Showing 301 - 320 results of 33,375 for search '"Author"', query time: 0.13s Refine Results
  1. 301

    Government Authority and Responsibility in the Universal Health Coverage Program from the Aspect of Participation and Financing by Titin Hamidah, Andika Persada Putera, Budi Pramono

    Published 2024-12-01
    “…This research aims to analyze the Government's authority and responsibility within the JKN Program to achieve UHC. …”
    Get full text
    Article
  2. 302

    “Russell Banks goes Creole”: A Talk with the Author of The Book of Jamaica and Continental Drift by Kathleen Gyssels, Gaëlle Cooreman

    Published 2008-05-01
    “…This interview with Russell Banks, acknowledged author of The Book of Jamaica (1980) and Continental Drift (1985), amongst others, was conducted on May 27th 2007 by Kathleen Gyssels and Gaëlle Cooreman (University of Antwerp). …”
    Get full text
    Article
  3. 303
  4. 304
  5. 305
  6. 306
  7. 307
  8. 308
  9. 309
  10. 310

    Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain by Lin JIN, Youliang TIAN

    Published 2022-08-01
    “…Currently, there is no data exchanging and sharing between different hospitals, and it is easy to form data islands.At the same time, regional medical data contains a large amount of sensitive information of patients.The public acquisition, sharing and circulation of these data will lead to malicious tampering, theft, abuse and loss of ownership, thereby revealing patient privacy.In addition, the size of medical data is enormous and the data is unstructured, then it is more difficult to prevent and hold accountable some highly targeted malicious attacks, such as malicious attacks on medical data theft, tampering, and extortion.In view of the above problems, a blockchain-based on multi-authority attribute hidden electronic medical record sharing scheme was proposed to achieve fine-grained access to shared electronic medical records while ensuring patient privacy.The Multi-Authorization Attribute Encryption (MA-ABE) algorithm was introduced, which used multi-authority organizations to manage decentralized attributes.It also used hash functions to identify different users, in order to effectively resist collusion attacks between users with different authorizations.Besides, the linear secrets sharing scheme (LSSS) was used to realize partial hiding of attributes, and the attributes were divided into two parts:attribute name and attribute value.In addition, combined with the characteristics of blockchain openness, transparency and tamper-proof, the design of access policy can update the algorithm.Based on the access policy update algorithm, the policy block was added.The new access policy was uploaded to the blockchain to form a policy update traceability chain, which can realize distributed and reliable access control management under the condition of hidden policy.It can also support data privacy protection at the same time, and traceability of user behavior.The theoretical proof and experimental analysis have proved that this scheme protect attribute privacy effectively, while reduces computational overhead.…”
    Get full text
    Article
  11. 311
  12. 312
  13. 313

    International standards and doctrinal understanding of legal authority as the basis for the formation of the democratic Ukrainian state by Kelbya S.

    Published 2024-06-01
    “…Scientific novelty. The author establishes that the principle of the rule of law is, in fact, the only effective means of ensuring the inviolability of democracy, as well as one of its main features, and its enforcement and control is a guarantee of human rights to the extent that decent living conditions are created for each person. …”
    Get full text
    Article
  14. 314
  15. 315
  16. 316

    The OAuth 2.0 Web Authorization Protocol for the Internet Addiction Bioinformatics (IABio) Database by Jeongseok Choi, Jaekwon Kim, Dong Kyun Lee, Kwang Soo Jang, Dai-Jin Kim, In Young Choi

    Published 2016-03-01
    “…In this respect, our study proposes the OAuth standard protocol for database access authorization. The proposed IA Bioinformatics (IABio) database system is based on internet user authentication, which is a guideline for medical information standards, and uses OAuth 2.0 for access control technology. …”
    Get full text
    Article
  17. 317
  18. 318
  19. 319

    The Example of Herta Müller, A Nobel Literature Prize Author, in The Relationship of Tourism and Literature by Yüksel Gürsoy

    Published 2019-02-01
    “…Literary tourism covers the travels made to the places, in which authors were born, they lived, studied, wrote their works; spaces, in which scenes take place, places that are related to the characters in their works or destinations famous due to literal figures. …”
    Get full text
    Article
  20. 320