Please use this identifier to cite or link to this item: https://dair.nps.edu/handle/123456789/1623
Full metadata record
DC FieldValueLanguage
dc.contributor.authorJohn R. Talburt
dc.date.accessioned2020-03-16T17:59:55Z-
dc.date.available2020-03-16T17:59:55Z-
dc.date.issued2018-04-30
dc.identifier.citationPublished--Unlimited Distribution
dc.identifier.urihttps://dair.nps.edu/handle/123456789/1623-
dc.descriptionAcquisition Management / Defense Acquisition Community Contributor
dc.description.abstractSharing data across organizational boundaries must strike a balance between the competing data quality dimensions of access and security. Without access to data, it can not be used and, consequently, is of no value. At the same time, uncontrolled access to data, especially sensitive personal data, can result in dire legal and ethical consequences. This paper discusses the trade-offs between security and access for three styles of trusted broker architectures in hopes that this will provide guidance for organizations trying to implement data sharing systems.
dc.description.sponsorshipAcquisition Research Program
dc.languageEnglish (United States)
dc.publisherAcquisition Research Program
dc.relation.ispartofseriesAcquisition Management
dc.relation.ispartofseriesSYM-AM-18-106
dc.subjectBroker Architectures
dc.subjectData Sharing
dc.subjectSensitive Personal Data
dc.titleA Review of Trusted Broker Architectures for Data Sharing
dc.typeArticle
Appears in Collections:Annual Acquisition Research Symposium Proceedings & Presentations

Files in This Item:
File SizeFormat 
SYM-AM-18-106.pdf3.1 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.