusion, Extermination [PDF]
Security is cultivated and mobilized by enacting exclusionary practices, and exclusion is cultivated and realized on security grounds. This article explores the political dangers that lie in this connection, dangers which open the door to a fascist ...
Neocleous, M
core +3 more sources
Objective The aim of this systematic review was to synthesise the economic impact of rheumatoid arthritis (RA) on households, health systems, and society in low‐ and middle‐income countries (LMICs). Methods Electronic databases such as PubMed, Web of Science, and CINAHL were searched using keywords related to RA and cost of illness.
Tadesse Gebrye +6 more
wiley +1 more source
Background Sepsis remains a significant clinical and public health concern, necessitating timely identification and targeted management for improved patient outcomes.
Ranya Mulchandani +11 more
doaj +1 more source
Validation of a multiplex amplification system of 19 autosomal STRs and 27 Y-STRs
This article describes a newly devised autosomal short tandem repeat (STR) multiplex polymerase chain reaction (PCR) system for 19 autosomal loci (D12S391, D13S317, D16S539, D18S51, D19S433, D2S1338, D21S11, D3S1358, D5S818, D6S1043, D7S820, D8S1179 ...
Feng Liu +4 more
doaj +1 more source
Complexity and Unwinding for Intransitive Noninterference [PDF]
The paper considers several definitions of information flow security for intransitive policies from the point of view of the complexity of verifying whether a finite-state system is secure. The results are as follows.
Eggert, Sebastian +3 more
core
Objective This study aimed to determine if program format (in‐person, virtual, hybrid) results in differences in three‐month outcomes of pain, function, quality of life, self‐efficacy and chair stands in a hip/knee osteoarthritis management program. Methods A secondary analysis of the GLA:DTM Canada database was completed.
Jill Van Damme +7 more
wiley +1 more source
Peace & Security – Paix et Sécurité Internationales
doaj +1 more source
Family Security Insurance: A New Foundation for Economic Security [PDF]
A report released by Georgetown Law\u27s Workplace Flexibility 2010 and the Berkeley Center on Health, Economic & Family Security (Berkeley CHEFS) outlining a blueprint for establishing and financing a new national insurance program to provide wage ...
Berkeley Center on Health, Economic & Family Security, UC Berkeley School of Law +1 more
core +1 more source

