Results 61 to 70 of about 2,008,551 (307)

Black Women Coaches in Community: Promising Practices for Mentorship in Canada

open access: yesFrontiers in Sports and Active Living, 2022
Mentorship programs have been shown to help under-represented women navigate their environments, but little research has been done on mentorship programs in sport coaching in Canada.
Janelle Joseph, Alex I. McKenzie
doaj   +1 more source

Next‐generation proteomics improves lung cancer risk prediction

open access: yesMolecular Oncology, EarlyView.
This is one of very few studies that used prediagnostic blood samples from participants of two large population‐based cohorts. We identified, evaluated, and validated an innovative protein marker model that outperformed an established risk prediction model and criteria employed by low‐dose computed tomography in lung cancer screening trials.
Megha Bhardwaj   +4 more
wiley   +1 more source

Trusted Computing and Secure Virtualization in Cloud Computing [PDF]

open access: yes, 2012
Large-scale deployment and use of cloud computing in industry is accompanied and in the same time hampered by concerns regarding protection of data handled by cloud computing providers.
Paladi, Nicolae
core   +2 more sources

CamFlow: Managed Data-sharing for Cloud Services

open access: yes, 2015
A model of cloud services is emerging whereby a few trusted providers manage the underlying hardware and communications whereas many companies build on this infrastructure to offer higher level, cloud-hosted PaaS services and/or SaaS applications.
Bacon, Jean   +3 more
core   +2 more sources

An Access Control System Based on Blockchain with Zero-Knowledge Rollups in High-Traffic IoT Environments

open access: yesSensors, 2023
The access control (AC) system in an IoT (Internet of Things) context ensures that only authorized entities have access to specific devices and that the authorization procedure is based on pre-established rules. Recently, blockchain-based AC systems have
Xin Lin   +6 more
doaj   +1 more source

SATRE – Standardised Architecture for Trusted Research Environments (Kick off)

open access: yes, 2023
Grant: UK Research and Innovation: SATRE - Standardised Architecture for Trusted Research ...
Chalstrey, Ed   +13 more
openaire   +1 more source

Towards trusted volunteer grid environments

open access: yes, 2010
Intensive experiences show and confirm that grid environments can be considered as the most promising way to solve several kinds of problems relating either to cooperative work especially where involved collaborators are dispersed geographically or to ...
Belghith, Abdelfettah, Khemakhem, Maher
core   +1 more source

Options for Securing RTP Sessions [PDF]

open access: yes, 2014
The Real-time Transport Protocol (RTP) is used in a large number of different application domains and environments. This heterogeneity implies that different security mechanisms are needed to provide services such as confidentiality ...
Perkins, C., Westerlund, M.
core   +2 more sources

Extensible Conditional Privacy Protection Authentication Scheme for Secure Vehicular Networks in a Multi-Cloud Environment

open access: yesIEEE Transactions on Information Forensics and Security, 2020
With an increasing number of cloud service providers (CSPs), research works on multi-cloud environments to provide solutions to avoid vendor lock-in and deal with the single-point failure problem have expanded considerably.
Jie Cui   +4 more
semanticscholar   +1 more source

Overview of molecular signatures of senescence and associated resources: pros and cons

open access: yesFEBS Open Bio, EarlyView.
Cells can enter a stress response state termed cellular senescence that is involved in various diseases and aging. Detecting these cells is challenging due to the lack of universal biomarkers. This review presents the current state of senescence identification, from biomarkers to molecular signatures, compares tools and approaches, and highlights ...
Orestis A. Ntintas   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy