Results 11 to 20 of about 437,233 (263)

Research on the trusted environment of container cloud based on the TPCM

open access: yes网络与信息安全学报, 2021
Container technology is a lightweight operating system virtualization technology that is widely used in cloud computing environments and is a research hotspot in the field of cloud computing.
LIU Guojie, ZHANG Jianbiao, LI Zheng   +1 more
doaj   +3 more sources

UK Longitudinal Linkage Collaboration – and the challenges in creating a new Longitudinal Populations Studies linked data resource.

open access: yesInternational Journal of Population Data Science, 2022
Objectives The UK Longitudinal Linkage Collaboration (UK LLC) is a new, unprecedented infrastructure enabling research into the COVID-19 pandemic.
Robin Flaig   +7 more
doaj   +1 more source

Local Data Spaces: Leveraging trusted research environments for secure location-based policy research in the age of coronavirus disease-2019

open access: yesData & Policy, 2023
This work explores the use of Trusted Research Environments for the secure analysis of sensitive, record-level data on local coronavirus disease-2019 (COVID-19) inequalities and economic vulnerabilities. The Local Data Spaces (LDS) project was a targeted
Jacob L. Macdonald   +5 more
doaj   +1 more source

The UK Longitudinal Linkage Collaboration: a trusted research environment for the longitudinal research community.

open access: yesInternational Journal of Population Data Science, 2022
Objectives The COVID-19 Longitudinal Health and Wellbeing National Core Study utilises data from Longitudinal Population Studies (LPS) and whole-population NHS databases: yet no resource existed linking multiple LPS to COVID-19 records.
Andy Boyd   +7 more
doaj   +1 more source

Environmental pre-requisites and social interchange : the participation experience of adolescents with autism spectrum disorder in Zurich [PDF]

open access: yes, 2020
Aim: Participation of adolescents with autism spectrum disorder hardly occurs in settings outside of home and school. Little is known about how their participation is influenced by environmental factors.
Beurskens, Anna   +4 more
core   +1 more source

Next-Generation Capabilities in Trusted Research Environments: Interview Study

open access: yesJournal of Medical Internet Research, 2022
Background A Trusted Research Environment (TRE; also known as a Safe Haven) is an environment supported by trained staff and agreed processes (principles and standards), providing access to data for research while protecting patient confidentiality.
Sanaz Kavianpour   +4 more
openaire   +4 more sources

Machine learning models in trusted research environments -- understanding operational risks

open access: yesInternational Journal of Population Data Science, 2023
IntroductionTrusted research environments (TREs) provide secure access to very sensitive data for research. All TREs operate manual checks on outputs to ensure there is no residual disclosure risk. Machine learning (ML) models require very large amount of data; if this data is personal, the TRE is a well-established data management solution.
Felix Ritchie   +7 more
openaire   +4 more sources

Introducing a new Trusted Research Environment - the Safe Haven Artificial Platform (SHAIP).

open access: yesInternational Journal of Population Data Science, 2022
Objectives Scotland has an established Trusted Research Environment (TREs) through the Scottish Safe Haven Network. These Safe Havens traditionally service structured datasets, however, researchers increasingly require access to large multi-modal linked
Katie Wilde   +4 more
doaj   +1 more source

Trust Model Research in Cloud Computing Environment [PDF]

open access: yesAdvances in Computer Science Research, 2015
The trust evaluation research in cloud computing has been involved in the node security communication, security storage, resource allocation and many other aspects.As an effective replacement oftraditional networksecurity,trust mechanismhas effectively solved the security problems of distributed computing, such as grid computing, pervasive computing ...
Changqing Gong, Xiguang Li, Haiyang Ding
openaire   +1 more source

Exploiting code mobility for dynamic binary obfuscation [PDF]

open access: yes, 2011
Software protection aims at protecting the integrity of software applications deployed on un-trusted hosts and being subject to illegal analysis. Within an un-trusted environment a possibly malicious user has complete access to system resources and tools
Barberis, Davide   +4 more
core   +2 more sources

Home - About - Disclaimer - Privacy