Results 101 to 110 of about 115,293 (296)
ABSTRACT International collaborations between high‐income countries (HICs) and low‐ and middle‐income countries (LMICs) have become increasingly essential in advancing global health, particularly within psychiatric research. These partnerships not only accelerate scientific discovery and enhance public health, but they also bring to light significant ...
Brenda Cabrera‐Mendoza+27 more
wiley +1 more source
Clean Cut is a multimodal, adaptive, checklist‐based infection prevention programme designed to improve compliance with six critical perioperative infection prevention practices. After introducing the programme at five hospitals in Ethiopia, compliance with critical infection prevention standards significantly improved and the relative risk of ...
J. A. Forrester+16 more
wiley +1 more source
Virtualization security:the good,the bad and the ugly
The virtualization security has increasingly drawn widespread attention with the spread of cloud computing in recent years.Thanks to another level of indirection,virtualization can provide stronger isolation mechanisms,as well as bottom-up security ...
Yu-tao LIU,Hai-bo CHEN
doaj +3 more sources
Trust Evaluation for Embedded Systems Security research challenges identified from an incident network scenario [PDF]
This paper is about trust establishment and trust evaluations techniques. A short background about trust, trusted computing and security in embedded systems is given.
Gehrmann, Christian, Löfvenberg , Jacob
core +3 more sources
Abstract The Next Generation EU (NGEU) economic recovery package has set the conditions for unprecedented investment in policy areas considered of strategic importance by each Member State. This article focusses on the Italian case, characterised by long‐lasting weaknesses in active labour market policies and public employment services (PES) to analyse
Stefano Sacchi, Gianluca Scarano
wiley +1 more source
Dual system trusted terminal computing architecture based on TPCM RoT
Due to the limitations of the times, the von Neumann computer system failed to consider the modern security environment, and the computing structure lacked independent protective components based on hardware trusted roots. A trusted terminal architecture
HUANG Jianhui+3 more
doaj
Protecting applications using trusted execution environments
While cloud computing has been broadly adopted, companies that deal with sensitive data are still reluctant to do so due to privacy concerns or legal restrictions. Vulnerabilities in complex cloud infrastructures, resource sharing among tenants, and malicious insiders pose a real threat to the confidentiality and integrity of sensitive customer data ...
openaire +4 more sources
Philanthropy and Indigenous Initiatives: Insights From Australian Donors
ABSTRACT This paper draws on a survey and interview data, collected from a group of 180 donors who made monetary gifts to an Australian higher education institution, to better understand what drives individuals and organisations to donate to Indigenous initiatives.
Celina McEwen+4 more
wiley +1 more source
A Method for Comparative Analysis of Trusted Execution Environments
The problem of secure remote computation has become a serious concern of hardware manufacturers and software developers alike. Trusted Execution Environments (TEEs) are a solution to the problem of secure remote computation in applications ranging from "chip and pin" financial transactions to intellectual property protection in modern gaming systems ...
openaire +4 more sources
Trauma‐Informed Practice in Welfare‐to‐Work and Employment Services: A Scoping Review
ABSTRACT There is increasing recognition within welfare services, including employment services, that many participants may have histories of trauma. Research suggests that experiences of trauma not only impact individuals' psychosocial health but also vocational elements such as job performance, employability, career progression, and financial ...
Emily Corbett+3 more
wiley +1 more source