Remote Access in Action – Design and Implementation of a Demonstration Remote Access System
نویسنده
چکیده
Remote Access is a relatively new approach to balancing access and use of data with privacy and confidentiality protection. Its novelty lies in the fact that it is implemented as a confidentialisation process on analysis outputs, rather than on inputs as in traditional statistical disclosure control methods. This paper describes the design of a fully automated remote access system in which queries are restricted via a menu-driven web-based interface, analyses are run on unconfidentialised data, and outputs are modified or filtered to protect confidentiality. The paper discusses the implementation of the methods in the CSIRO demonstration software Privacy-Preserving Analytics (PPA). To illustrate the effect of the restrictions and modification filters on common statistical analyses, the paper provides examples enabling a side-by-side comparison of traditional analysis outputs with outputs of the PPA remote access system for exploratory data analysis and survival analysis. An example of PPA system output for linear regression is also provided, without corresponding traditional output due to space limitations. The paper gives an overview of the methodological challenges which arguably need to be addressed before data custodians can have confidence that remote access adequately addresses the balance between data use and confidentiality in real-world situations.
منابع مشابه
Remote Hospital Reform in the Context of Australian Health Care Reforms
Public hospitals play an important role in the delivery of essential healthcare in Australia as in many countries. The Australian Government has in the recent years implemented national healthcare reform to improve the performance of and access to public hospital services. This reform extends to all public hospitals including remote hospitals. However, there is limited information on how reform...
متن کاملAn automatic test case generator for evaluating implementation of access control policies
One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...
متن کاملInvestigating the Level of Access to Hospital Medical Facilities Using the Geographical Information System (GIS) in Yazd, Iran, in 2019
Introduction: proper geographical access to hospital medical facilities will increase people’s visits to receive non-emergency services and no delay in providing emergency services. This research aimed to determine the level of access to hospital medical facilities with Geographical Information System in Yazd in 2019. Methods: This research is descriptive and applied. The required data for ana...
متن کاملDesign and Evaluation of a Switch
Cache coherent non-uniform memory access (CC-NUMA) multiprocessors provide a scal-able design for shared memory but they continue to suuer from large remote memory access latencies due to comparatively slow memory technology and data transfer latencies in the in-terconnection network. In this paper, we propose a novel hardware caching technique, called switch cache, to improve the remote memory...
متن کاملOptimizing Design of Stand-alone Hybrid Solar Micro-CHP Systems Using LUS Based Particle Swarm Optimization Algorithm
Utilizing the combined cooling, heating and power generation (CHP) systems to produce cooling, heat and electricity is growing rapidly due to their high efficiency and low emissions in commercial and industrial applications. In conventional CHP systems the deficit of the system power can be purchased from the grid. However, this system cannot be used as the standalone application. The hybrid so...
متن کامل