Data Use & Researcher Identity

Slides:



Advertisements
Similar presentations
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Advertisements

Copyright © 2005, SAS Institute Inc. All rights reserved. User Authentication and Single Sign-on Across the SAS ® 9 Platform Larry Noe and Scott Sweetland,
ELAG Trondheim Distributed Access Control - BIBSYS and the FEIDE solution Sigbjørn Holmslet, BIBSYS, Norway Ingrid Melve, UNINET, Norway.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation May 2012, Kish Island, I.R.IRAN.
2009 Architecture Plan Overview 2009 Architecture Plan Overview.
1. INDEX 2 A signature is a handwritten depiction of someone’s name or nickname that a person writes on documents as proof of identity and intent. Signature.
Security systems need to be able to distinguish the “white hats” from the “black hats”. This all begins with identity. What are some common identifiers.
Functional Model Workstream 1: Functional Element Development.
© 2011 Aristotle, Inc. All Rights Reserved. Why Johnny Can't Play: Creating Websites for Grown Ups.
Private and Confidential. Levels of Identity Verification Is this person who they claim to be? Knowledge based Authentication Is this a real identity?
Web Policy Zeitgeist Panel SWPW 2005 – Galway, Ireland Piero Bonatti, November 7th, 2005.
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
Configuration Management Issues in IHE Asuman Dogac, SRDC, METU, Turkey
Semantic Interoperability Berlin, 25 March 2008 Semantically Enhanced Resource Allocator Marc de Palol Jorge Ejarque, Iñigo Goiri, Ferran Julià, Jordi.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
De-identification: A Critical Success Factor in Clinical and Population Research Steven Merahn MD Dee Lang, RHIT Prepared for 2007 APIII Pittsburgh, PA.
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
Practices in Security Bruhadeshwar Bezawada. Algorithms, Key Sizes and Strengths.
Intelligence Reform: The Process Begins National Association for Public Health Statistics and Information Systems June 7, 2005.
Best Practices in Enterprise IAM Liza Lowery Massey Montana Government IT Conference December 6, 2007.
Access Control / Authenticity Michael Sheppard 11/10/10.
The Sybil attack “One can have, some claim, as many electronic persons as one has time and energy to create.” – Judith S. Donath.
Clinical research data interoperbility Shared names meeting, Boston, Bosse Andersson (AstraZeneca R&D Lund) Kerstin Forsberg (AstraZeneca R&D.
Transparency in Forest-Scale Restoration Action Plan Development: Opening the Black Box A CASE STUDY FROM THE BEAVERHEAD-DEERLODGE NATIONAL FOREST.
Guided by : VIPUL GAJJAR Prepared by: JIGAR KAKADIYA.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
Getting started with Accurately Storing Data
Visual Studio Database Tools (aka SQL Server Data Tools)
Firewall Issues Research Group GGF-15 Oct Boston, Ma Leon Gommans - University of Amsterdam Inder Monga - Nortel Networks.
Grid Security.
MyIT: A Road to Enhancing UNM IT Workload Visibility
Geo Rights Management (GeoRM) Hats and Doors?
What are the key components of your robot?
Information mediators
Module 8: Securing Network Traffic by Using IPSec and Certificates
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
APNIC Trial of Certification of IP Addresses and ASes
2. Authentication & Message Authentication
Chapter 8 Data Base Security
Pooja programmer,cse department
Principal Product Manager Oracle Data Science Platform
Visual Studio Database Tools (aka SQL Server Data Tools)
Security & .NET 12/1/2018.
Computer Fundamentals
Practical Software Engineering
Imran Hussain University of Management and Technology (UMT)
#1 #2 #3 Solve: 21 ÷ Solve: Solve: 3 (7 + 4) 12 ÷ 3 – 2 + 1
Database Design and Development
Module 8: Securing Network Traffic by Using IPSec and Certificates
What are IAM Key Processes.
Title Date: NAME: Phone: Institute: CONFIDENTIAL.
Leveraging online technology for purposes of remote monitoring throughout the protocol lifecycle Dee Blumberg, Donna Brown, Ashley Case, Kayla Daniels,
Security and identity (Network Access Protection, Parental Controls)
ONLINE SECURE DATA SERVICE
(Authentication / Authorization)
Actively Learning Ontology Matching via User Interaction
Electronic Payment Security Technologies
UNGP Methods & Developer Services
Chapter 1 Assessment Basics
Information - the lifeblood of the business
A Model For Network Security
What is this course about?
Module 1.4 Vision for the Master Facility List
Database 2.
Evaluate the integral {image}
Presentation transcript:

Data Use & Researcher Identity

Data Use & Researcher Identity Define, develop, and deploy end-to-end systems to: Validate that a person is a bona fide researcher in the real world, and establish their electronic researcher identity to query and use datasets accessible to them Describe data use restrictions on datasets, and researcher’s purpose in using them, so that access decisions can be computed automatically

Data Use & Researcher Identity Integrate Library Cards legacy task team Define identity-proofing process to evaluate real-world bona fide researcher status, and attach to electronic identity Define protocols and standards for authenticating and validating researcher claims Deploy and interoperate with key driver projects

Data Use & Researcher Identity Integrate Consent Codes & ADA-M legacy task teams Define standard ontology terms for describing data use constraints and research intent Define standard algorithm for matching constraints & intent for querying or granting access Apply to driver project use cases

Data Use & Researcher Identity Q&A