نتایج جستجو برای: mutual trust
تعداد نتایج: 100848 فیلتر نتایج به سال:
BACKGROUND Patient trust in physicians is a critical determinant of health seeking behaviors, medication adherence, and health outcomes. A crisis of interpersonal trust exists in China, extending throughout multiple social spheres, including the healthcare system. At the same time, with increased migration from Africa to China in the last two decades, Chinese physicians must establish mutual tr...
We propose Proxy Certificate Trust List (PCTL) to efficiently record delegation traces for grid computing. Our security solution based on PCTL provides functions as follows: (1) On-demand inquiries about real time delegation information of grid computing underway; (2) Lightweight mutual authentication that is beneficial for proxy nodes with limited computation power as wireless devices in mobil...
Location-aware applications are one of the biggest innovations brought by the smartphone era, and are effectively changing our everyday lives. But we are only starting to grasp the privacy risks associated with constant tracking of our whereabouts. In order to continue using location-based services in the future without compromising our privacy and security, we need new, privacy-friendly applic...
Using a new dynamical network model of society in which pairwise interactions are weighted according to mutual satisfaction, we show that cooperation is the norm in the hawks-doves game when individuals are allowed to break ties with undesirable neighbors and to make new acquaintances in their extended neighborhood. Moreover, cooperation is robust with respect to rather strong strategy perturba...
We introduce a model for provable data possession (PDP) that allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it. The model generates probabilistic proofs of possession by sampling random sets of blocks from the server, which drastically reduces I/O costs. The client maintains a constant amount of metadata to ve...
interorganizational coordination (ioc) is a critical part of planning, because planning mostly involves multiple organizational interactions. investment and employment are considered as multi-dimensional and multi-sectional challenges that the management of them requires intersectional and interorganizational cooperation. the goal of this research is the investigation of the interorganizational...
For wireless sensor networks (WSNs), many factors, such as mutual interference of wireless links, battlefield applications and nodes exposed to the environment without good physical protection, result in the sensor nodes being more vulnerable to be attacked and compromised. In order to address this network security problem, a novel trust evaluation algorithm defined as NBBTE (Node Behavioral St...
The use of Identity Management (IdM) may leverage the trust in a distributed Publish-Subscribe (PubSub) system. An IdM provides mutual authentication between publishers, subscribers and message routers, enforces access control on message delivery and integrity control of message content. Access control is also a means to reduce traffic in a PubSub network since unauthorized message traffic will...
Concerns of infectious disease outbreaks have recently reached the forefront of global security issues and resulted in new engagements among foreign science advisors, host country scientists, and officials. There are lessons to be learned from the numerous organizations working in global regions of endemic disease who are building capacity to survey pathogens and prevent and contain epidemics. ...
Rapid participatory research and project development is possible within a tightly controlled social context such as a prison. Having gained access, based on trust and mutual respect, external agents may then facilitate significant change. Given adequate support, incarcerated people with HIV/AIDS and limited medical access may be able to develop mutual care, social support and income-generating ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید