-
321
A big data placement method using NSGA-III in meteorological cloud platform
Published 2019-06-01“…First, the resource utilization, the data access time, and the energy consumption in MCP with the fat-tree topology are analyzed. …”
Get full text
Article -
322
A Data Security Enhanced Access Control Mechanism in Mobile Edge Computing
Published 2020-01-01“…Therefore, access control, as an important method to ensure the security of user data during data access, began to be applied to mobile edge computing. …”
Get full text
Article -
323
Beyond Legal Frameworks and Security Controls For Accessing Confidential Survey Data: Engaging Data Users in Data Protection
Published 2023-12-01“…Unintentional data breaches, protocol violations, and the misuse of data are observed even in well-established restricted data access systems, which indicates that the systems all may rely heavily on trust. …”
Get full text
Article -
324
d-EMR: Secure and distributed Electronic Medical Record management
Published 2023-03-01“…As more and more data is produced, finding a secure and efficient data access structure has become a major research issue. …”
Get full text
Article -
325
The Dementias Platform UK (DPUK) data portal
Published 2020“…Projects are varied including multi-modal, machine learning, and Mendelian randomisation analyses. Data access is usually free at point of use although a small number of cohorts require a data access fee.…”
Journal article -
326
Flash Cache Hybrid Storage System For Video-On-Demand Server
Published 2018“…This component consists of HDD, SSD, and RAM, collectively fulfilling the requirement of simultaneous fast data access and large data distribution to numerous users. …”
Get full text
Thesis -
327
Improving Information Storage Reliability Using a Data Network
Published 2023“…Although data transfer rates will be reduced, data access and management will be simplified, and system availability will be improved. …”
Get full text
-
328
Researcher Credentialing for Administrative Data: Easing the Burden, Increasing the Efficiency
Published 2018-10-01“…We describe these standards, how they fit into the repository workflow, and how they make the data access process for efficient and effective for administrative data users and providers.…”
Get full text
Article -
329
Multi-authority Access Control Scheme in Cloud Environment
Published 2020-11-01“…This paper proposes a cloud data access control scheme based on blockchain with multi-authority (BMAC). …”
Get full text
Article -
330
Building a Canadian Data Platform under the Strategy for Patient-Oriented Research
Published 2019-11-01“…Results Our Data Access Support Hub will open in the fall of 2019, at which time we will have an inventory of data available across our network, and the beginnings of a catalog of algorithms and harmonized data. …”
Get full text
Article -
331
The ORFEUS Data Center
Published 1994-06-01“…Key issues for the ODC are the rapid on-line data access and quality controlled, complete and efficient off-line data access. …”
Get full text
Article -
332
The Working Group III on data exchange
Published 1994-06-01“…Key issues for the ODC are the rapid on-line data access and quality controlled, complete and efficient off-line data access. …”
Get full text
Article -
333
A noise-based privacy preserving model for Internet of Things
Published 2021-08-01“…The proposed model with the fuzzifier has around 48–73% less computational overhead compared to the Data access control scheme and 31–63% less computational overhead compared to the Dynamic Privacy Protection model. …”
Get full text
Article -
334
ADSM: Adaptive Data Scheduling Method for Hybrid Memories in Distributed System
Published 2019-01-01“…The SP-factor incorporates the data access patterns including data block size and data access parallelism, which leads to better data scheduling decision for higher performance. …”
Get full text
Article -
335
Stochastic Gradient Descent long short-term memory based secure encryption algorithm for cloud data storage and retrieval in cloud computing environment
Published 2023-05-01“…In the data access phase, cloud data access is managed by authenticating the authorized user with the Blowfish encryption algorithm. …”
Get full text
Article -
336
Public views and recommendations on the use of linked data for research: preliminary results from a public deliberation engagement
Published 2018-09-01“…Conclusion/Implications Changes in available data and increasing ability to link data makes it essential to include public views in systems of data access governance. Understanding the hopes and concerns of the public regarding the use of linked data for research will help develop data access regulations that reflect wide public interests.…”
Get full text
Article -
337
The privacy and control paradoxes in the context of smartphone apps
Published 2022-09-01“…This research examines how various factors, such as the degree of e-privacy concerns and control over data access permissions, can influence a user's intention to install a smartphone app. …”
Get full text
Article -
338
Cloud-based biomedical data storage and analysis for genomic research: Landscape analysis of data governance in emerging NIH-supported platforms
Published 2023-07-01“…Platform policies were compared across seven categories of data governance: data submission, data ingestion, user authentication and authorization, data security, data access, auditing, and sanctions. Our analysis finds similarities across the platforms, including reliance on a formal data ingestion process, multiple tiers of data access with varying user authentication and/or authorization requirements, platform and user data security measures, and auditing for inappropriate data use. …”
Get full text
Article -
339
Nothing Else Matters! Trade-Offs Between Perceived Benefits and Barriers of AAL Technology Usage
Published 2019-06-01“…For care novices, in contrast, data access should be in the exclusive responsibility of medical professionals. …”
Get full text
Article -
340
Integrated platform and API for electrophysiological data
Published 2014-04-01“…The rapid data growth has made efficient data access and flexible, machine-readable data annotation a crucial requisite for neuroscientists. …”
Get full text
Article