-
101
Patient and public involvement in the co-design and assessment of unobtrusive sensing technologies for care at home: a user-centric design approach
Published 2025-01-01“…Key themes identified included (1) the need for user-customized alarms, (2) clear data-sharing protocols, and (3) the importance of embedding sensors into familiar household objects. …”
Get full text
Article -
102
Research on the Connotation,Denotation of the Ground Information Port
Published 2020-09-01“…In view of the existing problems in infrastructure,data sharing,application services and other aspects in China's space information application service system,the defi nition,construction concept and development goal of ground information port (GIP) was proposed by referring to the mature concept of "port" in the fi eld of aviation and transportation.Combined with the construction of the national project of space-integrated-ground network (SIGN),ground information port aims to eliminate information island,get through system channel and eliminate application chimney stress on this basis,from the "sharing,integration of general application,open" concept,the connotation and denotation of the GIP were discussed.It will provide reference for the construction of the national networking spatio-temporal information service system in the future.…”
Get full text
Article -
103
Research on attribute-based encryption with keyword search for cloud storage
Published 2017-11-01“…To safeguard the sensitive data stored on the cloud and promote the efficiency of data sharing simulta-neously,a secure flexible and efficient attribute-based encryption scheme with keyword search is proposed,which designs an index generation mechanism that requires the private key of data owner to resist the keyword guessing attack,supports one-to-many application scenarios based on the linear secret shared access structure,introduces the conjunctive subset keyword search technique and online/offline technique to improve search flexibility and efficien-cy.Theoretical analysis and experimental evaluation show that the proposed scheme enjoys high efficiency.…”
Get full text
Article -
104
Research on ciphertext search and sharing technology in edge computing mode
Published 2022-04-01“…Aiming at the problem of edge computing data security, a ciphertext search and sharing solution was proposed, where the above-mentioned edge computing advantages were used to achieve user privacy data protection, edge nodes were used to construct encrypted inverted indexes, indexes and keys between edge nodes and cloud computing platforms were securely shared, and ciphertext search, secure data sharing, and dynamic index update were realized without changing the edge computing architecture and cloud computing architecture.Finally, compared to existing schemes, performance and security were analyzed and discussed, which proves that the proposed scheme has high security strength under ciphertext search attack model, and the ciphertext search efficiency and document dynamic update function are taken into account based on encrypted inverted index.…”
Get full text
Article -
105
Survey on differential privacy and its progress
Published 2017-10-01“…With the arrival of the era of big data sharing,data privacy protection issues will be highlighted.Since its introduction in 2006,differential privacy technology has been widely researched in data mining and data publishing.In recent years,Google,Apple and other companies have introduced differential privacy technology into the latest products,and differential privacy technology has become the focus of academia and industry again.Firstly,the traditional centralized model of differential privacy was summarized,from the perspective of analysis of data mining and data released in the differential privacy way.Then the latest local differential privacy regarding data collection and data analysis based on the local model was described,involving crowdsourcing with random response technology,BloomFilter,statistical inference techniques.Finally,the main problems and solutions of differential privacy technology were summarized.…”
Get full text
Article -
106
Infrastructures de données géographiques et flux d’information environnementale
Published 2013-09-01“…Spatial Data Infrastructure (SDI), that emerge at every scale since 1990, are plateform that gather datas, informatics network, norme and standard, organizational arrangement and human ressources in order to facilitate and coordinate spatial data sharing, management and access on a specific territory and/or thematic. …”
Get full text
Article -
107
Blockchain-based secure and fair crowdsourcing scheme
Published 2019-07-01“…Although blockchain-based crowdsourcing schemes have considerable advantages in decentralization and data sharing, there is still a challenge to gurantee the security of crowdsourced-sensitive information and the fairness of crowdsourcing on the blockchain. …”
Get full text
Article -
108
Optimization method for attribute-based cryptographic access control in mobile cloud computing
Published 2018-07-01“…For the problem of secure data sharing and access control in mobile cloud,the drawback of traditional cryptographic access control schemes was deeply analyzed.Considering the truth that mobile devices were usually equipped with limited resources,an optimized attribute-based cryptographic access control scheme was proposed in this study.In the proposed scheme,a third party proxy was introduced into the system model,and the two-layer encryption method was applied.Combining traditional attribute-based encryption (ABE) algorithm with multi-secret sharing and split measurement of ABE encryption,the scheme could greatly reduce the cost of mobile users in terms of data publish and access management.Theoretical and experimental analysis shows that the contribution can well meet the requirements of mobile cloud in terms of security,computational complexity and communication cost,which means that it is promising for future applications.…”
Get full text
Article -
109
Survey of big-data-analysis-resistant privacy protection
Published 2016-04-01“…Privacy protection plays a significant role in big data era for data sharing and analysis.Traditional privacy protection approaches may not apply well for big data scenarios,because there may exist deep associations which can also cause privacy leakages.Therefore,privacy protection mechanisms that can defend against big data analysis is needed.A survey on related works was conducted,and the previous works were classified into three categories:privacy protection for massive high-dimensional heterogeneous data,location privacy protection and privacy protec-tion with enhanced utility.Then,the works in this area by COSEC group from nanjing university were introduced.At last,the privacy protection against big data analysis which was important and forward-looking was concluded,and the possible directions in this research area were introduced.…”
Get full text
Article -
110
Authentication method in SWIM based on improved Diameter/EAP-MD5
Published 2014-08-01“…System wide information management (SWIM) provides the civil aviation information exchange and data sharing function by using service-oriented architecture (SOA). …”
Get full text
Article -
111
Tracing the Blockchain Challenges in Healthcare: A Topic Modeling and Bibliometric Analysis
Published 2024-12-01“…The application of blockchain technology to healthcare offers promise in providing solutions to some key challenges related to data sharing, privacy, security, and access control. …”
Get full text
Article -
112
À propos de quelques outils de collecte de données : réflexions sur les pratiques numériques en archéologie
Published 2021-05-01“…Several digital devices have been used for producing, pooling, analysing, sharing and rendering these spatial data: computer-aided drawing, geographic information systems, database management systems, data sharing and publication platforms, mobile applications. …”
Get full text
Article -
113
Construction and Application of Digital Asset Platform for Hydropower Engineering
Published 2022-01-01“…The development of informatization and digitization of hydropower engineering is exposed to problems such as inconsistent data standards,uneven data quality,scattered data storage,weak correlation between data,and difficult data sharing.By referring to the concept of asset management,technologies including BIM,digital twins,and big data are used to construct an asset data model through the collection of engineering-related data assets and with the engineering asset codes as the link.In addition,an engineering digital asset platform is designed and developed to meet the asset management functions such as engineering data asset integration, management queries,download,and sharing,as well as the comprehensive application functions such as the overview of basic engineering information,multi-dimensional full life cycle asset management,and typical scenario application. …”
Get full text
Article -
114
Barcode Location in Financial Statement System Based on the Partial Differential Equation Image Recognition Algorithm
Published 2021-01-01“…Using a barcode to improve the efficiency of data sharing is undoubtedly the most convenient and fast way to realize financial statement information sharing. …”
Get full text
Article -
115
Financial technology and regulation: the competitive impact of open banking
Published 2021-04-01“…This mechanism represents a very early sectorspecific regulatory attempt to nurture competition in the digital economy and effectively implement data sharing. In this regard, the on-going UK Open Banking market investigation remedy shows how the antitrust enforcement can be deployed to complement the regulatory toolkit …”
Get full text
Article -
116
Perspectives of Hispanic and Latinx Community Members on AI-Enabled mHealth Tools: Qualitative Focus Group Study
Published 2025-02-01“…These themes illustrate key barriers to the benefits of mHealth that communities may face, provide insights into the role of mHealth within families, and examine the appropriate balance of data sharing and privacy protections. ConclusionsThese findings offer important insights that can help advance the development of mHealth that responds to community values and priorities.…”
Get full text
Article -
117
Efficient unpaired data validation and aggregation protocol in industrial Internet of things
Published 2024-10-01“…As a cornerstone technology of smart manufacturing, the industrial Internet of things (IIoT) harnesses efficient data sharing to propel the networking, digitization, and intellectualization of industrial production, thereby assisting manufacturing enterprises in cost reduction, efficiency enhancement, and bolstering their core competitiveness. …”
Get full text
Article -
118
Preserving Differential Privacy for Similarity Measurement in Smart Environments
Published 2014-01-01“…Hence, privacy protection is now an emerging issue that we need to consider especially when data sharing is essential for analysis purpose. In this paper, we consider the case where two agents in the smart environment want to measure the similarity of their collected or stored data. …”
Get full text
Article -
119
Integrating artificial intelligence into healthcare systems: opportunities and challenges
Published 2024-10-01“…Moreover, the development of high-quality and diverse datasets is essential to improve data sharing and enhance decision-making accuracy in healthcare. …”
Get full text
Article -
120
Convergence of evolving artificial intelligence and machine learning techniques in precision oncology
Published 2025-01-01“…Currently, many operational and technical challenges exist related to data technology, engineering, and storage; algorithm development and structures; quality and quantity of the data and the analytical pipeline; data sharing and generalizability; and the incorporation of these technologies into the current clinical workflow and reimbursement models.…”
Get full text
Article