Results 81 to 90 of about 2,008,551 (307)
Data visiting governance: a conceptual framework
As genomic research scales globally, legal constraints such as data localization provisions in data privacy and other laws and ethical imperatives around privacy and sovereignty increasingly challenge traditional models of data sharing.
Donrich Thaldar
doaj +1 more source
Credibility of Health Information and Digital Media: New Perspectives and Implications for Youth [PDF]
Part of the Volume on Digital Media, Youth, and Credibility. This chapter considers the role of Web technologies on the availability and consumption of health information.
Gunther Eysenbach
core
On Making Emerging Trusted Execution Environments Accessible to Developers
New types of Trusted Execution Environment (TEE) architectures like TrustLite and Intel Software Guard Extensions (SGX) are emerging. They bring new features that can lead to innovative security and privacy solutions.
Asokan, N. +2 more
core +1 more source
Objective To evaluate the efficacy and safety of baricitinib in pediatric patients with active juvenile idiopathic arthritis–associated uveitis (JIA‐U) or chronic anterior antinuclear antibody–positive uveitis, who had an inadequate response to methotrexate (MTX) or biologic disease‐modifying antirheumatic drugs (bDMARDs).
Athimalaipet V. Ramanan +7 more
wiley +1 more source
Trusted Launch of Virtual Machine Instances in Public IaaS Environments [PDF]
Cloud computing and Infrastructure-as-a-Service (IaaS) are emerging and promising technologies, however their adoption is hampered by data security concerns. At the same time, Trusted Computing (TC) is experiencing an increasing interest as a security
Aslam, Mudassar +3 more
core +3 more sources
We conducted the first comprehensive association analysis of a coronary artery disease (CAD) cohort within the recently released UK Biobank (UKB) whole genome sequencing dataset.
Letitia M.F. Sng +8 more
doaj +1 more source
Objectives This study evaluates low-fidelity synthetic data's benefits, costs, and utility for data owners and Trusted Research Environments (TREs). It examines financial implications, operational efficiencies, and governance challenges, informing best
Melissa Ogwayo +3 more
doaj +1 more source
A two‐step authentication framework for Mobile ad hoc networks [PDF]
The lack of fixed infrastructure in ad hoc networks causes nodes to rely more heavily on peer nodes for communication. Nevertheless, establishing trust in such a distributed environment is very difficult, since it is not straightforward for a node to ...
Douligeris, C. +2 more
core
Objective A patient‐centered approach for chronic disease management, including systemic lupus erythematosus (SLE), aligns treatment with patients’ values and preferences, leading to improved outcomes. This paper summarizes how patient experiences, perspectives, and priorities informed the American College of Rheumatology (ACR) 2024 Lupus Nephritis (LN)
Shivani Garg +20 more
wiley +1 more source
Youth Academic Success:It Starts in the Home [PDF]
Academic Success of youth is critical for their future success as well as for the economic and social health of their communities. Using a mixed methods approach (the 2008-2013 “Social Capital and Children’s Development” survey and commentaries of eight ...
Ybarra, Veronica Fay
core +1 more source

