• Nenhum resultado encontrado

[PDF] Top 20 Secure storage and sharing of health data in a Blockchain environment

Has 10000 "Secure storage and sharing of health data in a Blockchain environment" found on our website. Below are the top 20 most common "Secure storage and sharing of health data in a Blockchain environment".

Secure storage and sharing of health data in a Blockchain environment

Secure storage and sharing of health data in a Blockchain environment

... amount of digital health data is growing fast, generating the so called Big Healthcare Data ...proliferation of software applications and mobiles devices and, of ... See full document

74

A Blockchain System for Mobile Health Applications and Services

A Blockchain System for Mobile Health Applications and Services

... advent of blockchain, the growth and adaptation of cryptographic features and ca- pabilities were quickly extended to new and under-explored areas, such as ...rently, ... See full document

78

Cloud Storage and its Secure Overlay Techniques

Cloud Storage and its Secure Overlay Techniques

... feature of Plutus is that all the data are stored encrypted and all key distribution is handled in a decentralized manner ...cryptographic and key management operations are performed by ... See full document

5

An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Storage Service Environment

An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Storage Service Environment

... service in TISR that we propose to explore is also akin to the literature of secure computation outsourcing [3]_[6], [18], [20], [21], which aims to protects both input and output privacy ... See full document

5

A Medical Records Managing and Securing Blockchain Based System Supported by a Genetic Algorithm and Discrete Wavelet Transform

A Medical Records Managing and Securing Blockchain Based System Supported by a Genetic Algorithm and Discrete Wavelet Transform

... only in one direction by making use of the private ...the blockchain as well as relevancy of the profile. Thus, in the future of the healthcare sector, a role for ... See full document

22

Efficient and Secure Information Sharing For Security Personnels: A Role and Cooperation Based Approach

Efficient and Secure Information Sharing For Security Personnels: A Role and Cooperation Based Approach

... aspect of government’s ...persuade and endorse larger flow of information is in demand along with data sharing between public agencies [7], ...revolution in information ... See full document

12

 Secure Erasure Code-Based Cloud Storage with Secured Data Forwarding Using Conditional Proxy Re-Encryption (C-PRE)

Secure Erasure Code-Based Cloud Storage with Secured Data Forwarding Using Conditional Proxy Re-Encryption (C-PRE)

... virtualization and cloud computing can help companies accomplish more by breaking the physical bonds between an IT infrastructure and its users, heightened security threats must be overcome in order ... See full document

5

SOCIAL INEQUALITIES AND DECENTRALIZATION. THEORETICAL VIEWPOINTS AND EVIDENCES FROM THE HEALTH SYSTEM REFORM IN ROMANIA

SOCIAL INEQUALITIES AND DECENTRALIZATION. THEORETICAL VIEWPOINTS AND EVIDENCES FROM THE HEALTH SYSTEM REFORM IN ROMANIA

... ginated in decades or even centuries of organizational and managerial ...countries and Eastern Europe , decentralization can be considered a recent development, meant to remedy the ... See full document

28

Multifaceted health impacts of Particulate Matter (PM) and its management: An overview

Multifaceted health impacts of Particulate Matter (PM) and its management: An overview

... part of this review discusses briefly the management options associated with PM ...persistence of air pollutants and the rapid rise in vehicle travel in recent decades have raised ... See full document

26

Ethical sharing of health data in online platforms – which values should be considered?

Ethical sharing of health data in online platforms – which values should be considered?

... promotion of autonomy – the capacity of an individ- ual to be self-governing, make decisions, and to act in accordance with them, as well as with her values, commitments and life goals ... See full document

27

Authentication of Secure Data Transmission In Wireless Routing

Authentication of Secure Data Transmission In Wireless Routing

... Hop-by-hop and shortest-path routing are twin quintessences of Internet routing ...addresses of incoming packets, and on path computations performed locally at the ...node. In ... See full document

4

Modeling and Analysis of Queuing Systems in Banks A case study of Ghana Commercial Bank Ltd. Kumasi Main Branch

Modeling and Analysis of Queuing Systems in Banks A case study of Ghana Commercial Bank Ltd. Kumasi Main Branch

... sight of many banks in Ghana. The obvious implication of customers waiting in long and winding queues could result to prolonged discomfort and economic cost to them; however ... See full document

4

Overeducation, undereducation and labor earnings in Brazil: a panel data analysis

Overeducation, undereducation and labor earnings in Brazil: a panel data analysis

... (1) and (2) of Table 4 present estimates separately for men and women to investigate whether undereducation and overeducation effects on labor earnings are different by gender, whereas columns ... See full document

22

Health And Wellbeing Impact And Treatment of Nocturia – A Review of The Literature

Health And Wellbeing Impact And Treatment of Nocturia – A Review of The Literature

... implicated in nocturia can be classiied as afecting urine storage, urine production, and unrelated conditions that impact upon ...result in nocturia. Most commonly this occurs in the ... See full document

6

Explicit and implicit approach of sensitivity analysis in numerical modelling of solidification

Explicit and implicit approach of sensitivity analysis in numerical modelling of solidification

... Keywords: Application of Information Technology to the Foundry Industry: Solidification Process: Numerical Tcchniqucs: Sensitivity Analysis; Borzndary Elcmcnt Mcthod.. Introd[r] ... See full document

6

Fair Shares and Sharing Fairly: A Survey of Public Views on Open Science, Informed Consent and Participatory Research in Biobanking.

Fair Shares and Sharing Fairly: A Survey of Public Views on Open Science, Informed Consent and Participatory Research in Biobanking.

... variation in Albertans’ perceptions about ...involved in these projects, with 44% stating the institution, 26% the donor, and 23% the ...anonymization, and 53% thought donors had a continuing ... See full document

20

Investigating The Use Of Mobile Computing In Zimbabwe Polytechnics Case Of A Polytechnic In Zimbabwe

Investigating The Use Of Mobile Computing In Zimbabwe Polytechnics Case Of A Polytechnic In Zimbabwe

... upgrading and improvement in mobile computing device characteristics since Zimm erman’s research up to ...EDUCAUSE, in his article titled ―Executive Summary: Student Mobile Computing ... See full document

5

Secure and efficient storage of multimedia: content in public cloud environments using joint compression and encryption

Secure and efficient storage of multimedia: content in public cloud environments using joint compression and encryption

... De acordo com a revisão bibliográ ca efetuada acerca da temática computação em nu- vem, transmissão e armazenamento seguro de conteúdos multimédia, utilizando a compressão sem perdas, em ambientes de nuvem pública, ... See full document

125

	Renal Metastasis of a Malignant Myopericytoma: A Case Report and Review of Literature

Renal Metastasis of a Malignant Myopericytoma: A Case Report and Review of Literature

... expression of CD34 (Dako Clone QBEnd 10) (Figure 1E), and only focal expression of myogenic markers such as smooth muscle actin (Dako Clone 1A4) (Figure 1F) and calponin (Dako Clone ...1G) ... See full document

6

Assessment Of NPK In Human Male And Female Urine For Its Fertilising Potential In Agriculture

Assessment Of NPK In Human Male And Female Urine For Its Fertilising Potential In Agriculture

... irrespective of the type of treatment ...likelihood of cross-contamination with the use of urine separating (Ecosan) toilets ...part of the total nutrients in normal sewage; 80% ... See full document

9

Show all 10000 documents...