Results 31 to 40 of about 812,870 (286)

Early responses to H7N9 in southern mainland China [PDF]

open access: yes, 2014
This article is made available through the Brunel Open Access Publishing Fund. © 2014 Goodwin and Sun; licensee BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http ...
C Chew   +21 more
core   +2 more sources

Towards the computer systems design based on Zero Trust Architecture

open access: yesInformatika
The work is devoted to theoretical and practical aspects of computer systems design based on the zero trust concept. Based on the system thinking of analyzing existing zero trust systems and theoretical models used in their design, the work describes key
A. I. Brazhuk, E. V. Olizarovich
doaj   +1 more source

Zero-Trust Model for Smart Manufacturing Industry

open access: yesApplied Sciences, 2022
Traditional security architectures use a perimeter-based security model where everything internal to the corporate network is trusted by default. This type of architecture was designed to protect static servers and endpoints; however, we need to adapt to
Biplob Paul, Muzaffar Rao
doaj   +1 more source

Net-Loss Reciprocation and the Context Dependency of Economic Choices [PDF]

open access: yes, 2013
This paper proposes a novel explanation for the context dependency of individual choices in two-player games. Context dependency refers to the well-established phenomenon that a player, when choosing from a given opportunity set created by the other ...
König, Clemens
core   +2 more sources

Emerging Technologies Driving Zero Trust Maturity Across Industries

open access: yesIEEE Open Journal of the Computer Society
This study explores the profound impact of emerging technologies on the Zero Trust paradigm and the challenges they present in the evolving cybersecurity landscape. As organizations grapple with increasingly complex threats, the integration of innovative
Hrishikesh Joshi
doaj   +1 more source

An experimental investigation of reputation effects of disclosure in an investment/trust game [PDF]

open access: yes, 2013
This paper Examines experimentally the reputation building role of disclosure in an investment/trust game. It provides experimental evidence in support of sequential equilibrium behavior in a finitely repeated investment/trust game where information ...
Lunawat, R
core   +1 more source

The Usage of Clouds in Zero-Trust Security Strategy: An Evolving Paradigm

open access: yesJournal of Information and Organizational Sciences
Zero-trust security is a security model that assumes no entity is implicitly trusted, regardless of its origin or scope of access. This approach requires continuous verification of all users, devices, and applications before granting access to resources.
Jyoti Bartakke, Rajeshkumar Kashyap
doaj   +1 more source

Let Your CyberAlter Ego Share Information and Manage Spam [PDF]

open access: yes, 2005
Almost all of us have multiple cyberspace identities, and these {\em cyber}alter egos are networked together to form a vast cyberspace social network. This network is distinct from the world-wide-web (WWW), which is being queried and mined to the tune of
Boykin, P. Oscar   +4 more
core   +1 more source

Pediatric Oncology Nursing Competencies in Latin America and the Caribbean: A Scoping Review to Inform Practice, Education, and Research

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Nurses are central to cancer care for children and adolescents, yet no comprehensive synthesis has defined essential core competencies for pediatric oncology nursing (PON) practice internationally, particularly in Latin America and the Caribbean (LAC).
Luís Carlos Lopes‐Júnior   +7 more
wiley   +1 more source

Privacy-Preserving with Zero Trust Computational Intelligent Hybrid Technique to English Education Model

open access: yesApplied Artificial Intelligence, 2023
The urgent and indispensable requirement for secure and efficient remote work compels organizations to reconsider their approach to safeguarding themselves against cyber threats.
Yitian Zhang
doaj   +1 more source

Home - About - Disclaimer - Privacy