- Full text PDF available (0)
The practicality of existing techniques for processing encrypted data stored in untrusted cloud environments is a limiting factor in the adoption of cloud-based applications. Both public and private sector organizations are reluctant to push their data to the cloud due to strong requirements for security and privacy of their data. In particular,… (More)
OBJECTIVE To describe patients' perceptions of electronic (e)-prescribing and its impact on patients' quality of care, interactions with prescribers and pharmacists, and engagement in health care overall, particularly in regard to medication use. METHODS Semistructured, one-on-one interviews with 12 patients. RESULTS Patients were generally unfamiliar… (More)
Cloud services are on-demand services provided to end-users over the Internet and hosted by cloud service providers. A cloud service consists of a set of interacting applications/processes running on one or more interconnected VMs. Organizations are increasingly using cloud services as a cost-effective means for outsourcing their IT departments. However,… (More)
C-SEC (Cyber-SCADA Evaluation Capability) is a new technology developed to secure our nation's critical infrastructures. C-SEC provides an evaluation software tool, laboratory testing and a framework that enables the proper and efficient evaluation of Cyber Security technologies for SCADA networks and its industrial components.