Results 111 to 120 of about 8,750,178 (391)

A Distributed Context-Aware Trust Management Architecture [PDF]

open access: yes, 2006
The realization of a pervasive context-aware service platform imposes new challenges for the security and privacy aspects of the system in relation to traditional service platforms.
Neisse, R.   +2 more
core   +1 more source

The impact of Big Data analytics and data security practices on service supply chain performance

open access: yesBenchmarking : An International Journal, 2018
PurposeThe purpose of this paper is to investigate the effects of Big Data analytics, data security and service supply chain innovation capabilities on services supply chain performance.Design/methodology/approachThe paper draws on the relational view of
Yudi Fernando   +2 more
semanticscholar   +1 more source

Delivery of Islatravir via High Drug‐Load, Long‐acting Microarray Patches for the Prevention or Treatment of Human Immunodeficiency Virus

open access: yesAdvanced Healthcare Materials, Volume 14, Issue 7, March 14, 2025.
Islatravir‐loaded dissolving microarray patches (MAPs) provide a minimally invasive, long‐acting solution for HIV‐1 prevention and treatment. In rats, sustained islatravir delivery lasts up to three months, while in minipigs, efficacious plasma levels are detected for six days.
Qonita Kurnia Anjani   +11 more
wiley   +1 more source

Retirement Benefits for Members of Congress [PDF]

open access: yes, 2017
Prior to 1984, neither federal civil service employees nor Members of Congress paid Social Security taxes, nor were they eligible for Social Security benefits.
Isaacs, Katelin P
core   +1 more source

A Machine-Checked Proof of Security for AWS Key Management Service

open access: yesIACR Cryptology ePrint Archive, 2019
We present a machine-checked proof of security for the domain management protocol of Amazon Web Services' KMS (Key Management Service) a critical security service used throughout AWS and by AWS customers.
J. Almeida   +9 more
semanticscholar   +1 more source

Engineering the Future of Restorative Clinical Peripheral Nerve Surgery

open access: yesAdvanced Healthcare Materials, EarlyView.
What if damaged nerves could regenerate more effectively? This review unveils cutting‐edge strategies to restore nerve function, from biomaterial scaffolds and bioactive molecules to living engineered tissues. By accelerating axonal regrowth, preserving Schwann cells, and enhancing connectivity, these approaches are reshaping nerve repair—offering new ...
Justin C. Burrell   +5 more
wiley   +1 more source

The NPFIT strategy for information security of care record service [PDF]

open access: yes, 2011
The National Programme for IT in England doesn’t have a one-document strategy for its information security of the Care Records Service, which is the national EHR system.
Mohammad, Y, Stergioulas, L
core  

A Wireless Cortical Surface Implant for Diagnosing and Alleviating Parkinson's Disease Symptoms in Freely Moving Animals

open access: yesAdvanced Healthcare Materials, EarlyView.
A wireless cortical surface implant employing graphene electrode arrays diagnoses and alleviates Parkinson's disease symptoms in freely moving animals. The device continuously monitors cortical activity and delivers targeted stimulation, restoring beta–gamma and delta oscillations.
Hongseong Shin   +15 more
wiley   +1 more source

Managing the outsourcing of information security processes: the 'cloud' solution [PDF]

open access: yes, 2013
Information security processes and systems are relevant for any organization and involve medium-to-high investment; however, the current economic downturn is causing a dramatic reduction in spending on Information Technology (IT).
Marabelli, Marco, Newell, Sue
core   +1 more source

Integrating Security Services in Cloud Service Stores

open access: yes, 2015
Protecting systems, applications and data hosted on a Cloud environment against cyber-threats, and accounting for security incidents across the Cloud estate are prerequisites to Cloud adoption by business, and a fundamental element of both national and corporate cyber-security and Cloud strategies.
Gery Ducatel   +7 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy