Results 21 to 30 of about 437,233 (263)

Research on Embedded Dual Operating System Architecture Based on Trusted Execution Environment [PDF]

open access: yesJisuanji gongcheng, 2019
To address the requirements of the embedded systems for functionality and real-time performance,this paper presents a dual operating system architecture.Based on the trusted execution environment provided by ARM TrustZone,the dual operating system ...
MENG Ziqi,ZHANG Qianying,SHI Zhiping,GUAN Yong
doaj   +1 more source

Democratizing clinical-genomic data: How federated platforms can promote benefits sharing in genomics

open access: yesFrontiers in Genetics, 2023
Since the first sequencing of the human genome, associated sequencing costs have dramatically lowered, leading to an explosion of genomic data. This valuable data should in theory be of huge benefit to the global community, although unfortunately the ...
Maria Alvarellos   +7 more
doaj   +1 more source

Blockchain based trusted execution environment architecture analysis for multi - source data fusion scenario

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2023
Multi-source data fusion techniques are widely applied in dynamic target detection scenarios, such as target situational awareness, radar signal resolution, and feature fusion labeling.
Nan Yang   +5 more
doaj   +1 more source

Challenges and recommendations for high quality research using electronic health records

open access: yesFrontiers in Digital Health, 2022
Harnessing Real World Data is vital to improve health care in the 21st Century. Data from Electronic Health Records (EHRs) are a rich source of patient centred data, including information on the patient's clinical condition, laboratory results, diagnoses
K Honeyford   +18 more
doaj   +1 more source

Trusted Research Environments (TRE) Green Paper

open access: yes, 2020
Project Aligning approach to Trusted Research Environments Share this page Data Safe Havens are an essential way of managing risk of unauthorised re-identification of individuals from de-identified data. This risk heightens with increased data linkage across a wider range of data sets.
Hubbard, Tim   +3 more
openaire   +1 more source

BREATHE: The Health Data Research Hub for Respiratory Health.

open access: yesInternational Journal of Population Data Science, 2022
Objectives The BREATHE Health Data Research Hub for Respiratory Health was formed in October 2019 as a multi-site academic consortium with multiple industrial partners via an Industry Forum and across its wider network.
Chris Orton   +8 more
doaj   +1 more source

Research on Trusted Application Environment base on PTM [PDF]

open access: yesProceedings of the 2014 International Conference on Computer, Communications and Information Technology, 2014
Trusted Computing leverages Trusted Platform Module (TPM) as the root of trust to build secure computing environment so as to improve the security of terminals. But there are some security problems of user roaming and migration of sealed data because of binding between platforms and TPMs.
Yichen Jiang, Dawei Zhang, Tianhua Liu
openaire   +1 more source

Trusted Service Evaluation for Mobile Edge Users: Challenges and Reviews

open access: yesComplexity, 2021
With the increasing growth of web services shared in various mobile edge platforms, it becomes necessary to evaluate all the candidates based on their quality of services to reduce the users’ service selection cost.
Tingting Shao   +4 more
doaj   +1 more source

ISSUES OF CREATING THE DIGITAL ENVIRONMENT OF TRUST AS A STRUCTURAL ELEMENT IN THE DIGITALIZATION OF PUBLIC ADMINISTRATION

open access: yesПравовое государство: теория и практика, 2022
The article is devoted to the study of legal aspects of the digital environment of trust, identifying trends and problems related to the peculiarities of its formation in the context of digitalization of public administration.
KHIMCHENKO Aleksey Igorevich
doaj   +1 more source

Trustee: A Trust Management System for Fog-enabled Cyber Physical Systems [PDF]

open access: yes, 2019
In this paper, we propose a lightweight trust management system (TMS) for fog-enabled cyber physical systems (Fog-CPS). Trust computation is based on multi-factor and multi-dimensional parameters, and formulated as a statistical regression problem which ...
Chowdhry, B. S.   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy