Securing Access to Complex Digital Artifacts – Towards a Controlled Processing Environment for Digital Research Data
Providing secured and restricted access to digital objects, especially access to digital research data, for a general audience poses new challenges to memory institutions. For instance, to protect individuals, only anonymized or pseudonymized data should be released to a general audience. Standard procedures have been established over time to cope with privacy issues of non-interactive digital objects like text, audio and video. Appearances of identifiers and potentially also quasi-identifiers were removed by a simple overlay, e.g. in text documents such appearances were simply blackened out. Today’s digital artifacts, especially research data, have complex, non-linear and even interactive manifestations. Thus, a different approach to securing access to complex digital artifacts is required. This paper presents an architecture and technical methods to control access to digital research data.
KeywordsAccess Policy General Audience Digital Artifact Emulation Component Statewide Health Planning
Unable to display preview. Download preview PDF.
- 1.Carlisle, D.M., Rodrian, M.L., Diamond, C.L.: California inpatient data reporting manual, medical information reporting for california (5th ed). Tech. rep., Office of Statewide Health Planning and Development (2007)Google Scholar
- 4.Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: A survey of recent developments. ACM Comput. Surv. 42(4), 14:1–14:53 (2010)Google Scholar
- 5.Wohlgemuth, S., Echizen, I., Sonehara, N., Müller, G.: Tagging disclosures of personal data to third parties to preserve privacy. In: Rannenberg, K., Varadharajan, V., Weber, C. (eds.) Security and Privacy – Silver Linings in the Cloud. IFIP AICT, vol. 330, pp. 241–252. Springer, Heidelberg (2010)Google Scholar
- 6.Rechert, K., Valizada, I., von Suchodoletz, D., Latocha, J.: bwFLA – a functional approach to digital preservation. PIK – Praxis der Informationsverarbeitung und Kommunikation 35(4), 259–267 (2012)Google Scholar
- 7.von Suchodoletz, D., Rechert, K., Welte, R., van den Dobbelsteen, M., Roberts, B., van der Hoeven, J., Schroder, J.: Automation of flexible migration workflows. International Journal of Digital Curation 2(2) (2010)Google Scholar