A Review of Trusted Broker Architectures for Data Sharing
Talburt, John R.
MetadataShow full item record
Sharing data across organizational boundaries must strike a balance between the competing data quality dimensions of access and security. Without access to data, it can't be used and, consequently, is of no value. At the same time, uncontrolled access to data, especially sensitive personal data, can result in dire legal and ethical consequences. This paper discusses the trade-offs between security and access for three styles of trusted broker architectures in hopes that this will provide guidance for organizations trying to implement data sharing systems.
NPS Report NumberSYM-AM-18-106
Showing items related by title, author, creator and subject.
Possible Geographical Barriers to Trauma Center Access for Vulnerable Patients in the United States: An Analysis of Urban and Rural Communitie Hsia, Renee; Shen, Yu-Chu (American Medical Association, 2011-01);Objective—To study whether traditionally vulnerable populations have worse geographic access to trauma centers. Design—A cross-sectional analysis using data from the American Hospital Association Annual Survey from 2005 ...
LaFrenier, Kevin J. (Monterey, California. Naval Postgraduate School, 2011-09);There are currently no access control methods to permit personnel, such as military members, government agencies, or first-responders, access to restricted resources and applications that are only available when certain ...
Thompson, Steven K. (Monterey, California: Naval Postgraduate School, 2017-06);The ability for Marines to access Global Combat Support System-Marine Corps (GCSS-MC) through mobile devices such as tablets and smart phones would greatly improve their productivity. Mobile device access to GCSS-MC would ...