Results 11 to 20 of about 2,322,677 (316)

Next-Generation Capabilities in Trusted Research Environments: Interview Study

open access: yesJournal of Medical Internet Research, 2021
Background A Trusted Research Environment (TRE; also known as a Safe Haven) is an environment supported by trained staff and agreed processes (principles and standards), providing access to data for research while protecting patient confidentiality ...
Sanaz Kavianpour   +4 more
semanticscholar   +5 more sources

A UK Specification for Trusted Research Environments

open access: yesInternational Journal of Population Data Science
ObjectivesThe need for Trusted Research Environments (TREs) is clear. Several influential reports have highlighted that personal or sensitive data which have been collected for operational, commercial or governmental reasons need to be managed securely ...
Hari Sood   +15 more
semanticscholar   +4 more sources

Trans-sectoral patient pathways in urgent and emergency care (TRANSPARENT study): protocol for a prospective, mixed-methods study in Germany [PDF]

open access: yesBMJ Open
Introduction Urgent and emergency care in Germany is delivered across multiple, loosely connected sectors. In the absence of coherent, time-resolved data on patient movements between emergency medical services (EMS), out-of-hours ambulatory care ...
  +37 more
doaj   +2 more sources

Survey of research on confidential computing

open access: yesIET Communications
As the global data strategy deepens and data elements accelerate integrating and flowing more rapidly, the demand for data security and privacy protection has become increasingly prominent.
Dengguo Feng   +5 more
doaj   +2 more sources

Research of a trusted execution environment module for multiple platforms

open access: yesTongxin xuebao, 2014
The current TPM,MTM and other trusted computing modules don’t take into account the variety of platforms and the update of the inside algorithms,protocols and functions.A hardware trusted execution environment module (TEEM) architecture,which uses ARM ...
Qian-ying ZHANG   +4 more
doaj   +3 more sources

Application progress of SGX in trusted computing area

open access: yes网络与信息安全学报, 2021
The trusted computing technology SGX protects the confidentiality and integrity of key codes and data by isolating a trusted execution environment, which can help prevent all kinds of attacks.Firstly, the research background and working principle of SGX ...
Bo ZHAO, Anqi YUAN, Yang AN
doaj   +3 more sources

Lessons Learned from Blockchain Applications of Trusted Execution Environments and Implications for Future Research [PDF]

open access: yesHASP@MICRO, 2021
Modern computer systems tend to rely on large trusted computing bases (TCBs) for operations. To address the TCB bloating problem, hardware vendors have developed mechanisms to enable or facilitate the creation of a trusted execution environment (TEE) in ...
Rabimba Karanjai   +5 more
semanticscholar   +1 more source

SoK: A Systematic Review of TEE Usage for Developing Trusted Applications [PDF]

open access: yesARES, 2023
Trusted Execution Environments (TEEs) are a feature of modern central processing units (CPUs) that aim to provide a high assurance, isolated environment in which to run workloads that demand both confidentiality and integrity.
Arttu Paju   +5 more
semanticscholar   +1 more source

Building a public service infrastructure: Lessons from the Northern Ireland Public Data Panel pilot.

open access: yesInternational Journal of Population Data Science, 2022
There is an increasing awareness of the potential for creating benefit through the production, use and linkage of data sets to enhance evidence for public policymaking, service provision and the general public good. By linking large scale datasets across
Elizabeth Nelson, Frances Burns
doaj   +1 more source

Research on the trusted environment of container cloud based on the TPCM

open access: yes网络与信息安全学报, 2021
Container technology is a lightweight operating system virtualization technology that is widely used in cloud computing environments and is a research hotspot in the field of cloud computing.
LIU Guojie, ZHANG Jianbiao, LI Zheng   +1 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy