How to Trip Rapid Review

Step 1: Select articles relevant to your search (remember the system is only optimised for single intervention studies)

Step 2: press

Step 3: review the result, and maybe amend the or if you know better! If we're unsure of the overall sentiment of the trial we will display the conclusion under the article title. We then require you to tell us what the correct sentiment is.

3,340 results for

Computer Security

by
...
Latest & greatest
Alerts

Export results

Use check boxes to select individual results below

SmartSearch available

Trip's SmartSearch engine has discovered connected searches & results. Click to show

1. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation (PubMed)

Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC (...) overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation.

Full Text available with Trip Pro

2018 Sensors (Basel, Switzerland)

2. Susceptibility and resilience to cyber threat: Findings from a scenario decision program to measure secure and insecure computing behavior. (PubMed)

Susceptibility and resilience to cyber threat: Findings from a scenario decision program to measure secure and insecure computing behavior. Interest in the individual differences underlying end user computer security behavior has led to the development of a multidisciplinary field of research known as behavioral information security. An important gap in knowledge and the motivation for this research is the development of ways to measure secure and insecure cyber behavior for research (...) and eventually practice. Here we report a study designed to develop a technique for assessing secure and insecure cyber behavior for broad research use. The Susceptibility and Resilience to Cyber Threat (SRCT) is an immersive scenario decision program. The SRCT measures susceptibility to cyber threat and malicious behavior as well protective resilience actions via participant responses/decisions to emails, interactions with security dialogs, and computer actions in a real-world simulation. Data were

Full Text available with Trip Pro

2018 PLoS ONE

3. Use of computational modeling combined with advanced visualization to develop strategies for the design of crop ideotypes to address food security. (PubMed)

Use of computational modeling combined with advanced visualization to develop strategies for the design of crop ideotypes to address food security. Sustainable crop production is a contributing factor to current and future food security. Innovative technologies are needed to design strategies that will achieve higher crop yields on less land and with fewer resources. Computational modeling coupled with advanced scientific visualization enables researchers to explore and interact with complex

Full Text available with Trip Pro

2018 Nutrition reviews

4. Secure genome-wide association analysis using multiparty computation (PubMed)

Secure genome-wide association analysis using multiparty computation Most sequenced genomes are currently stored in strict access-controlled repositories. Free access to these data could improve the power of genome-wide association studies (GWAS) to identify disease-causing genetic variants and aid the discovery of new drug targets. However, concerns over genetic data privacy may deter individuals from contributing their genomes to scientific studies and could prevent researchers from sharing (...) data with the scientific community. Although cryptographic techniques for secure data analysis exist, none scales to computationally intensive analyses, such as GWAS. Here we describe a protocol for large-scale genome-wide analysis that facilitates quality control and population stratification correction in 9K, 13K, and 23K individuals while maintaining the confidentiality of underlying genotypes and phenotypes. We show the protocol could feasibly scale to a million individuals. This approach may

Full Text available with Trip Pro

2018 Nature biotechnology

5. A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing (PubMed)

A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing Many hospitals and medical clinics have been using a wearable sensor in its health care system because the wearable sensor, which is able to measure the patients' biometric information, has been developed to analyze their patients remotely. The measured information is saved to a server in a medical center, and the server keeps the medical information, which also involves personal information, on a cloud system (...) . The server and network devices are used by connecting each other, and sensitive medical records are dealt with remotely. However, these days, the attackers, who try to attack the server or the network systems, are increasing. In addition, the server and the network system have a weak protection and security policy against the attackers. In this paper, it is suggested that security compliance of medical contents should be followed to improve the level of security. As a result, the medical contents

Full Text available with Trip Pro

2018 Journal of healthcare engineering

6. A Secure Multi-Tier Mobile Edge Computing Model for Data Processing Offloading Based on Degree of Trust (PubMed)

A Secure Multi-Tier Mobile Edge Computing Model for Data Processing Offloading Based on Degree of Trust Current mobile devices need to run applications with high computational demands and critical response times. The mobile edge computing (MEC) paradigm was developed to improve the performance of these devices. This new computation architecture allows for the mobile devices to execute applications on fog nodes at the network edge; this process is called data processing offloading. This article (...) presents a security model for the externalization of application execution in multi-tier MEC environments. The principal novelty of this study is that the model is able to modify the required security level in each tier of the distributed architecture as a function of the degree of trust associated with that tier. The basic idea is that a higher degree of trust requires a lower level of security, and vice versa. A formal framework is introduced that represents the general environment of application

Full Text available with Trip Pro

2018 Sensors (Basel, Switzerland)

7. Privacy-preserving record linkage in large databases using secure multiparty computation (PubMed)

Privacy-preserving record linkage in large databases using secure multiparty computation Practical applications for data analysis may require combining multiple databases belonging to different owners, such as health centers. The analysis should be performed without violating privacy of neither the centers themselves, nor the patients whose records these centers store. To avoid biased analysis results, it may be important to remove duplicate records among the centers, so that each patient's (...) data would be taken into account only once. This task is very closely related to privacy-preserving record linkage.This paper presents a solution to privacy-preserving deduplication among records of several databases using secure multiparty computation. It is build upon one of the fastest practical secure multiparty computation platforms, called Sharemind.The tests on ca 10 million records of simulated databases with 1000 health centers of 10000 records each show that the computation is feasible

Full Text available with Trip Pro

2018 BMC medical genomics

8. SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing (PubMed)

SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained (...) , which achieves message authentication and maintains the anonymity of the vehicles. In order to reduce the computations of the OBUs in the vehicles, we outsource the heavy computations of encryption, decryption and signing to a cloud server and road-side units. The theoretical analysis and simulation results reveal that our secure and efficient scheme is suitable for VCC.

Full Text available with Trip Pro

2018 Sensors (Basel, Switzerland)

9. Secure and scalable deduplication of horizontally partitioned health data for privacy-preserving distributed statistical computation. (PubMed)

Secure and scalable deduplication of horizontally partitioned health data for privacy-preserving distributed statistical computation. Techniques have been developed to compute statistics on distributed datasets without revealing private information except the statistical results. However, duplicate records in a distributed dataset may lead to incorrect statistical results. Therefore, to increase the accuracy of the statistical analysis of a distributed dataset, secure deduplication (...) is an important preprocessing step.We designed a secure protocol for the deduplication of horizontally partitioned datasets with deterministic record linkage algorithms. We provided a formal security analysis of the protocol in the presence of semi-honest adversaries. The protocol was implemented and deployed across three microbiology laboratories located in Norway, and we ran experiments on the datasets in which the number of records for each laboratory varied. Experiments were also performed on simulated

Full Text available with Trip Pro

2017 Medical Informatics and Decision Making

10. Imperceptible watermarking for security of fundus images in tele-ophthalmology applications and computer-aided diagnosis of retina diseases. (PubMed)

Imperceptible watermarking for security of fundus images in tele-ophthalmology applications and computer-aided diagnosis of retina diseases. The authentication and integrity verification of medical images is a critical and growing issue for patients in e-health services. Accurate identification of medical images and patient verification is an essential requirement to prevent error in medical diagnosis. The proposed work presents an imperceptible watermarking system to address the security issue (...) of medical fundus images for tele-ophthalmology applications and computer aided automated diagnosis of retinal diseases.In the proposed work, patient identity is embedded in fundus image in singular value decomposition domain with adaptive quantization parameter to maintain perceptual transparency for variety of fundus images like healthy fundus or disease affected image. In the proposed method insertion of watermark in fundus image does not affect the automatic image processing diagnosis of retinal

2017 International journal of medical informatics

11. Computer Security Incident Response Team Effectiveness: A Needs Assessment (PubMed)

Computer Security Incident Response Team Effectiveness: A Needs Assessment Computer security incident response teams (CSIRTs) respond to a computer security incident when the need arises. Failure of these teams can have far-reaching effects for the economy and national security. CSIRTs often have to work on an ad hoc basis, in close cooperation with other teams, and in time constrained environments. It could be argued that under these working conditions CSIRTs would be likely to encounter

Full Text available with Trip Pro

2017 Frontiers in psychology

12. Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems (PubMed)

Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems Fog computing, shifting intelligence and resources from the remote cloud to edge networks, has the potential of providing low-latency for the communication from sensing data sources to users. For the objects from the Internet of Things (IoT) to the cloud, it is a new trend that the objects establish social-like relationships with each other, which efficiently brings the benefits of developed sociality (...) to a complex environment. As fog service become more sophisticated, it will become more convenient for fog users to share their own services, resources, and data via social networks. Meanwhile, the efficient social organization can enable more flexible, secure, and collaborative networking. Aforementioned advantages make the social network a potential architecture for fog computing systems. In this paper, we design an architecture for social fog computing, in which the services of fog are provisioned based

Full Text available with Trip Pro

2017 Sensors (Basel, Switzerland)

13. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications (PubMed)

A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud (...) . This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways

Full Text available with Trip Pro

2017 Sensors (Basel, Switzerland)

14. A security mechanism based on evolutionary game in fog computing (PubMed)

A security mechanism based on evolutionary game in fog computing Fog computing is a distributed computing paradigm at the edge of the network and requires cooperation of users and sharing of resources. When users in fog computing open their resources, their devices are easily intercepted and attacked because they are accessed through wireless network and present an extensive geographical distribution. In this study, a credible third party was introduced to supervise the behavior of users (...) and protect the security of user cooperation. A fog computing security mechanism based on human nervous system is proposed, and the strategy for a stable system evolution is calculated. The MATLAB simulation results show that the proposed mechanism can reduce the number of attack behaviors effectively and stimulate users to cooperate in application tasks positively.

Full Text available with Trip Pro

2017 Saudi journal of biological sciences

15. Occupational Therapists' Use of Occupation Focused Practice in Secure Hospitals

Occupational Therapists' Use of Occupation Focused Practice in Secure Hospitals Occupational therapists’ use of occupation-focused practice in secure hospitals Practice guideline Second Edition Royal College of Occupational Therapists Specialist Section Mental HealthCover photographs T echnical drawing and painting images used courtesy of the West London Mental Health Trust Football, gardening, cooking and computer images ©iStockphoto.com Turntables image ©123rf.com About the publisher (...) and therapeutic effect of activity and how they can access this and establish themselves as valued members of the community – both in hospital and beyond. Dr Sarah Markham Department of Biostatistics, King’s College Department of Computer Science and Information Technology, Birkbeck College vii Royal College of Occupational Therapists 2017 Foreword (1st edition) If the man (or woman) on the street were to visit a ward in a secure hospital, it would not be a surprise if they were to see a group of middle-aged

2018 British Association of Occupational Therapists

16. Experimental realization of an entanglement access network and secure multi-party computation (PubMed)

Experimental realization of an entanglement access network and secure multi-party computation To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we (...) report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography.

Full Text available with Trip Pro

2016 Scientific reports

17. Framework for Deploying a Virtualized Computing Environment for Collaborative and Secure Data Analytics (PubMed)

Framework for Deploying a Virtualized Computing Environment for Collaborative and Secure Data Analytics Large amounts of health data generated by a wide range of health care applications across a variety of systems have the potential to offer valuable insight into populations and health care systems, but robust and secure computing and analytic systems are required to leverage this information.We discuss our experiences deploying a Secure Data Analysis Platform (SeDAP), and provide a framework (...) to plan, build and deploy a virtual desktop infrastructure (VDI) to enable innovation, collaboration and operate within academic funding structures. It outlines 6 core components: Security, Ease of Access, Performance, Cost, Tools, and Training.A platform like SeDAP is not simply successful through technical excellence and performance. It's adoption is dependent on a collaborative environment where researchers and users plan and evaluate the requirements of all aspects.

Full Text available with Trip Pro

2016 EGEMS

18. Computer Security

Computer Security Computer Security Toggle navigation Brain Head & Neck Chest Endocrine Abdomen Musculoskeletal Skin Infectious Disease Hematology & Oncology Cohorts Diagnostics Emergency Findings Procedures Prevention & Management Pharmacy Resuscitation Trauma Emergency Procedures Ultrasound Cardiovascular Emergencies Lung Emergencies Infectious Disease Pediatrics Neurologic Emergencies Skin Exposure Miscellaneous Abuse Cancer Administration 4 Computer Security Computer Security Aka: Computer (...) Security , Network Security From Related Chapters II. Background Security is always balanced with, and often at risk due to other requirements Ease of use (or convenience) Functionality (or mobility) III. Approach: Practice least privelege See computer firewall Disable Web-based remote management Disable WiFi Protected Setup (WPS) See Modify all router default settings Assign an SSID (unique discoverable name) to router that does not give away its owner (e.g. avoid "Smith Router") Change the DHCP

2018 FP Notebook

19. Secure Multi-pArty Computation Grid LOgistic REgression (SMAC-GLORE). (PubMed)

Secure Multi-pArty Computation Grid LOgistic REgression (SMAC-GLORE). In biomedical research, data sharing and information exchange are very important for improving quality of care, accelerating discovery, and promoting the meaningful secondary use of clinical data. A big concern in biomedical data sharing is the protection of patient privacy because inappropriate information leakage can put patient privacy at risk.In this study, we deployed a grid logistic regression framework based on Secure (...) Multi-party Computation (SMAC-GLORE). Unlike our previous work in GLORE, SMAC-GLORE protects not only patient-level data, but also all the intermediary information exchanged during the model-learning phase.The experimental results demonstrate the feasibility of secure distributed logistic regression across multiple institutions without sharing patient-level data.In this study, we developed a circuit-based SMAC-GLORE framework. The proposed framework provides a practical solution for secure

Full Text available with Trip Pro

2016 Medical Informatics and Decision Making

20. Privacy-preserving microbiome analysis using secure computation (PubMed)

Privacy-preserving microbiome analysis using secure computation Developing targeted therapeutics and identifying biomarkers relies on large amounts of research participant data. Beyond human DNA, scientists now investigate the DNA of micro-organisms inhabiting the human body. Recent work shows that an individual's collection of microbial DNA consistently identifies that person and could be used to link a real-world identity to a sensitive attribute in a research dataset. Unfortunately (...) , the current suite of DNA-specific privacy-preserving analysis tools does not meet the requirements for microbiome sequencing studies.To address privacy concerns around microbiome sequencing, we implement metagenomic analyses using secure computation. Our implementation allows comparative analysis over combined data without revealing the feature counts for any individual sample. We focus on three analyses and perform an evaluation on datasets currently used by the microbiome research community. We use our

Full Text available with Trip Pro

2016 Bioinformatics

To help you find the content you need quickly, you can filter your results via the categories on the right-hand side >>>>