References
- Akula, M. 2019. Defenders’ Guide to Container Infrastructure Security.
LISA19 . Portland, Oregon, USA: USENIX Association. - Barkow, I, Leopold, T, Raab, M, Schiller, D, Wenzig, K, Blossfeld, H-P and Rittberger, M. 2011. 20 remoteneps: Data Dissemination in a Collaborative Workspace. Zeitschrift für Erziehungswissenschaft [Online], 14(2): 315–325. DOI: 10.1007/s11618-011-0192-5
- Brandt, N, Griem, L, Herrmann, C, Schoof, E, Giovanna, T, Zhao, Y, Zschumme, P and Selzer, M. 2021. Kadi4Mat: A Research Data Infrastructure for Materials Science. Data Science Journal [Online], 20(1). DOI: 10.5334/dsj-2021-008
- Cuggia, M and Combes, S. 2019. The French Health Data Hub and the German Medical Informatics Initiatives: Two National Projects to Promote Data Sharing in Healthcare. EN. Yearbook of Medical Informatics [Online], 28(1), 195: 195–202. DOI: 10.1055/s-0039-1677917
- Desai, T, Ritchie, F and Welpton, R. 2016. Five Safes: Designing data access for research [Online]. Economics Working Paper Series 1601. DOI: 10.13140/RG.2.1.3661.1604
- Dood, R. 2020. Remote Access to Official Microdata. 8th Conference for Social and Economic Data (KSWD). Berlin, Germany.
- Ferraiolo, D and Kuhn, R. 1992. Role-Based Access Controls. Proceedings of the 15th National Computer Security Conference, pp. 554–563. Baltimore, Maryland, USA.
- Garfinkel, SL, et al. 2015. De-identification of personal information. National institute of standards and technology. DOI: 10.6028/NIST.IR.8053
- Hao, F, Lakshman, TV, Mukherjee, S and Song, H. 2010. Secure cloud computing with a virtualized network infrastructure. Proceedings of the 2nd usenix conference on hot topics in cloud computing, p. 16. Hot-Cloud’10. Boston, MA:
USENIX Association . - Jones, KH, Ford, DV, Jones, C, Dsilva, R, Thompson, S, Brooks, CJ, Heaven, ML, Thayer, DS, McNerney, CL and Lyons, RA. 2014. A case study of the Secure Anonymous Information Linkage (SAIL) Gateway: A privacy-protecting remote access system for health-related research and evaluation. Journal of Biomedical Informatics [Online], 50. Special Issue on Informatics Methods in Medical Privacy, pp. 196–204. DOI: 10.1016/j.jbi.2014.01.003
- Knapp, KJ, Denney, GD and Barner, ME. 2011. Key Issues in Data Center Security: An Investigation of Government Audit Reports. Government Information Quarterly [Online], 28(4): 533–541. DOI: 10.1016/j.giq.2010.10.008
- Kostiainen, K, Dhar, A and Capkun, S. 2020. Dedicated Security Chips in the Age of Secure Enclaves. IEEE Security & Privacy [Online], 18(5): 38–46. DOI: 10.1109/MSEC.2020.2990230
- Kulkarni, K and Michels, J-E. 2012. Temporal Features in SQL:2011 [Online], 41(3): 34–43. DOI: 10.1145/2380776.2380786
- Lafaye, J, Gross-Amblard, D, Constantin, C and Guerrouani, M. 2008. Watermill: An Optimized Fingerprinting System for Databases under Constraints. IEEE Transactions on Knowledge and Data Engineering [Online], 20(4). DOI: 10.1109/TKDE.2007.190713
- Lee, D, Kohlbrenner, D, Shinde, S, Asanović, K and Song, D. 2020. Keystone: An Open Framework for Architecting Trusted Execution Environments. Proceedings of the Fifteenth European Conference on Computer Systems [Online], EuroSys ‘20. Heraklion, Greece:
Association for Computing Machinery . DOI: 10.1145/3342195.3387532 - Li, N, Li, T and Venkatasubramanian, S. 2007. T-closeness: privacy beyond k-anonymity and l-diversity. 2007 IEEE 23rd international conference on data engineering, pp. 106–115.
IEEE . DOI: 10.1109/ICDE.2007.367856 - Li, Y, Swarup, V and Jajodia, S. 2005. Fingerprinting Relational Databases: Schemes and Specialties. Transactions on Dependable and Secure Computing [Online], 2(1). DOI: 10.1109/TDSC.2005.12
- Machanavajjhala, A, Kifer, D, Gehrke, J and Venkitasubramaniam, M. 2007. L-diversity: privacy beyond k-anonymity. Acm transactions on knowledge discovery from data (tkdd), 1(1): 3-es. DOI: 10.1145/1217299.1217302
- Mousa, A, Karabatak, M and Mustafa, T. 2020. Database security threats and challenges. 8th International Symposium on Digital Forensics and Security (ISDFS), pp. 1–5. DOI: 10.1109/ISDFS49300.2020.9116436
- Navaz, A, Prabhadevi, C and Sangeetha, V. 2013. Data grid concepts for data security in distributed computing. Arxiv preprint arxiv:1308.6058.
- Palmgren, J, Rasmussen, T, Bengtström, M, Kahri, P, Ebbing, M, Henrichsen, B, Nilsson, M and Høst, G. 2019. A vision of a Nordic secure digital infrastructure for health data: The Nordic Commons. (Technical report). Oslo: Nordic Council of Ministers, NordForsk.
- Peisert, S. 2021. An Examination and Survey of Data Confidentiality Issues and Solutions in Academic Research Computing.
https://escholarship.org/uc/item/7cz7m1ws . Online; accessed 22 December 2021. - Piec, M and Rauber, A. 2014. Real-Time Screen Watermarking Using Overlaying Layer. 2014 Ninth International Conference on Availability, Reliability and Security [Online], pp. 561–570. DOI: 10.1109/ARES.2014.83
- Popper, N, Endel, F, Mayer, R, Bicher, M and Glock, B. 2017. Planning Future Health: Developing Big Data and System Modelling Pipelines for Health System Research. Simulation Notes Europe [Online], 27(4): 203–208. DOI: 10.11128/sne.27.tn.10396
- Provos, N, Friedl, M and Honeyman, P. 2003. Preventing Privilege Escalation. Proceedings of the 12th USENIX Security Symposium, pp. 231–241.
- Rauber, A, Asmi, A, van Uytvanck, D and Proell, S. 2015. Data Citation of Evolving Data: Recommendations of the Working Group on Data Citation (WGDC) [Online]. DOI: 10.15497/RDA00016
- Rauber, A, Asmi, A, van Uytvanck, D and Proell, S. 2016. Identification of Reproducible Subsets for Data Citation, Sharing and Re-Use. Bulletin of the IEEE Technical Committe on Digital Libraries (TCDL) [Online], 12(1). DOI: 10.5281/zenodo.4048304
- Ristenpart, T, Tromer, E, Shacham, H and Savage, S. 2009. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. Proceedings of the 16th acm conference on computer and communications security, pp. 199–212. DOI: 10.1145/1653662.1653687
- Sidorov, V and Ng, WK. 2015.
Transparent data encryption for data-in-use and data-at-rest in a cloudbased database-as-a-service solution . 2015 IEEE world congress on services, pp. 221–228. IEEE. DOI: 10.1109/SERVICES.2015.40 - Skopek, J, Koberg, T and Blossfeld, H-P. 2016.
RemoteNEPS – An Innovative Research Environment . In: Blossfeld, H-P, von Maurice, J, Bayer, M and Skopek, J (eds.), Methodological Issues of Longitudinal Surveys: The Example of the National Educational Panel Study [Online], pp. 611–626. Springer. DOI: 10.1007/978-3-658-11994-2_34 - Song, Y, Shi, W, Qin, B and Liang, B. 2020. A collective attestation scheme towards cloud system. Cluster computing, pp. 1–12. DOI: 10.1007/s10586-020-03174-3
- Sweeney, L. 2002. K-anonymity: a model for protecting privacy. International journal of uncertainty, fuzziness and knowledge-based systems, 10(5): 557–570. DOI: 10.1142/S0218488502001648
- United Kingdom Health Data Research Alliance. 2020. Trusted Research Environments [Online]. URL:
https://ukhealthdata.org/projects/aligning-approach-to-trusted-research-environments/ . Accessed September 2020. Version 2.0. - Weise, M, Michlits, C, Staudinger, M, Gergely, E, Stytsenko, K, Ganguly, R and Rauber, A. 2021. FDA-DBRepo: A Data Preservation Repository Supporting FAIR Principles, Data Versioning and Reproducible Queries. Proceedings of the 17th International Conference on Digital Preservation, p. 34. Beijing, China:
iPRES . - Weise, M and Rauber, A. 2021. A Data-Visiting Infrastructure for Providing Access to Preserved Databases that Cannot be Shared or Made Publicly Accessible. Proceedings of the 17th International Conference on Digital Preservation, p. 51. Beijing, China:
iPRES . - Williamson, E, Walker, AJ, Bhaskaran, K, Bacon, S, Bates, C, Morton, CE, Curtis, HJ, Mehrkar, A, Evans, D, Inglesby, P, Cockburn, J, McDonald, HI, MacKenna, B, Tomlinson, L, Douglas, IJ, Rentsch, CT, Mathur, R, Wong, A, Grieve, R, Harrison, D, Forbes, H, Schultze, A, Croker, R, Parry, J, Hester, F, Harper, S, Perera, R, Evans, S, Smeeth, L, Goldacre, B and Collaborative, TO. 2020. OpenSAFELY: factors associated with COVID-19-related hospital death in the linked electronic health records of 17 million adult NHS patients. Medrxiv [Online]. DOI: 10.1101/2020.05.06.20092999
- Zhang, Y, Juels, A, Reiter, MK and Ristenpart, T. 2012. Cross-vm side channels and their use to extract private keys. Proceedings of the 2012 acm conference on computer and communications security, pp. 305–316. DOI: 10.1145/2382196.2382230
