Have a personal or library account? Click to login
OSSDIP: Open Source Secure Data Infrastructure and Processes Supporting Data Visiting Cover

OSSDIP: Open Source Secure Data Infrastructure and Processes Supporting Data Visiting

Open Access
|Feb 2022

References

  1. Akula, M. 2019. Defenders’ Guide to Container Infrastructure Security. LISA19. Portland, Oregon, USA: USENIX Association.
  2. Barkow, I, Leopold, T, Raab, M, Schiller, D, Wenzig, K, Blossfeld, H-P and Rittberger, M. 2011. 20 remoteneps: Data Dissemination in a Collaborative Workspace. Zeitschrift für Erziehungswissenschaft [Online], 14(2): 315325. DOI: 10.1007/s11618-011-0192-5
  3. Brandt, N, Griem, L, Herrmann, C, Schoof, E, Giovanna, T, Zhao, Y, Zschumme, P and Selzer, M. 2021. Kadi4Mat: A Research Data Infrastructure for Materials Science. Data Science Journal [Online], 20(1). DOI: 10.5334/dsj-2021-008
  4. Cuggia, M and Combes, S. 2019. The French Health Data Hub and the German Medical Informatics Initiatives: Two National Projects to Promote Data Sharing in Healthcare. EN. Yearbook of Medical Informatics [Online], 28(1), 195: 195202. DOI: 10.1055/s-0039-1677917
  5. Desai, T, Ritchie, F and Welpton, R. 2016. Five Safes: Designing data access for research [Online]. Economics Working Paper Series 1601. DOI: 10.13140/RG.2.1.3661.1604
  6. Dood, R. 2020. Remote Access to Official Microdata. 8th Conference for Social and Economic Data (KSWD). Berlin, Germany.
  7. Ferraiolo, D and Kuhn, R. 1992. Role-Based Access Controls. Proceedings of the 15th National Computer Security Conference, pp. 554563. Baltimore, Maryland, USA.
  8. Garfinkel, SL, et al. 2015. De-identification of personal information. National institute of standards and technology. DOI: 10.6028/NIST.IR.8053
  9. Hao, F, Lakshman, TV, Mukherjee, S and Song, H. 2010. Secure cloud computing with a virtualized network infrastructure. Proceedings of the 2nd usenix conference on hot topics in cloud computing, p. 16. Hot-Cloud’10. Boston, MA: USENIX Association.
  10. Jones, KH, Ford, DV, Jones, C, Dsilva, R, Thompson, S, Brooks, CJ, Heaven, ML, Thayer, DS, McNerney, CL and Lyons, RA. 2014. A case study of the Secure Anonymous Information Linkage (SAIL) Gateway: A privacy-protecting remote access system for health-related research and evaluation. Journal of Biomedical Informatics [Online], 50. Special Issue on Informatics Methods in Medical Privacy, pp. 196204. DOI: 10.1016/j.jbi.2014.01.003
  11. Knapp, KJ, Denney, GD and Barner, ME. 2011. Key Issues in Data Center Security: An Investigation of Government Audit Reports. Government Information Quarterly [Online], 28(4): 533541. DOI: 10.1016/j.giq.2010.10.008
  12. Kostiainen, K, Dhar, A and Capkun, S. 2020. Dedicated Security Chips in the Age of Secure Enclaves. IEEE Security & Privacy [Online], 18(5): 3846. DOI: 10.1109/MSEC.2020.2990230
  13. Kulkarni, K and Michels, J-E. 2012. Temporal Features in SQL:2011 [Online], 41(3): 3443. DOI: 10.1145/2380776.2380786
  14. Lafaye, J, Gross-Amblard, D, Constantin, C and Guerrouani, M. 2008. Watermill: An Optimized Fingerprinting System for Databases under Constraints. IEEE Transactions on Knowledge and Data Engineering [Online], 20(4). DOI: 10.1109/TKDE.2007.190713
  15. Lee, D, Kohlbrenner, D, Shinde, S, Asanović, K and Song, D. 2020. Keystone: An Open Framework for Architecting Trusted Execution Environments. Proceedings of the Fifteenth European Conference on Computer Systems [Online], EuroSys ‘20. Heraklion, Greece: Association for Computing Machinery. DOI: 10.1145/3342195.3387532
  16. Li, N, Li, T and Venkatasubramanian, S. 2007. T-closeness: privacy beyond k-anonymity and l-diversity. 2007 IEEE 23rd international conference on data engineering, pp. 106115. IEEE. DOI: 10.1109/ICDE.2007.367856
  17. Li, Y, Swarup, V and Jajodia, S. 2005. Fingerprinting Relational Databases: Schemes and Specialties. Transactions on Dependable and Secure Computing [Online], 2(1). DOI: 10.1109/TDSC.2005.12
  18. Machanavajjhala, A, Kifer, D, Gehrke, J and Venkitasubramaniam, M. 2007. L-diversity: privacy beyond k-anonymity. Acm transactions on knowledge discovery from data (tkdd), 1(1): 3-es. DOI: 10.1145/1217299.1217302
  19. Mousa, A, Karabatak, M and Mustafa, T. 2020. Database security threats and challenges. 8th International Symposium on Digital Forensics and Security (ISDFS), pp. 15. DOI: 10.1109/ISDFS49300.2020.9116436
  20. Navaz, A, Prabhadevi, C and Sangeetha, V. 2013. Data grid concepts for data security in distributed computing. Arxiv preprint arxiv:1308.6058.
  21. Palmgren, J, Rasmussen, T, Bengtström, M, Kahri, P, Ebbing, M, Henrichsen, B, Nilsson, M and Høst, G. 2019. A vision of a Nordic secure digital infrastructure for health data: The Nordic Commons. (Technical report). Oslo: Nordic Council of Ministers, NordForsk.
  22. Peisert, S. 2021. An Examination and Survey of Data Confidentiality Issues and Solutions in Academic Research Computing. https://escholarship.org/uc/item/7cz7m1ws. Online; accessed 22 December 2021.
  23. Piec, M and Rauber, A. 2014. Real-Time Screen Watermarking Using Overlaying Layer. 2014 Ninth International Conference on Availability, Reliability and Security [Online], pp. 561570. DOI: 10.1109/ARES.2014.83
  24. Popper, N, Endel, F, Mayer, R, Bicher, M and Glock, B. 2017. Planning Future Health: Developing Big Data and System Modelling Pipelines for Health System Research. Simulation Notes Europe [Online], 27(4): 203208. DOI: 10.11128/sne.27.tn.10396
  25. Provos, N, Friedl, M and Honeyman, P. 2003. Preventing Privilege Escalation. Proceedings of the 12th USENIX Security Symposium, pp. 231241.
  26. Rauber, A, Asmi, A, van Uytvanck, D and Proell, S. 2015. Data Citation of Evolving Data: Recommendations of the Working Group on Data Citation (WGDC) [Online]. DOI: 10.15497/RDA00016
  27. Rauber, A, Asmi, A, van Uytvanck, D and Proell, S. 2016. Identification of Reproducible Subsets for Data Citation, Sharing and Re-Use. Bulletin of the IEEE Technical Committe on Digital Libraries (TCDL) [Online], 12(1). DOI: 10.5281/zenodo.4048304
  28. Ristenpart, T, Tromer, E, Shacham, H and Savage, S. 2009. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. Proceedings of the 16th acm conference on computer and communications security, pp. 199212. DOI: 10.1145/1653662.1653687
  29. Sidorov, V and Ng, WK. 2015. Transparent data encryption for data-in-use and data-at-rest in a cloudbased database-as-a-service solution. 2015 IEEE world congress on services, pp. 221228. IEEE. DOI: 10.1109/SERVICES.2015.40
  30. Skopek, J, Koberg, T and Blossfeld, H-P. 2016. RemoteNEPS – An Innovative Research Environment. In: Blossfeld, H-P, von Maurice, J, Bayer, M and Skopek, J (eds.), Methodological Issues of Longitudinal Surveys: The Example of the National Educational Panel Study [Online], pp. 611626. Springer. DOI: 10.1007/978-3-658-11994-2_34
  31. Song, Y, Shi, W, Qin, B and Liang, B. 2020. A collective attestation scheme towards cloud system. Cluster computing, pp. 112. DOI: 10.1007/s10586-020-03174-3
  32. Sweeney, L. 2002. K-anonymity: a model for protecting privacy. International journal of uncertainty, fuzziness and knowledge-based systems, 10(5): 557570. DOI: 10.1142/S0218488502001648
  33. United Kingdom Health Data Research Alliance. 2020. Trusted Research Environments [Online]. URL: https://ukhealthdata.org/projects/aligning-approach-to-trusted-research-environments/. Accessed September 2020. Version 2.0.
  34. Weise, M, Michlits, C, Staudinger, M, Gergely, E, Stytsenko, K, Ganguly, R and Rauber, A. 2021. FDA-DBRepo: A Data Preservation Repository Supporting FAIR Principles, Data Versioning and Reproducible Queries. Proceedings of the 17th International Conference on Digital Preservation, p. 34. Beijing, China: iPRES.
  35. Weise, M and Rauber, A. 2021. A Data-Visiting Infrastructure for Providing Access to Preserved Databases that Cannot be Shared or Made Publicly Accessible. Proceedings of the 17th International Conference on Digital Preservation, p. 51. Beijing, China: iPRES.
  36. Williamson, E, Walker, AJ, Bhaskaran, K, Bacon, S, Bates, C, Morton, CE, Curtis, HJ, Mehrkar, A, Evans, D, Inglesby, P, Cockburn, J, McDonald, HI, MacKenna, B, Tomlinson, L, Douglas, IJ, Rentsch, CT, Mathur, R, Wong, A, Grieve, R, Harrison, D, Forbes, H, Schultze, A, Croker, R, Parry, J, Hester, F, Harper, S, Perera, R, Evans, S, Smeeth, L, Goldacre, B and Collaborative, TO. 2020. OpenSAFELY: factors associated with COVID-19-related hospital death in the linked electronic health records of 17 million adult NHS patients. Medrxiv [Online]. DOI: 10.1101/2020.05.06.20092999
  37. Zhang, Y, Juels, A, Reiter, MK and Ristenpart, T. 2012. Cross-vm side channels and their use to extract private keys. Proceedings of the 2012 acm conference on computer and communications security, pp. 305316. DOI: 10.1145/2382196.2382230
Language: English
Submitted on: Aug 5, 2021
|
Accepted on: Jan 4, 2022
|
Published on: Feb 9, 2022
Published by: Ubiquity Press
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2022 Martin Weise, Filip Kovacevic, Nikolas Popper, Andreas Rauber, published by Ubiquity Press
This work is licensed under the Creative Commons Attribution 4.0 License.