A Review of Trusted Broker Architectures for Data Sharing
Talburt, John R.
MetadataShow full item record
Sharing data across organizational boundaries must strike a balance between the competing data quality dimensions of access and security. Without access to data, it can't be used and, consequently, is of no value. At the same time, uncontrolled access to data, especially sensitive personal data, can result in dire legal and ethical consequences. This paper discusses the trade-offs between security and access for three styles of trusted broker architectures in hopes that this will provide guidance for organizations trying to implement data sharing systems.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
NPS Report NumberSYM-AM-18-106
Showing items related by title, author, creator and subject.
Possible Geographical Barriers to Trauma Center Access for Vulnerable Patients in the United States: An Analysis of Urban and Rural Communitie Hsia, Renee; Shen, Yu-Chu (American Medical Association, 2011-01);Objective—To study whether traditionally vulnerable populations have worse geographic access to trauma centers. Design—A cross-sectional analysis using data from the American Hospital Association Annual Survey from 2005 ...
LaFrenier, Kevin J. (Monterey, California. Naval Postgraduate School, 2011-09);There are currently no access control methods to permit personnel, such as military members, government agencies, or first-responders, access to restricted resources and applications that are only available when certain ...
Mack, William R. (Monterey, CA; Naval Postgraduate School, 2020-09);This thesis examines the lawful access challenge that law enforcement and intelligence agencies face when seeking to obtain communications and mobile electronic devices that cannot be penetrated and that include strong ...