Results 311 to 320 of about 2,411,901 (357)

Table of life for beneficiaries of the Institute of Security and Social Services of State Workers (ISSSTE), Mexico 2021

open access: gold
Judith E. García-de-Alba-Verduzco   +3 more
openalex   +1 more source

Opioid prescribing to people on orthopaedic waiting lists during the COVID-19 pandemic in England: a study using OpenSAFELY-TPP

open access: yes
Higgins R   +14 more
europepmc   +1 more source
Some of the next articles are maybe not open access.

Related searches:

The State of Public Infrastructure-as-a-Service Cloud Security

ACM Computing Surveys, 2015
The public Infrastructure-as-a-Service (IaaS) cloud industry has reached a critical mass in the past few years, with many cloud service providers fielding competing services. Despite the competition, we find some of the security mechanisms offered by the services to be similar, indicating that the cloud industry has established a number of “best ...
David Lie   +4 more
openaire   +2 more sources

A Stateful Web Service with Scalable Security on HVEM DataGrid

Third IEEE International Conference on e-Science and Grid Computing (e-Science 2007), 2007
Web Service has its characteristic of statelessness. But, many applications on Grid need the stateful services. The advanced search on HVEM DataGrid is one example. The search service provides a multi-depth search and an associated search. The service should trace the search states and provide the access control as well as the service security in the ...
In Soon Cho   +4 more
openaire   +2 more sources

Private security services regulations in the United States today

International Journal of Comparative and Applied Criminal Justice, 2017
Security services regulations in the United States began formally in the second half of the twentieth century.
openaire   +2 more sources

Security-aware web service composition approaches

Proceedings of the 13th International Conference on Information Integration and Web-based Applications and Services, 2011
Nowadays service composition has been received lots of attentions considering the fact that no single service can satisfy users' desires in the majority of service oriented scenarios. In this respects, many enterprises decides to integrate their services and applications to fulfill required goals by service consumers.
Homa Movahednejad   +4 more
openaire   +2 more sources

Huawei Technologies’ Links to Chinese State Security Services

SSRN Electronic Journal, 2019
Using a unique dataset of CVs, this paper analyzes the relationship between key Huawei personnel and the Chinese state security services. Based upon an analysis of this dataset, I find there is strong evidence that Huawei personnel act at the direction of Chinese state intelligence, and that there exists a deep and lasting relationship between Huawei ...
openaire   +2 more sources

The Absent State: Failures of the Judicial System, Dependent and Corrupted Courts, Police and Security Services [PDF]

open access: possibleSSRN Electronic Journal, 2013
In this chapter we are addressing the numerous cases of government failures in countries with transit economies and weak democratic traditions when the state is called upon to provide “pure public goods” (defense, security, and justice). In other words, the subject matter of this chapter involves those institutions which create the very possibility of ...
Sergei Zhavoronkov   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy