28,510 Hits in 2.8 sec

Custodian-based information sharing

V. Jacobson, R. L. Braynard, T. Diebert, P. Mahadevan, M. Mosko, N. H. Briggs, S. Barber, M. F. Plass, I. Solis, E. Uzun, Byoung-Joon Lee, Myeong-Wuk Jang (+3 others)
2012 IEEE Communications Magazine  
We have recently developed Custodian-Based Information Sharing (CBIS), which allows simple, secure, and distributed information sharing between a user's devices, family, and friends.  ...  Custodian priorities offload the burden of mobile information production but do not benefit information consumers.  ... 
doi:10.1109/mcom.2012.6231277 fatcat:jcmjrfke7vgx3i4lt3vrbt62ga

Challenges in sharing of geospatial data by data custodians in South Africa

Sissiel E. Kay
2018 Proceedings of the ICA  
<br> This research is based on the current ten data themes selected by the Committee for Spatial Information and the organisations identified as the data custodians for these ten data themes.  ...  This requires geospatial data sharing to take place between the data custodian and the user.  ...  Assumptions The following assumption has been made with regard to sharing of digital geospatial data: • All of the data custodians that were identified by the Committee for Spatial Information are aware  ... 
doi:10.5194/ica-proc-1-60-2018 fatcat:mdm3ja3dmvc2jiqlrcmhyw3hb4

Challenges presented by a custodian-based medical record access system

Shaun D. Mehta
2019 CMAJ - Canadian Medical Association Journal  
Alternatively, a model that centralizes the custodian-based system could serve to remedy current issues with information access through a mandate to store all personal health information securely at the  ...  In a decentralized model, patients can act as their own custodians, accessing their health information in real time and being at liberty to share it with parties of their choosing, such as family and close  ... 
doi:10.1503/cmaj.72281 pmid:31358601 pmcid:PMC6663497 fatcat:ohcurom3lbhdpjxehchbhyy5m4

Governance Networks for Effective Custodians' Participation in The Sustainability of Langkawi as a Geopark

Geraldine K. L. Chan
2017 Kajian Malaysia  
Furthermore, such effective participation is based on shared views, shared values, shared norms and other shared aspects guided to some extend by basic network principles such as reciprocity and mutuality  ...  Effective custodian participation is best achieved through proper governance network system whereby the networks are established between at least two or more organisational and non-organisational custodians  ...  Figure 2 further shows network patterns based on shared values and shared norms for cooperation among the custodians that ensured the implementation of the carnival.  ... 
doi:10.21315/km2017.35.supp.1.6 fatcat:q5sr3mq3rbfjbd53pbm7qyyq7m

Memory accounting without partitions

Adam Wick, Matthew Flatt
2004 Proceedings of the 4th international symposium on Memory management - ISMM '04  
CONSUMER-BASED ACCOUNTING Without sharing, accounting is a simple extension of garbage collection.  ...  As in DrScheme, shared libraries are problematic, requiring either a great loss of information or a form of manual memory management.  ... 
doi:10.1145/1029873.1029888 dblp:conf/iwmm/WickF04 fatcat:g3rw2kujv5bvjik3ddyxtoep7e

Qualitative study on custodianship of human biological material and data stored in biobanks

Michiel Verlinden, Herman Nys, Nadine Ectors, Isabelle Huys
2016 BMC Medical Ethics  
Methods: Twenty-eight informants in the Benelux and Scandinavia were interviewed in order to capture the perspectives of experts and stakeholders in relation to the rights and obligations held by custodians  ...  Balancing the rights and obligations of custodians and applicants in relation to access to biobanks is of utmost importance to guarantee trust and confidence.  ...  Most informants agreed that a custodian of a biobank could request the sharing and return of research results.  ... 
doi:10.1186/s12910-016-0098-0 pmid:26926004 pmcid:PMC4772467 fatcat:dd6ewesdezh5xpdlvcbrs5tes4

Analysis of Data Use Registers published by health data custodians in the UK [article]

Nada Karrar, Shahriar Kabir Khan, Sinduja Manohar, Paola Quattroni, David Seymour, Susheel Varma
2021 medRxiv   pre-print
They typically contain information about the type of data being shared, the purpose, date of approval and name of organisation or individual using (or receiving) the data.  ...  by some data custodians across the United Kingdom to increase transparency of data use.  ...  to keep data use registers up to date and ensure accurate information is publicly shared.  ... 
doi:10.1101/2021.05.25.21257785 fatcat:qyegwqe3yvhhvihbrslluba67q

A Methodology to Perform Semi-automatic Distributed EHR Database Queries

Olga Fajarda, Luis Bastião Silva, Peter R. Rijnbeek, Michel Van Speybroeck, José Luis Oliveira
2018 Proceedings of the 11th International Joint Conference on Biomedical Engineering Systems and Technologies  
The exploration of these electronic health records (EHRs) is essential for clinical and pharmaceutical research and, therefore, solutions for secure sharing of information across different databases are  ...  In this paper, we present a methodology to perform semiautomatic queries over longitudinal clinical data repositories, where every data custodian maintains full control of data.  ...  Otherwise, the data custodian informs the study manager that they will not share the results. • Step 6 (SM): Result integration and reporting -After all data custodians complete their tasks, the workflow  ... 
doi:10.5220/0006579701270134 dblp:conf/biostec/FajardaSRSO18 fatcat:vs5etekbpjdqrafx3wvnvxkuvy

Adoption of Information Technology for Safeguarding Intangible Cultural Heritage by Cultural Institutions - A Luxury or a Necessity – A Case of Western-Uganda

Alinaitwe Stephen
2019 Saudi Journal of Engineering and Technology  
It was aimed at identifying academic based references to information technologies that plays a role in safeguarding of Intangible Cultural Heritage (ICH), assessing the status of IT adoption by the cultural  ...  IT technologies were grouped into two; online and offline based technologies.  ...  Information associated with cultural materials produced by Offline based tools need to be shared on online systems in different multimedia to suit the different tastes and preferences of audience for easy  ... 
doi:10.36348/sjeat.2019.v04i09.006 fatcat:yhbimyhslffajajvvid6j573na

Secure Multi Party Computation Technique for Classification Rule Sharing

Murugeshwari B, Jayakumar C, Sarukesi K
2012 International Journal of Computer Applications  
The data available with each data custodian is assumed to be horizontally portioned.  ...  The research work presented through this paper discusses the PPDM model in which the privacy of data transacted amongst the various Data Custodians involved is highlighted.  ...  The encrypted rules of the data custodians are shared amongst themselves resulting in the construction of the combined secure rule set in phase 4.  ... 
doi:10.5120/8764-2683 fatcat:fozueiaks5giviwyrmsrktd7k4

A privacy-preserving design for sharing demand-driven patient datasets over permissioned blockchains and P2P secure transfer

Mercedes Rodriguez-Garcia, Miguel-Angel Sicilia, Juan Manuel Dodero
2021 PeerJ Computer Science  
However, the sharing of datasets is typically done without considering the needs or requests of data consumers.  ...  Sharing patient datasets curated by health institutions is critical for the advance of monitoring, surveillance and research.  ...  ADDITIONAL INFORMATION AND DECLARATIONS Funding This work was funded by the VISAIGLE project grant ref. TIN2017-85797-R from the Spanish National Research Agency (AEI) with ERDF funds.  ... 
doi:10.7717/peerj-cs.568 pmid:34179449 pmcid:PMC8205266 fatcat:r4rq2a7kwnglxan4gnbsyzhw4q


2013 Journal of Computer Science  
No custodian discloses any information. In the proposed scheme in order to reduce the computational complexity, the data partitioning has been done in the horizontal way.  ...  The aim of the research work is to mine the data set available with each custodian in a semi honest model, securely without disclosure of any data amongst various custodians involved.  ...  This SMC is based on cryptographic functionality which plays a major role in the context of privacy preserving data between different participants in sharing authorized data.  ... 
doi:10.3844/jcssp.2013.1086.1091 fatcat:izjr4tdhgnamddxi2sjuwi4ehy

Implementing Base Data Set Custodianship – South Africa

Maroale Chauke, Nicolene Fourie, Vutomi Ndlovu, Yvonne Moema
2021 Abstracts of the International Cartographic Association  
Furthermore, building on the SDI Act, the Base Data Set Custodian Policy of 2015 provides for base data set coordinators to facilitate the governance and management of custodians in delivering base data  ...  Through the implementation of these frameworks, the Committee for Spatial Information (CSI), a statutory body established through the SDI Act, 2003, approved ten base dataset themes and adopted a Base  ...  and maturity of supporting documents informing the base data set governance; • Governance framework alignment evaluation: o Evaluate if the Base Data Set Governance Framework was implemented as is within  ... 
doi:10.5194/ica-abs-3-51-2021 fatcat:pbqurcjsybeelaotxglzr6h2ne

Improving transparency in the use of health data for research: Draft recommendations for a data use registers standard

Nada Karrar, Shahriar Kabir Khan, Sinduja Manohar, Paola Quattroni, David Seymour, Susheel Varma
2021 Zenodo  
This Green Paper outlines recommendations for data use registers standards to be adopted by data custodian organisations.  ...  The paper has been drafted following consultations and workshops with numerous organisations including health data research organisations and universities, data custodians and patient and public groups  ...  up to date and ensure accurate information is publicly shared. ▪ Improving the link to research outputs.  ... 
doi:10.5281/zenodo.5084761 fatcat:2m7pw47ejney5loxfrbr6xblku

Infopoints: Improving the use of clinical databases

N. Black
2002 BMJ (Clinical Research Edition)  
This is done by requesting information of changes from database custodians as they are instituted and by an annual inquiry initiated by DoCDat staff.  ...  This can be facilitated by putting database custodians in contact with one another to enable practical experiences to be shared. 1 Stone AA, Turkkan J, Jobe J, Bachrach C, Kurtzman H, Cain V.  ... 
doi:10.1136/bmj.324.7347.1194 pmid:12016187 pmcid:PMC111115 fatcat:imrlk7pmrfht3pgb53hlp3psye
« Previous Showing results 1 — 15 out of 28,510 results