Results 261 to 270 of about 2,008,551 (307)
Some of the next articles are maybe not open access.
FDO
Trusted Research Environments (TREs) are secure locations in which health and other sensitive data are placed and made available for researchers to analyse under strict controls.
S. Soiland-Reyes +5 more
semanticscholar +1 more source
Trusted Research Environments (TREs) are secure locations in which health and other sensitive data are placed and made available for researchers to analyse under strict controls.
S. Soiland-Reyes +5 more
semanticscholar +1 more source
Research of Mobile Agent Trust Management Model in Trusted Computing Environment
2010 International Conference on Computational Intelligence and Software Engineering, 2010This paper discusses the trust management and extended model based on the trust chain establishment and management on trusted computing platform. The model was applied to distributed system based on mobile agent to enhance its security. For the problems of trust management in the extended mobile agent system, the extended alternant process between ...
Aili Chen, Xiaoping Wu
openaire +1 more source
arXiv.org
Clinical free-text data offers immense potential to improve population health research such as richer phenotyping, symptom tracking, and contextual understanding of patient care.
Arlene Casey +9 more
semanticscholar +1 more source
Clinical free-text data offers immense potential to improve population health research such as richer phenotyping, symptom tracking, and contextual understanding of patient care.
Arlene Casey +9 more
semanticscholar +1 more source
A Research Agenda for Trust in Online Environments
Journal of Management Information Systems, 2008We present an agenda for the future research that has the potential to extend the conceptual foundations of trust in online environments and to improve the practice in the domain. The agenda draws on the previous work on trust, the papers included in this Special Issue, and our perspective on the state of the literature.
David Gefen, Izak Benbasat, Paula Pavlou
openaire +1 more source
RT-TEE: Real-time System Availability for Cyber-physical Systems using ARM TrustZone
IEEE Symposium on Security and Privacy, 2022Embedded devices are becoming increasingly pervasive in safety-critical systems of the emerging cyber-physical world. While trusted execution environments (TEEs), such as ARM TrustZone, have been widely deployed in mobile platforms, little attention has ...
Jinwen Wang +4 more
semanticscholar +1 more source
Preliminary Study of Trusted Execution Environments on Heterogeneous Edge Platforms
IFIP International Information Security Conference, 2018The recent edge computing infrastructure introduces a new computing model that works as a complement of the traditional cloud computing. The edge nodes in the infrastructure reduce the network latency of the cloud computing model and increase data ...
Zhenyu Ning +3 more
semanticscholar +1 more source
Trusted Research Environments - Landscape report
The landscape of Trusted Research Environments (TREs) in Europe is extensive, with this report identifying 40 TREs across various themes and disciplines. These TREs are produced by National Research and Education Networks (NRENs), Research Performing Organizations (RPOs), and specific projects.Tenhunen, Ville +8 more
openaire +1 more source
The Research of Trusted Technology under Cloud Environment
2013 International Conference on Information Science and Cloud Computing Companion, 2013In the current cloud environments, there are some problems of information in security and reliability. In order to establish more flexible and adaptable security mechanism, combining the cloud and credible is a major research direction in the field of security today. In this paper we studied some credible technology in cloud computing environment and a
Yinghong Lou, Wenlin Wang
openaire +1 more source
Developing a Trusted Stata ADO Repository for Trusted Research Environments
Researchers in the economical, social, and health sciences regularly analyse datasets collected by others. Many of these data are controlled-level, including variables considered to be personal and/or sensitive under data protection and privacy laws (e.g., the European Union’s GDPR).Tyler, Allison, Gyimes, Istvan Laszlo
openaire +1 more source
Federation in a Trusted Research Environment
This presentation was delivered as the closing keynote at the 2025 DataSHIELD conference at the Swiss Institute of Bioinfomatics. It provides a product management perspective on the challenges of data federation, and suggests ways in which integrating data federation frameworks with a trusted research environment could help resolve these.openaire +1 more source

