-
821por Ali, Aitizaz, Al-rimy, Bander Ali Saleh, Almazroi, Abdulwahab Ali, Alsubaei, Faisal S., Almazroi, Abdulaleem Ali, Saeed, Faisal“…The proposed design introduces a novel approach to safeguarding sensitive information and ensuring data integrity while maintaining a high level of trust among stakeholders. …”
Publicado 2023
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
822“…Blockchain technology offers great value in terms of decentralization, data integrity, transparency, and traceability, however the transactional data is public, and accessible raising concerns about violating privacy regulations. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
823“…Additional awareness of the need for data integrity of sequences submitted to public databases is needed to fully reap the benefits of these large data sets.…”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
824por Elliott, Thomas E., Holmes, John H., Davidson, Arthur J., La Chance, Pierre-Andre, Nelson, Andrew F., Steiner, John F.“…PURPOSE: Given the extensive data stored in healthcare data warehouses, data warehouse governance policies are needed to ensure data integrity and privacy. This review examines the current state of the data warehouse governance literature as it applies to healthcare data warehouses, identifies knowledge gaps, provides recommendations, and suggests approaches for further research. …”
Publicado 2013
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
825“…Conclusions: QA programs are critical for ensuring data integrity and therefore for the conduct of multicenter clinical trials.…”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
826por Deng, Yong-Yuan, Chen, Chin-Ling, Tsaur, Woei-Jiunn, Tang, Yung-Wen, Chen, Jung-Hsuan“…The proposed authentication mechanism is applied to a medical reader to provide a more comprehensive architecture while also providing mutual authentication, and guaranteeing data integrity, user untraceability, and forward and backward secrecy, in addition to being resistant to replay attack.…”
Publicado 2017
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
827por Shamsalinia, Abbas, Norouzi, Kiyan, Fallahi-Khoshknab, Masoud, Farhoudian, Ali, Ghaffari, Fatemeh“…Finally, the Lundman and Grenheim method was used to analyze the interviews and the four criteria of Guba and Lincoln were applied to check data integrity. Results: "Buying time," "methadone dependence," and "looking from a narrow view to the patient" were the main three categories that fit the results. …”
Publicado 2017
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
828“…Therefore, several schemes have been proposed to guarantee data integrity and privacy during their transmission between the client/controller (C) and the AP. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
829por Seyedrasooli, Alehe, Zamanzadeh, Vahid, Ghahramanian, Akram, Tabrizi, Faranak Jabbarzadeh“…Deep semistructured interviews were performed to gather data, and triangulation and member checking were utilized to ensure data integrity. The data were analyzed using Colaizzite seven-stage method. …”
Publicado 2019
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
830por Abdoun, Nabil, El Assad, Safwan, Manh Hoang, Thang, Deforges, Olivier, Assaf, Rima, Khalil, Mohamad“…It also shows the suitability of the proposed hash functions for the application such as Message Authentication, Data Integrity, Digital Signature, and Authenticated Encryption with Associated Data.…”
Publicado 2020
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
831por Saeed, Huma, Malik, Hassaan, Bashir, Umair, Ahmad, Aiesha, Riaz, Shafia, Ilyas, Maheen, Bukhari, Wajahat Anwaar, Khan, Muhammad Imran Ali“…Finally, this SLR concludes that the upcoming research can support the pervasive implementation of BCT to address the critical dilemmas related to health diagnostics, enhancing the patient healthcare process in remote monitoring or emergencies, data integrity, and avoiding fraud.…”
Publicado 2022
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
832“…One is based on cryptography and relies on computational complexity, the other is based on physical layer fingerprint and can not protect data integrity well. Both of these approaches will become insecure when facing attackers with infinite computing power. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
833por Huh, Ki Young, Jeong, Sang-un, Moon, Seol Ju, Kim, Min-Ji, Yang, Wooseok, Jeong, Myeonggyu, Song, Ildae, Kwak, Yong-Geun, Lee, SeungHwan, Kim, Min-Gul“…The recent advent of the dynamic consent concept intensified the data integrity issue in clinical trials. Incorporating blockchain technology into a dynamic consent platform can be a feasible solution. …”
Publicado 2022
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
834por Algredo-Badillo, Ignacio, Morales-Sandoval, Miguel, Medina-Santiago, Alejandro, Hernández-Gracidas, Carlos Arturo, Lobato-Baez, Mariana, Morales-Rosales, Luis Alberto“…In emergent technologies, data integrity is critical for message-passing communications, where security measures and validations must be considered to prevent the entrance of invalid data, detect errors in transmissions, and prevent data loss. …”
Publicado 2022
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
835“…Our framework also helps to check data integrity and consistency and data comparisons across species. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
836por Dar, Arshad Ahmad, Alam, Malik Zaib, Ahmad, Adeel, Reegu, Faheem Ahmad, Rahin, Saima Ahmed“…As a result of all these concerns, this study emphasizes the need for COVID-19 data processing to acquire aspects such as data security, data integrity, real-time data handling, and data management to provide patients with all benefits from which they had been denied owing to misinformation. …”
Publicado 2022
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
837“…However, public transport datasets suffer from data integrity problems; boarding stop information may be missing due to imperfect acquirement processes or inadequate reporting. …”
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
838“…Two-party collaborative signature scheme is an important cryptographic technology for user authentication and data integrity protection when using mobile devices for financial and securities transactions. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
839por McHugh, Claire G., Gottreich, Julia R., Kumara, Mahima T., Selzer, Faith, Collins, Jamie E., Losina, Elena, Katz, Jeffrey N.“…DESIGN: Using published FDA guidance and prior literature, we created a structure for virtual site visits that prioritized monitoring for protocol compliance, safety, and data integrity. We conducted site visits in three stages: preparation for the visit, the virtual meeting itself, and follow-up. …”
Publicado 2023
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
840por Leaver, James D G“…A FED Tester card has also been produced to enable testing of the FED under realistic CMS conditions. The data integrity of the S-Link connection used to read out the FED has been assessed and an extensive suite of software has been written to verify the performance of the FED hardware and firmware. …”
Publicado 2006
Enlace del recurso