Results 31 to 40 of about 437,233 (263)

Disclosure control of machine learning models from trusted research environments (TRE): New challenges and opportunities

open access: yesHeliyon, 2023
Introduction: Artificial intelligence (AI) applications in healthcare and medicine have increased in recent years. To enable access to personal data, Trusted Research Environments (TREs) (otherwise known as Safe Havens) provide safe and secure ...
Esma Mansouri-Benssassi   +6 more
doaj   +1 more source

Network-aware Evaluation Environment for Reputation Systems [PDF]

open access: yes, 2013
Parties of reputation systems rate each other and use ratings to compute reputation scores that drive their interactions. When deciding which reputation model to deploy in a network environment, it is important to find the most suitable model and to ...
A. Jøsang   +8 more
core   +1 more source

How public and participant voices have influenced the UK Longitudinal Linkage Collaboration and its Trusted Research Environment.

open access: yesInternational Journal of Population Data Science, 2022
Objectives UK longitudinal population studies have complex governance structures and participant safeguards. As a new Trusted Research Environment (TRE) for >20 longitudinal studies, the UK Longitudinal Linkage Collaboration (UK LLC) must ensure ...
Kirsteen Campbell   +9 more
doaj   +1 more source

MA-TEECM: Mutual Anonymous Authentication-Based Credential Migration Technology for Mobile Trusted Execution Environments

open access: yesIEEE Access, 2023
ARM TrustZone is the most widely used mobile trusted execution environment (TEE) technology today. Its hardware-enabled isolated execution environment provides reliable assurance of secure storage of credentials in mobile devices.
Ziwang Wang, Liang Wang, Huili Yan
doaj   +1 more source

ACCCN Workforce Standards for Intensive Care Nursing: Systematic and evidence review, development, and appraisal [PDF]

open access: yes, 2017
Background: The intensive care nursing workforce plays an essential role in the achievement of positive healthcare outcomes. A growing body of evidence indicates that inadequate nurse staffing and poor skill mix are associated with negative outcomes for ...
Chamberlain, Diane   +2 more
core   +3 more sources

Using digital information to enrich longitudinal population study data at the UK Longitudinal Linkage Collaboration

open access: yesInternational Journal of Population Data Science
Introduction & Background UK Longitudinal Linkage Collaboration (UK LLC) is the national Trusted Research Environment (TRE) for the longitudinal research community.
Abigail Hill   +4 more
doaj   +1 more source

A Lightweight Verification Method Based on Metamorphic Relation for Nuclear Power Software

open access: yesFrontiers in Energy Research, 2022
The verification of nuclear design software commonly uses direct comparison methods. Benchmark questions, classical programs, experimental data, manual solutions, etc., would be used as expected results to compare with program outputs to evaluate the ...
Meng Li   +13 more
doaj   +1 more source

Research Progress on Blockchain Technology in Mobile Edge Computing [PDF]

open access: yesJisuanji gongcheng, 2020
Mobile Edge Computing(MEC) technology has been widely used in services that require high real-time performance and intensive bandwidth resources,but the heterogeneous underlying infrastructure leads to multiple security and privacy issues.The ...
WU Jigang, LIU Tonglai, LI Jingyi, HUANG Jinyao
doaj   +1 more source

Trusted and secure communication system using intelligent devices for individuals with disabilities

open access: yesAlexandria Engineering Journal, 2023
Disability has traditionally posed a significant barrier for millions of individuals who are unable to benefit from current technologies such as digital interfaces, the internet, and personal computers. Nowadays, developments in information communication
Geetanjali Rathee   +5 more
doaj   +1 more source

CyberGuarder: a virtualization security assurance architecture for green cloud computing [PDF]

open access: yes, 2012
Cloud Computing, Green Computing, Virtualization, Virtual Security Appliance, Security ...
Ashlesha   +16 more
core   +3 more sources

Home - About - Disclaimer - Privacy