Results 111 to 120 of about 8,750,178 (391)
A Distributed Context-Aware Trust Management Architecture [PDF]
The realization of a pervasive context-aware service platform imposes new challenges for the security and privacy aspects of the system in relation to traditional service platforms.
Neisse, R.+2 more
core +1 more source
The impact of Big Data analytics and data security practices on service supply chain performance
PurposeThe purpose of this paper is to investigate the effects of Big Data analytics, data security and service supply chain innovation capabilities on services supply chain performance.Design/methodology/approachThe paper draws on the relational view of
Yudi Fernando+2 more
semanticscholar +1 more source
Islatravir‐loaded dissolving microarray patches (MAPs) provide a minimally invasive, long‐acting solution for HIV‐1 prevention and treatment. In rats, sustained islatravir delivery lasts up to three months, while in minipigs, efficacious plasma levels are detected for six days.
Qonita Kurnia Anjani+11 more
wiley +1 more source
Retirement Benefits for Members of Congress [PDF]
Prior to 1984, neither federal civil service employees nor Members of Congress paid Social Security taxes, nor were they eligible for Social Security benefits.
Isaacs, Katelin P
core +1 more source
A Machine-Checked Proof of Security for AWS Key Management Service
We present a machine-checked proof of security for the domain management protocol of Amazon Web Services' KMS (Key Management Service) a critical security service used throughout AWS and by AWS customers.
J. Almeida+9 more
semanticscholar +1 more source
Engineering the Future of Restorative Clinical Peripheral Nerve Surgery
What if damaged nerves could regenerate more effectively? This review unveils cutting‐edge strategies to restore nerve function, from biomaterial scaffolds and bioactive molecules to living engineered tissues. By accelerating axonal regrowth, preserving Schwann cells, and enhancing connectivity, these approaches are reshaping nerve repair—offering new ...
Justin C. Burrell+5 more
wiley +1 more source
The NPFIT strategy for information security of care record service [PDF]
The National Programme for IT in England doesn’t have a one-document strategy for its information security of the Care Records Service, which is the national EHR system.
Mohammad, Y, Stergioulas, L
core
A wireless cortical surface implant employing graphene electrode arrays diagnoses and alleviates Parkinson's disease symptoms in freely moving animals. The device continuously monitors cortical activity and delivers targeted stimulation, restoring beta–gamma and delta oscillations.
Hongseong Shin+15 more
wiley +1 more source
Managing the outsourcing of information security processes: the 'cloud' solution [PDF]
Information security processes and systems are relevant for any organization and involve medium-to-high investment; however, the current economic downturn is causing a dramatic reduction in spending on Information Technology (IT).
Marabelli, Marco, Newell, Sue
core +1 more source
Integrating Security Services in Cloud Service Stores
Protecting systems, applications and data hosted on a Cloud environment against cyber-threats, and accounting for security incidents across the Cloud estate are prerequisites to Cloud adoption by business, and a fundamental element of both national and corporate cyber-security and Cloud strategies.
Gery Ducatel+7 more
openaire +3 more sources