نتایج جستجو برای: mutual trust

تعداد نتایج: 100848  

2015
Megan M. McLaughlin Louis Simonson Xia Zou Li Ling Joseph D. Tucker

BACKGROUND Patient trust in physicians is a critical determinant of health seeking behaviors, medication adherence, and health outcomes. A crisis of interpersonal trust exists in China, extending throughout multiple social spheres, including the healthcare system. At the same time, with increased migration from Africa to China in the last two decades, Chinese physicians must establish mutual tr...

2004
Xin Li Mizuhito Ogawa

We propose Proxy Certificate Trust List (PCTL) to efficiently record delegation traces for grid computing. Our security solution based on PCTL provides functions as follows: (1) On-demand inquiries about real time delegation information of grid computing underway; (2) Lightweight mutual authentication that is beneficial for proxy nodes with limited computation power as wireless devices in mobil...

Journal: :Computer Communications 2015
Luca Calderoni Paolo Palmieri Dario Maio

Location-aware applications are one of the biggest innovations brought by the smartphone era, and are effectively changing our everyday lives. But we are only starting to grasp the privacy risks associated with constant tracking of our whereabouts. In order to continue using location-based services in the future without compromising our privacy and security, we need new, privacy-friendly applic...

Journal: :Bio Systems 2010
Marco Tomassini Enea Pestelacci Leslie Luthi

Using a new dynamical network model of society in which pairwise interactions are weighted according to mutual satisfaction, we show that cooperation is the norm in the hawks-doves game when individuals are allowed to break ties with undesirable neighbors and to make new acquaintances in their extended neighborhood. Moreover, cooperation is robust with respect to rather strong strategy perturba...

2014
Srinivas Kolli

We introduce a model for provable data possession (PDP) that allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it. The model generates probabilistic proofs of possession by sampling random sets of blocks from the server, which drastically reduces I/O costs. The client maintains a constant amount of metadata to ve...

Journal: :iranian journal of management studies 2014
hassanali aghajani fereshteh amin mohsen abasgholipour

interorganizational coordination (ioc) is a critical part of planning, because planning mostly involves multiple organizational interactions. investment and employment are considered as multi-dimensional and multi-sectional challenges that the management of them requires intersectional and interorganizational cooperation. the goal of this research is the investigation of the interorganizational...

2011
Renjian Feng Xiaofeng Xu Xiang Zhou Jiangwen Wan

For wireless sensor networks (WSNs), many factors, such as mutual interference of wireless links, battlefield applications and nodes exposed to the environment without good physical protection, result in the sensor nodes being more vulnerable to be attacked and compromised. In order to address this network security problem, a novel trust evaluation algorithm defined as NBBTE (Node Behavioral St...

2013
Anders Fongen Federico Mancini

The use of Identity Management (IdM) may leverage the trust in a distributed Publish-Subscribe (PubSub) system. An IdM provides mutual authentication between publishers, subscribers and message routers, enforces access control on message delivery and integrity control of message content. Access control is also a means to reduce traffic in a PubSub network since unauthorized message traffic will...

2015
Joanne M. Horn

Concerns of infectious disease outbreaks have recently reached the forefront of global security issues and resulted in new engagements among foreign science advisors, host country scientists, and officials. There are lessons to be learned from the numerous organizations working in global regions of endemic disease who are building capacity to survey pathogens and prevent and contain epidemics. ...

Journal: :Tropical doctor 2001
D Townsend

Rapid participatory research and project development is possible within a tightly controlled social context such as a prison. Having gained access, based on trust and mutual respect, external agents may then facilitate significant change. Given adequate support, incarcerated people with HIV/AIDS and limited medical access may be able to develop mutual care, social support and income-generating ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید