Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 3 de 3
Filtrar
Mais filtros

Base de dados
Tipo de documento
Intervalo de ano de publicação
1.
Stud Health Technol Inform ; 281: 496-497, 2021 May 27.
Artigo em Inglês | MEDLINE | ID: mdl-34042618

RESUMO

There is a demand for a pseudonymization service by a Trusted Third Party (TTP), that features clientside pseudonymization. We propose a system using modern web technology, which requires no installation but can handle data preprocessing and pseudonymization safely on the client.


Assuntos
Segurança Computacional , Confidencialidade , Humanos , Tecnologia , Confiança
2.
Stud Health Technol Inform ; 264: 1458-1459, 2019 Aug 21.
Artigo em Inglês | MEDLINE | ID: mdl-31438180

RESUMO

Standardised, automated quality reports were generated at three pilot locations of the decentralized translational research network DKTK with separated local data warehouses (LDW), for assessing syntactic conformity against common data element definitions deposited in a central metadata repository (MDR). Deviations in the LDW were categorised, and locally corrected. Comparisons of reports from two time points confirm a major improvement in data quality in terms of syntactic conformity, an essential prerequisite for network-wide data integration.


Assuntos
Confiabilidade dos Dados , Pesquisa Translacional Biomédica , Elementos de Dados Comuns , Data Warehousing , Metadados
3.
PLoS One ; 13(9): e0202752, 2018.
Artigo em Inglês | MEDLINE | ID: mdl-30188932

RESUMO

A growing framework of legal and ethical requirements limit scientific and commercial evaluation of personal data. Typically, pseudonymization, encryption, or methods of distributed computing try to protect individual privacy. However, computational infrastructures still depend on human system administrators. This introduces severe security risks and has strong impact on privacy: system administrators have unlimited access to the computers that they manage including encryption keys and pseudonymization-tables. Distributed computing and data obfuscation technologies reduce but do not eliminate the risk of privacy leakage by administrators. They produce higher implementation effort and possible data quality degradation. This paper proposes the Trusted Server as an alternative approach that provides a sealed and inaccessible computational environment in a cryptographically strict sense. During operation or by direct physical access to storage media, data stored and processed inside the Trusted Server can by no means be read, manipulated or leaked, other than by brute-force. Thus, secure and privacy-compliant data processing or evaluation of plain person-related data becomes possible even from multiple sources, which want their data kept mutually secret.


Assuntos
Confidencialidade , Armazenamento e Recuperação da Informação/métodos , Algoritmos , Segurança Computacional , Computadores , Registros de Saúde Pessoal , Humanos
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA