Showing 81 - 100 results of 237 for search '"Data sharing"', query time: 0.05s Refine Results
  1. 81

    Network Management System's Data Management Layer Based on Big Data Technology by Wei Li

    Published 2015-11-01
    “…Data management layer is the core of data processing and management in network management system.The current situation and problems of network management system was introduced.To break the isolation between the professional network management system and promote data sharing,data domain should further be subdivided and the data model should be reconstructed,and technical framework of Hadoop+MPP was a better choice.The direction for the planning and design of the network management system was pointed out.Finally,the relation of data management layer platform and enterprise wide data sharing service platform was discussed.…”
    Get full text
    Article
  2. 82

    Accelerated algorithm in attribute-based encryption over cloud environment by Guowei WU, Ning FAN, Laifu WANG, Shuai WANG, Jun SHEN, Huamin JIN

    Published 2019-11-01
    “…Cloud computing provides storage,computing and network services to tenants.Data security and data sharing and access control between tenants are indispensable functions.Attribute-based encryption (ABE) system is a one to many encryption system,which allows users to fine -grained access control on encrypted data according to users’ attributes.This encryption system is very suitable for multi-tenant data sharing overcloud computing environment.However,the existing attribute-based encryption schemes is inefficient,which cannot be applied to practical applications.Two types of ABE and their application scenarios were analyzed,and an acceleration algorithms scheme in attribute encryption cryptosystem was proposed.The experiment can illustrate that the proposed scheme can improve the efficiency of key generation algorithm,encryption algorithm and decryption algorithm.…”
    Get full text
    Article
  3. 83

    Research category and future development trend of data elements circulation and security by LI Fenghua, LI Hui, NIU Ben, QIU Weidong

    Published 2024-05-01
    “…Towards the trend of evolution from controlled data sharing in the information technology era to ubiquitous circulation of data elements in the data technology era, the difference between data sharing and data element circulation was analyzed, what kind of data could become a data element was explained, and six attributes that data must have to become a data element were put forward. …”
    Get full text
    Article
  4. 84

    The Path of Digital Government and University Asset Intelligence Value-Added Service Driven by Block Chain Technology by Qian Feng, `Razlini Mohd Ramli, Youwu Liu

    Published 2022-01-01
    “…Block chain technology played an important role in enterprise asset data resource data sharing, but there was less research on asset data sharing services applied to digital government and universities. …”
    Get full text
    Article
  5. 85

    Challenges of sharing individual participant data for secondary research on neglected tropical diseases: the experience of Drugs for Neglected Diseases initiative and a call for ac... by Anastassia Negrouk, Thaddaeus Egondi, Craig Tipple, Justyna Tarwid, Michelle Childs, Dominique Junod-Moser

    Published 2024-12-01
    “…Introduction The Drugs for Neglected Diseases initiative (DNDi) is committed to maximising the scientific value of the individual participant data (IPD) it has collected during its 20 years of activity and the IPD it will collect in the future, while safeguarding research participants’ privacy and their right to know how their data will be processed.Objective The objective of this article is to share what DNDi has learnt while working on its commitment to data sharing. It also aims to advance the debate about best practice in the research community to avoid ‘IPD sharing paralysis’, with a focus on multistakeholder projects involving patients and researchers based in countries with various levels of data privacy regulations and measures.Results The article describes a practical case study outlining the ethical, legal and technical challenges encountered by DNDi in the context of IPD data sharing. …”
    Get full text
    Article
  6. 86

    Adaptive resource optimization mechanism for blockchain sharding in digital twin edge network by Li JIANG, Shengli XIE, Hui TIAN

    Published 2023-03-01
    “…To address the security and privacy issues for data sharing in digital twin edge networks, a new distributed and secure data sharing mechanism was developed by leveraging blockchain sharding.Considering dynamic and time varying features in digital twin edge networks and mapping errors of physic networks, an adaptive resource allocation model was formulated which jointly optimized cluster head selection, local base station (BS) consensus access selection, spectrum and computation consensus resources allocation, in order to maximize transactional throughput for the blockchain sharding.Moreover, a digital twin edge networks empowered two-layered proximal policy optimization (PPO) algorithm was designed to obtain the optimal solutions.Numerical results illustrate that the proposed algorithm can effectively improve the transactional throughput for the blockchain sharding.Meanwhile, it can well adapt to the mapping errors.…”
    Get full text
    Article
  7. 87
  8. 88

    Medical researchers' perception of sharing of metadata from case report forms by Alexandra Meidt, Carolin Walter, Christoph U. Lehmann, Martin Dugas

    Published 2025-01-01
    “…Results Only 0.3% (5/1842) of data sharing commitments in DRKS included a plan to share blank CRFs. …”
    Get full text
    Article
  9. 89

    Blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid by Jianwei CHEN, Shuyu WANG, Meiping ZHANG, Zhenping ZHANG

    Published 2024-01-01
    “…Aiming at the problem that how to support lightweight multi-dimensional data aggregation, achieve double-end integrity verification of multi-dimensional data in the overall process of the system, and deal with the centralization of cloud servers, a blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid was proposed.Firstly, in order to meet the demand for fine-grained analysis of power data in smart grid, privacy-preserving multidimensional data aggregation was achieved by using masked values and Horner’s rule.On this basis, for the data integrity verification problem of the existing data aggregation scheme in the sharing of cloud storage data with the third party, a new signature algorithm was designed by borrowing the RSA-based multiplicative homomorphic commitment scheme and homomorphic hash function homomorphism, which enabled the cloud server to verify the integrity of aggregated data and be used for integrity verification in the data sharing phase, i.e., it achieved double-end verifiability of cloud storage data and was resistant to internal attacks.Meanwhile, an aggregated data sharing architecture based on federated chain multichain was proposed to effectively avoid centralisation problems such as single-machine processing bottleneck and vulnerability to attacks.The theoretical analysis proves the security of the scheme.Performance experiments show that the proposed scheme has lower computation and communication costs compared with existing schemes.…”
    Get full text
    Article
  10. 90

    Optimization Model of Traffic Sensor Layout considering Traffic Big Data by Xu Sun, Zixiu Bai, Kun Lin, Pengpeng Jiao, HuaPu Lu

    Published 2020-01-01
    “…Considering the impact of traffic big data, a set of impact factors for traffic sensor layout is established, including system cost, multisource data sharing, data demand, sensor failures, road infrastructure, and sensor type. …”
    Get full text
    Article
  11. 91

    Creating a Health Data Marketplace for the Digital Health Era by Imtiaz Khan, PhD, Mohamed A. Maher, Moderator: Anjum Khurshid, PhD

    Published 2024-09-01
    “…With the advent of the General Data Protection Regulation (GDPR) of the EU and the development of technologies like blockchain and distributed ledger technologies (DLT), it is now possible to create a new paradigm with a shared economic model where financial Incentivization will be the main driver for data sharing. This can be achieved by setting up a digital health data marketplace (DHDM). …”
    Get full text
    Article
  12. 92

    Blockchain-based cross-data center anonymous and verifiable identity authentication scheme by XU Shujiang, ZHANG Chaoyang, WANG Lianhai, ZHANG Shuhui, SHAO Wei

    Published 2024-04-01
    “…With the progression of big data and cloud computing technologies, there has been an escalating trend in cross-institutional data sharing and interaction within the financial sector. …”
    Get full text
    Article
  13. 93

    La communication éthique d’une société consumériste d’information by Jérôme Béranger

    Published 2012-02-01
    “…A new power relationship is being established, that of a society ever increasingly consuming medical information in which transparency, confidentiality, exchange and data sharing come face to face with resulting ethical and human issues.…”
    Get full text
    Article
  14. 94

    Opportunities for promoting open data in the Caribbean through biobanks by Sushant Saluja, Simon G. Anderson

    Published 2025-02-01
    “…Establishing a Caribbean biobank with equitable data-sharing principles can significantly enhance global genomic data sets and ensure that the benefits of precision medicine reach the Caribbean. …”
    Get full text
    Article
  15. 95

    Research on cloud storage systems supporting secure sharing by Yan SONG, Zhen HAN, Jian-jun LI, Lei HAN

    Published 2017-10-01
    “…A practical scheme for the cloud storage system was proposed to ensure security and efficiency during data sharing.The scheme which combine attribute-based encryption,proxy encryption with symmetric encryption,could integrate access control,efficient search with encryption well together.The scheme archived conjunctive-keyword non-field subset search by using bilinear mapping and polynomial equation.The scheme reduced the cost of decryption by outsourcing most of the decryption operations from the terminal to the cloud.At last,the performance was analyzed and an experiment was made for verification.…”
    Get full text
    Article
  16. 96

    Implementation of carceral medicaid suspension and enrollment programs: perspectives of carceral and medicaid leaders by Sachini Bandara, Brendan Saloner, Hannah Maniates, Minna Song, Noa Krawczyk

    Published 2025-01-01
    “…Discussion Findings highlight the need to update data sharing infrastructure, which will be critical to the implementation of the 1115 waivers, as carceral facilities will be subject to Medicaid billing and reporting requirements. …”
    Get full text
    Article
  17. 97

    Design and application of blockchain pattern for credit information industry by Shuohang GUO, Ziqi SONG

    Published 2018-04-01
    “…Based on the current status of Chinese credit information system,expounding the problems arising from the traditional credit information system structure,a credit system structure based on blockchain technology and two data transaction pattern and the technical framework of the credit data trading platform was proposed,It has the characteristics of decentralization,safe and credible,collective maintenance,and untampering.And the process of data transaction were expounded.To explore the advantage of application of blockchain in the credit and information industry:promote credit data sharing,improve the quality of supervision of the credit and information industry,ensure the privacy of the information subject,effectively improve the dimension of credit information.…”
    Get full text
    Article
  18. 98

    CP-ABE based data access control for cloud storage by SUN Guo-zi1, DONG Yu1, LI Yun1

    Published 2011-01-01
    “…To solve the safety issues in cloud storage services for network characteristics and data sharing characteristics,and based on the CP-ABE(cipertext policy-attribute based encryption) algorithm,a cipher text access control mechanism was proposed.According to access control and related architecture,the corresponding secure data structure algorithms were given.After this,the simulations and the performance analysis were given to evaluate our algorithm.Under the premise of untrusted service provider,the proposed mechanism can ensure the data security of the cloud storage system in an open environment,and can reduce right management complexity through property management.…”
    Get full text
    Article
  19. 99

    Swarm learning with weak supervision enables automatic breast cancer detection in magnetic resonance imaging by Oliver Lester Saldanha, Jiefu Zhu, Gustav Müller-Franzes, Zunamys I. Carrero, Nicholas R. Payne, Lorena Escudero Sánchez, Paul Christophe Varoutas, Sreenath Kyathanahally, Narmin Ghaffari Laleh, Kevin Pfeiffer, Marta Ligero, Jakob Behner, Kamarul A. Abdullah, Georgios Apostolakos, Chrysafoula Kolofousi, Antri Kleanthous, Michail Kalogeropoulos, Cristina Rossi, Sylwia Nowakowska, Alexandra Athanasiou, Raquel Perez-Lopez, Ritse Mann, Wouter Veldhuis, Julia Camps, Volkmar Schulz, Markus Wenzel, Sergey Morozov, Alexander Ciritsis, Christiane Kuhl, Fiona J. Gilbert, Daniel Truhn, Jakob Nikolas Kather

    Published 2025-02-01
    “…However, the development of AI models is often hindered by manual annotation requirements and strict data-sharing regulations between institutions. Methods In this study, we present an integrated pipeline combining weakly supervised learning—reducing the need for detailed annotations—with local AI model training via swarm learning (SL), which circumvents centralized data sharing. …”
    Get full text
    Article
  20. 100

    Blockchain-Assisted Hierarchical Attribute-Based Encryption Scheme for Secure Information Sharing in Industrial Internet of Things by A. Sasikumar, Logesh Ravi, Malathi Devarajan, A. Selvalakshmi, Abdulaziz Turki Almaktoom, Abdulaziz S. Almazyad, Guojiang Xiong, Ali Wagdy Mohamed

    Published 2024-01-01
    “…In addition, we developed a blockchain-integrated data-sharing scheme that makes it possible for users to share data via the use of edge and cloud storage. …”
    Get full text
    Article