Results 121 to 130 of about 124,809 (301)
Protecting applications using trusted execution environments
While cloud computing has been broadly adopted, companies that deal with sensitive data are still reluctant to do so due to privacy concerns or legal restrictions. Vulnerabilities in complex cloud infrastructures, resource sharing among tenants, and malicious insiders pose a real threat to the confidentiality and integrity of sensitive customer data ...
openaire +3 more sources
Abstract Qualitative research is increasingly engaged in anatomical sciences education research. However, many in the discipline are not formally trained in qualitative methodology and—like other research methods—qualitative methods are continually developed and enhanced.
Angelique N. Dueñas +2 more
wiley +1 more source
Towards Modular Trusted Execution Environments
Carsten Weinhold +3 more
openaire +1 more source
Abstract Many theories of human information behavior (HIB) assume that information objects are in text document format. This paper argues four important HIB theories are insufficient for describing users' search strategies for data because of assumptions about the attributes of objects that users seek.
Anthony J. Million +3 more
wiley +1 more source
Essential work, invisible workers: The role of digital curation in COVID‐19 Open Science
Abstract In this paper, we examine the role digital curation practices and practitioners played in facilitating open science (OS) initiatives amid the COVID‐19 pandemic. In Summer 2023, we conducted a content analysis of available information regarding 50 OS initiatives that emerged—or substantially shifted their focus—between 2020 and 2022 to address ...
Irene V. Pasquetto +2 more
wiley +1 more source
Research and implementation of data security for mobile terminal based on TEE
The three kinds of data security scheme for mobile terminal were analyzed and compared. The framework of data security for mobile terminal based on TEE was proposed, and the typical mobile payment scheme based on TEE was discussed.
Shuzhen CHEN, Minwei YANG, Yao HE
doaj +2 more sources
Abstract Timely detection of problematic research is essential for safeguarding scientific integrity. To explore whether social media commentary can serve as an early indicator of potentially problematic articles, this study analyzed 3815 tweets referencing 604 retracted articles and 3373 tweets referencing 668 comparable non‐retracted articles. Tweets
Er‐Te Zheng +3 more
wiley +1 more source

