{"id":"https://openalex.org/W2556245381","doi":"https://doi.org/10.3233/978-1-61499-678-1-807","title":"Multi-Level Data-Security and Data-Protection in a Distributed Search Infrastructure for Digital Medical Samples","display_name":"Multi-Level Data-Security and Data-Protection in a Distributed Search Infrastructure for Digital Medical Samples","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2556245381","doi":"https://doi.org/10.3233/978-1-61499-678-1-807","mag":"2556245381","pmid":"https://pubmed.ncbi.nlm.nih.gov/27577500"},"language":"en","primary_location":{"id":"doi:10.3233/978-1-61499-678-1-807","is_oa":false,"landing_page_url":"https://doi.org/10.3233/978-1-61499-678-1-807","pdf_url":null,"source":{"id":"https://openalex.org/S4210179765","display_name":"Studies in health technology and informatics","issn_l":"0926-9630","issn":["0926-9630","1879-8365"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Studies in Health Technology and Informatics","raw_type":"book-chapter"},"type":"article","indexed_in":["crossref","pubmed"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103167378","display_name":"Michael Witt","orcid":"https://orcid.org/0000-0001-5143-9994"},"institutions":[{"id":"https://openalex.org/I122228004","display_name":"HTW Berlin - University of Applied Sciences","ror":"https://ror.org/01xzwj424","country_code":"DE","type":"education","lineage":["https://openalex.org/I122228004"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Witt Michael","raw_affiliation_strings":["Hochschule f\u00fcr Technik und Wirtschaft Berlin"],"affiliations":[{"raw_affiliation_string":"Hochschule f\u00fcr Technik und Wirtschaft Berlin","institution_ids":["https://openalex.org/I122228004"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004028500","display_name":"Dagmar Krefting","orcid":"https://orcid.org/0000-0002-7238-5339"},"institutions":[{"id":"https://openalex.org/I122228004","display_name":"HTW Berlin - University of Applied Sciences","ror":"https://ror.org/01xzwj424","country_code":"DE","type":"education","lineage":["https://openalex.org/I122228004"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Krefting Dagmar","raw_affiliation_strings":["Hochschule f\u00fcr Technik und Wirtschaft Berlin"],"affiliations":[{"raw_affiliation_string":"Hochschule f\u00fcr Technik und Wirtschaft Berlin","institution_ids":["https://openalex.org/I122228004"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5103167378"],"corresponding_institution_ids":["https://openalex.org/I122228004"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.22628328,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"228","issue":null,"first_page":"807","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9508000016212463,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9508000016212463,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/biobank","display_name":"Biobank","score":0.6757405400276184},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6419477462768555},{"id":"https://openalex.org/keywords/data-protection-act-1998","display_name":"Data Protection Act 1998","score":0.6050000190734863},{"id":"https://openalex.org/keywords/sample","display_name":"Sample (material)","score":0.569984495639801},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.505310595035553},{"id":"https://openalex.org/keywords/digital-data","display_name":"Digital data","score":0.499112606048584},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4932712912559509},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4866429269313812},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.476470947265625},{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.4430214762687683},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3436589241027832},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.32236868143081665},{"id":"https://openalex.org/keywords/data-transmission","display_name":"Data transmission","score":0.1475096046924591},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08442002534866333}],"concepts":[{"id":"https://openalex.org/C116567970","wikidata":"https://www.wikidata.org/wiki/Q864217","display_name":"Biobank","level":2,"score":0.6757405400276184},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6419477462768555},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.6050000190734863},{"id":"https://openalex.org/C198531522","wikidata":"https://www.wikidata.org/wiki/Q485146","display_name":"Sample (material)","level":2,"score":0.569984495639801},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.505310595035553},{"id":"https://openalex.org/C2778864079","wikidata":"https://www.wikidata.org/wiki/Q173285","display_name":"Digital data","level":3,"score":0.499112606048584},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4932712912559509},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4866429269313812},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.476470947265625},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.4430214762687683},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3436589241027832},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.32236868143081665},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.1475096046924591},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08442002534866333},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.0},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C43617362","wikidata":"https://www.wikidata.org/wiki/Q170050","display_name":"Chromatography","level":1,"score":0.0}],"mesh":[{"descriptor_ui":"D003219","descriptor_name":"Confidentiality","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D003219","descriptor_name":"Confidentiality","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D003219","descriptor_name":"Confidentiality","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D006801","descriptor_name":"Humans","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D006801","descriptor_name":"Humans","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D006801","descriptor_name":"Humans","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D012984","descriptor_name":"Software","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D012984","descriptor_name":"Software","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D012984","descriptor_name":"Software","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D016247","descriptor_name":"Information Storage and Retrieval","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D016247","descriptor_name":"Information Storage and Retrieval","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D016247","descriptor_name":"Information Storage and Retrieval","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D016494","descriptor_name":"Computer Security","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D016494","descriptor_name":"Computer Security","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D016494","descriptor_name":"Computer Security","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true}],"locations_count":2,"locations":[{"id":"doi:10.3233/978-1-61499-678-1-807","is_oa":false,"landing_page_url":"https://doi.org/10.3233/978-1-61499-678-1-807","pdf_url":null,"source":{"id":"https://openalex.org/S4210179765","display_name":"Studies in health technology and informatics","issn_l":"0926-9630","issn":["0926-9630","1879-8365"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Studies in Health Technology and Informatics","raw_type":"book-chapter"},{"id":"pmid:27577500","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/27577500","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Studies in health technology and informatics","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6200000047683716,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2959241854","https://openalex.org/W4388736558","https://openalex.org/W3125668682","https://openalex.org/W2994658133","https://openalex.org/W4401589571","https://openalex.org/W189247940","https://openalex.org/W7835937","https://openalex.org/W2136472275","https://openalex.org/W2129000053","https://openalex.org/W2750717637"],"abstract_inverted_index":{"Human":[0],"sample":[1,12],"data":[2,33,36,42],"is":[3,24],"stored":[4],"in":[5],"biobanks":[6],"with":[7,66],"software":[8],"managing":[9],"digital":[10],"derived":[11],"data.":[13],"When":[14],"these":[15,67],"stand-alone":[16],"components":[17],"are":[18,47],"connected":[19],"and":[20,44],"a":[21,60],"search":[22],"infrastructure":[23],"employed":[25],"users":[26],"become":[27],"able":[28],"to":[29,64],"collect":[30],"required":[31],"research":[32],"from":[34],"different":[35],"sources.":[37],"Data":[38],"protection,":[39],"patient":[40],"rights,":[41],"heterogeneity":[43],"access":[45],"control":[46],"major":[48],"challenges":[49],"for":[50,59],"such":[51],"an":[52],"infrastructure.":[53],"This":[54],"dissertation":[55],"will":[56],"investigate":[57],"concepts":[58],"multi-level":[61],"security":[62],"architecture":[63],"comply":[65],"requirements.":[68]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
