Showing 101 - 120 results of 237 for search '"Data sharing"', query time: 0.06s Refine Results
  1. 101

    Patient and public involvement in the co-design and assessment of unobtrusive sensing technologies for care at home: a user-centric design approach by Jenny Sharma, Nazia Gillani, Imran Saied, Aaesha Alzaabi, Tughrul Arslan

    Published 2025-01-01
    “…Key themes identified included (1) the need for user-customized alarms, (2) clear data-sharing protocols, and (3) the importance of embedding sensors into familiar household objects. …”
    Get full text
    Article
  2. 102

    Research on the Connotation,Denotation of the Ground Information Port by Bin ZHOU, Zuoya ZHENG, Linyao QIU, Gang LIU, Zhou LU

    Published 2020-09-01
    “…In view of the existing problems in infrastructure,data sharing,application services and other aspects in China's space information application service system,the defi nition,construction concept and development goal of ground information port (GIP) was proposed by referring to the mature concept of "port" in the fi eld of aviation and transportation.Combined with the construction of the national project of space-integrated-ground network (SIGN),ground information port aims to eliminate information island,get through system channel and eliminate application chimney stress on this basis,from the "sharing,integration of general application,open" concept,the connotation and denotation of the GIP were discussed.It will provide reference for the construction of the national networking spatio-temporal information service system in the future.…”
    Get full text
    Article
  3. 103

    Research on attribute-based encryption with keyword search for cloud storage by Zhi-qiang ZHU, Hang SU, Lei SUN, Zuo-hui LI

    Published 2017-11-01
    “…To safeguard the sensitive data stored on the cloud and promote the efficiency of data sharing simulta-neously,a secure flexible and efficient attribute-based encryption scheme with keyword search is proposed,which designs an index generation mechanism that requires the private key of data owner to resist the keyword guessing attack,supports one-to-many application scenarios based on the linear secret shared access structure,introduces the conjunctive subset keyword search technique and online/offline technique to improve search flexibility and efficien-cy.Theoretical analysis and experimental evaluation show that the proposed scheme enjoys high efficiency.…”
    Get full text
    Article
  4. 104

    Research on ciphertext search and sharing technology in edge computing mode by Jifeng WANG, Guofeng WANG

    Published 2022-04-01
    “…Aiming at the problem of edge computing data security, a ciphertext search and sharing solution was proposed, where the above-mentioned edge computing advantages were used to achieve user privacy data protection, edge nodes were used to construct encrypted inverted indexes, indexes and keys between edge nodes and cloud computing platforms were securely shared, and ciphertext search, secure data sharing, and dynamic index update were realized without changing the edge computing architecture and cloud computing architecture.Finally, compared to existing schemes, performance and security were analyzed and discussed, which proves that the proposed scheme has high security strength under ciphertext search attack model, and the ciphertext search efficiency and document dynamic update function are taken into account based on encrypted inverted index.…”
    Get full text
    Article
  5. 105

    Survey on differential privacy and its progress by Zhi-qiang GAO, Yu-tao WANG

    Published 2017-10-01
    “…With the arrival of the era of big data sharing,data privacy protection issues will be highlighted.Since its introduction in 2006,differential privacy technology has been widely researched in data mining and data publishing.In recent years,Google,Apple and other companies have introduced differential privacy technology into the latest products,and differential privacy technology has become the focus of academia and industry again.Firstly,the traditional centralized model of differential privacy was summarized,from the perspective of analysis of data mining and data released in the differential privacy way.Then the latest local differential privacy regarding data collection and data analysis based on the local model was described,involving crowdsourcing with random response technology,BloomFilter,statistical inference techniques.Finally,the main problems and solutions of differential privacy technology were summarized.…”
    Get full text
    Article
  6. 106

    Infrastructures de données géographiques et flux d’information environnementale by Matthieu Noucher

    Published 2013-09-01
    “…Spatial Data Infrastructure (SDI), that emerge at every scale since 1990, are plateform that gather datas, informatics network, norme and standard, organizational arrangement and human ressources in order to facilitate and coordinate spatial data sharing, management and access on a specific territory and/or thematic. …”
    Get full text
    Article
  7. 107

    Blockchain-based secure and fair crowdsourcing scheme by Junwei Zhang, Wenxuan Cui, Jianfeng Ma, Chao Yang

    Published 2019-07-01
    “…Although blockchain-based crowdsourcing schemes have considerable advantages in decentralization and data sharing, there is still a challenge to gurantee the security of crowdsourced-sensitive information and the fairness of crowdsourcing on the blockchain. …”
    Get full text
    Article
  8. 108

    Optimization method for attribute-based cryptographic access control in mobile cloud computing by Jian LIU, Ming XIAN, Huimei WANG, Hong RONG

    Published 2018-07-01
    “…For the problem of secure data sharing and access control in mobile cloud,the drawback of traditional cryptographic access control schemes was deeply analyzed.Considering the truth that mobile devices were usually equipped with limited resources,an optimized attribute-based cryptographic access control scheme was proposed in this study.In the proposed scheme,a third party proxy was introduced into the system model,and the two-layer encryption method was applied.Combining traditional attribute-based encryption (ABE) algorithm with multi-secret sharing and split measurement of ABE encryption,the scheme could greatly reduce the cost of mobile users in terms of data publish and access management.Theoretical and experimental analysis shows that the contribution can well meet the requirements of mobile cloud in terms of security,computational complexity and communication cost,which means that it is promising for future applications.…”
    Get full text
    Article
  9. 109

    Survey of big-data-analysis-resistant privacy protection by Wei TONG, AOYun-long M, Qing-jun CEHN, Bin-ru WANG, Bao-jia ZHANG, Sheng ZHONG

    Published 2016-04-01
    “…Privacy protection plays a significant role in big data era for data sharing and analysis.Traditional privacy protection approaches may not apply well for big data scenarios,because there may exist deep associations which can also cause privacy leakages.Therefore,privacy protection mechanisms that can defend against big data analysis is needed.A survey on related works was conducted,and the previous works were classified into three categories:privacy protection for massive high-dimensional heterogeneous data,location privacy protection and privacy protec-tion with enhanced utility.Then,the works in this area by COSEC group from nanjing university were introduced.At last,the privacy protection against big data analysis which was important and forward-looking was concluded,and the possible directions in this research area were introduced.…”
    Get full text
    Article
  10. 110

    Authentication method in SWIM based on improved Diameter/EAP-MD5 by Zhi-jun WU, Ting ZHAO, Jin LEI

    Published 2014-08-01
    “…System wide information management (SWIM) provides the civil aviation information exchange and data sharing function by using service-oriented architecture (SOA). …”
    Get full text
    Article
  11. 111

    Tracing the Blockchain Challenges in Healthcare: A Topic Modeling and Bibliometric Analysis by Mohammad Mehraeen, Laya Mahmoudi

    Published 2024-12-01
    “…The application of blockchain technology to healthcare offers promise in providing solutions to some key challenges related to data sharing, privacy, security, and access control. …”
    Get full text
    Article
  12. 112

    À propos de quelques outils de collecte de données : réflexions sur les pratiques numériques en archéologie by Christophe Tufféry, Vincent Delvigne, Paul Fernandes, Céline Bressy-Léandri

    Published 2021-05-01
    “…Several digital devices have been used for producing, pooling, analysing, sharing and rendering these spatial data: computer-aided drawing, geographic information systems, database management systems, data sharing and publication platforms, mobile applications. …”
    Get full text
    Article
  13. 113

    Construction and Application of Digital Asset Platform for Hydropower Engineering by JIA Yuhao

    Published 2022-01-01
    “…The development of informatization and digitization of hydropower engineering is exposed to problems such as inconsistent data standards,uneven data quality,scattered data storage,weak correlation between data,and difficult data sharing.By referring to the concept of asset management,technologies including BIM,digital twins,and big data are used to construct an asset data model through the collection of engineering-related data assets and with the engineering asset codes as the link.In addition,an engineering digital asset platform is designed and developed to meet the asset management functions such as engineering data asset integration, management queries,download,and sharing,as well as the comprehensive application functions such as the overview of basic engineering information,multi-dimensional full life cycle asset management,and typical scenario application. …”
    Get full text
    Article
  14. 114

    Barcode Location in Financial Statement System Based on the Partial Differential Equation Image Recognition Algorithm by Jinghua Ning, Song Yu

    Published 2021-01-01
    “…Using a barcode to improve the efficiency of data sharing is undoubtedly the most convenient and fast way to realize financial statement information sharing. …”
    Get full text
    Article
  15. 115

    Financial technology and regulation: the competitive impact of open banking by Oscar Borgogno, Antonio Manganelli

    Published 2021-04-01
    “…This mechanism represents a very early sectorspecific regulatory attempt to nurture competition in the digital economy and effectively implement data sharing. In this regard, the on-going UK Open Banking market investigation remedy shows how the antitrust enforcement can be deployed to complement the regulatory toolkit …”
    Get full text
    Article
  16. 116

    Perspectives of Hispanic and Latinx Community Members on AI-Enabled mHealth Tools: Qualitative Focus Group Study by Stephanie A Kraft, Shaan Chopra, Miriana C Duran, Janet A Rojina, Abril Beretta, Katherine I López, Russell Javan, Benjamin S Wilfond, Margaret Rosenfeld, James Fogarty, Linda K Ko

    Published 2025-02-01
    “…These themes illustrate key barriers to the benefits of mHealth that communities may face, provide insights into the role of mHealth within families, and examine the appropriate balance of data sharing and privacy protections. ConclusionsThese findings offer important insights that can help advance the development of mHealth that responds to community values and priorities.…”
    Get full text
    Article
  17. 117

    Efficient unpaired data validation and aggregation protocol in industrial Internet of things by MA Rong, FENG Tao

    Published 2024-10-01
    “…As a cornerstone technology of smart manufacturing, the industrial Internet of things (IIoT) harnesses efficient data sharing to propel the networking, digitization, and intellectualization of industrial production, thereby assisting manufacturing enterprises in cost reduction, efficiency enhancement, and bolstering their core competitiveness. …”
    Get full text
    Article
  18. 118

    Preserving Differential Privacy for Similarity Measurement in Smart Environments by Kok-Seng Wong, Myung Ho Kim

    Published 2014-01-01
    “…Hence, privacy protection is now an emerging issue that we need to consider especially when data sharing is essential for analysis purpose. In this paper, we consider the case where two agents in the smart environment want to measure the similarity of their collected or stored data. …”
    Get full text
    Article
  19. 119

    Integrating artificial intelligence into healthcare systems: opportunities and challenges by Bongs Lainjo

    Published 2024-10-01
    “…Moreover, the development of high-quality and diverse datasets is essential to improve data sharing and enhance decision-making accuracy in healthcare. …”
    Get full text
    Article
  20. 120

    Convergence of evolving artificial intelligence and machine learning techniques in precision oncology by Elena Fountzilas, Tillman Pearce, Mehmet A. Baysal, Abhijit Chakraborty, Apostolia M. Tsimberidou

    Published 2025-01-01
    “…Currently, many operational and technical challenges exist related to data technology, engineering, and storage; algorithm development and structures; quality and quantity of the data and the analytical pipeline; data sharing and generalizability; and the incorporation of these technologies into the current clinical workflow and reimbursement models.…”
    Get full text
    Article