Data Management of Confidential Data

نویسندگان

  • Carl Lagoze
  • William C. Block
  • Jeremy Williams
  • John M. Abowd
  • Lars Vilhuber
چکیده

Social science researchers increasingly make use of data that is confidential because it contains linkages to the identities of people, corporations, etc. The value of this data lies in the ability to join the identifiable entities with external data, such as genome data, geospatial information, and the like. However, the confidentiality of this data is a barrier to its utility and curation, making it difficult to fulfil US federal data management mandates and interfering with basic scholarly practices, such as validation and reuse of existing results. We describe the complexity of the relationships among data that span a public and private divide. We then describe our work on the CED AR prototype, a first step in providing researchers with a tool that spans this divide and makes it possible for them to search, access and cite such data. International Journal of Digital Curation (2013), 8(1), 265–278. http://dx.doi.org/10.2218/ijdc.v8i1.259 The International Journal of Digital Curation is an international journal committed to scholarly excellence and dedicated to the advancement of digital curation across a wide range of sectors. The IJDC is published by UKOLN at the University of Bath and is a publication of the Digital Curation Centre. ISSN: 1746-8256. URL: http://www.ijdc.net/ 266 Data Management doi:10.2218/ijdc.v8i1.259

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparison of the Efficiency of Data Mining Algorithms in Predicting the Diagnosis of Diabetes

Background: Diabetes is one of the major health problems in Iran and about 4.6 million adults suffer from this disease. Poor diagnosis of this disease has caused half of this number to be unaware of their disease. In recent years, along with the use of computers in data analysis and storage, the volume and complexity of data has increased dramatically. Methods: In health organizations, data pl...

متن کامل

Novel Approach to Information Security Management of Confidential and Propriety Information using Image Steganography

Today there is a paradigm shift in the way we look at securing assets. In a time where knowledge is the most important asset there is need to look at securing these assets in a different way. Based on the review literature it has been observed that laptop stolen/lost can be possible threat to leakage of confidential data. Most of the stolen laptops are never recovered. Though data backups are a...

متن کامل

کارآیی سیستم خود حذفی محرمانه بر سلامتی خون در اهداءکنندگان خون استان بوشهر

 Background: Blood safety is one of the basic goals of blood centers in the world. Confidential self-exclusion system is used with routine diagnostic tests to detect transfusion transmitted infections. This study aimed to investigate efficacy of these systems onimprovement of blood safety in Bushehr Blood Centers. Methods: In this retrospective study the rate of confidential self-exclu...

متن کامل

An Adaptive Privacy Management System for Data Repositories

This paper addresses the problem of dealing with privacy management of confidential data stored by enterprises and other organisations. We describe an innovative solution based on an adaptive privacy management system. In this system (arbitrarily complex) data structures are retrieved from standard data repositories, in such a way that parts of these data are obfuscated and associated with priv...

متن کامل

Encrypted storage of medical data on a grid.

OBJECTIVES In this article we present grids as an architecture for medical image processing and health-care networks. We argue that confidential patient data should not be stored unprotected on a grid and explain why access control systems alone do not offer sufficient protection. The objective of our work is to propose a method that complements access control systems on a grid architecture and...

متن کامل

Towards Confidential Cloud - Based Image Processing

Message from the Review Board Directors 2 Towards Confidential Cloud-Based Image Processing 3 A short review for “2DCrypt: Image Scaling and Cropping in Encrypted Domains” (Edited by Pradeep K. Atrey) Managing QoE in 5G Wireless Networking with Personalized Data 5 A short review for “A Data-Driven Architecture for Personalized QoE Management in 5G Wireless Networks” (Edited by Wei Wang) Data-As...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJDC

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2013