Please use this identifier to cite or link to this item:
https://dair.nps.edu/handle/123456789/1623
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | John R. Talburt | |
dc.date.accessioned | 2020-03-16T17:59:55Z | - |
dc.date.available | 2020-03-16T17:59:55Z | - |
dc.date.issued | 2018-04-30 | |
dc.identifier.citation | Published--Unlimited Distribution | |
dc.identifier.uri | https://dair.nps.edu/handle/123456789/1623 | - |
dc.description | Acquisition Management / Defense Acquisition Community Contributor | |
dc.description.abstract | Sharing data across organizational boundaries must strike a balance between the competing data quality dimensions of access and security. Without access to data, it can not be used and, consequently, is of no value. At the same time, uncontrolled access to data, especially sensitive personal data, can result in dire legal and ethical consequences. This paper discusses the trade-offs between security and access for three styles of trusted broker architectures in hopes that this will provide guidance for organizations trying to implement data sharing systems. | |
dc.description.sponsorship | Acquisition Research Program | |
dc.language | English (United States) | |
dc.publisher | Acquisition Research Program | |
dc.relation.ispartofseries | Acquisition Management | |
dc.relation.ispartofseries | SYM-AM-18-106 | |
dc.subject | Broker Architectures | |
dc.subject | Data Sharing | |
dc.subject | Sensitive Personal Data | |
dc.title | A Review of Trusted Broker Architectures for Data Sharing | |
dc.type | Article | |
Appears in Collections: | Annual Acquisition Research Symposium Proceedings & Presentations |
Files in This Item:
File | Size | Format | |
---|---|---|---|
SYM-AM-18-106.pdf | 3.1 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.