Working paper Open Access

Optimus Study Cycle 3 – IT Security Concept

Koehler, Jana; Schnürle, Stefan; Portmann, Roland


DataCite XML Export

<?xml version='1.0' encoding='utf-8'?>
<resource xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://datacite.org/schema/kernel-4" xsi:schemaLocation="http://datacite.org/schema/kernel-4 http://schema.datacite.org/meta/kernel-4.1/metadata.xsd">
  <identifier identifierType="DOI">10.5281/zenodo.1288550</identifier>
  <creators>
    <creator>
      <creatorName>Koehler, Jana</creatorName>
      <givenName>Jana</givenName>
      <familyName>Koehler</familyName>
    </creator>
    <creator>
      <creatorName>Schnürle, Stefan</creatorName>
      <givenName>Stefan</givenName>
      <familyName>Schnürle</familyName>
    </creator>
    <creator>
      <creatorName>Portmann, Roland</creatorName>
      <givenName>Roland</givenName>
      <familyName>Portmann</familyName>
    </creator>
  </creators>
  <titles>
    <title>Optimus Study Cycle 3 – IT Security Concept</title>
  </titles>
  <publisher>Zenodo</publisher>
  <publicationYear>2017</publicationYear>
  <dates>
    <date dateType="Issued">2017-01-01</date>
  </dates>
  <resourceType resourceTypeGeneral="Text">Working paper</resourceType>
  <alternateIdentifiers>
    <alternateIdentifier alternateIdentifierType="url">https://zenodo.org/record/1288550</alternateIdentifier>
  </alternateIdentifiers>
  <relatedIdentifiers>
    <relatedIdentifier relatedIdentifierType="DOI" relationType="IsVersionOf">10.5281/zenodo.1288549</relatedIdentifier>
    <relatedIdentifier relatedIdentifierType="URL" relationType="IsPartOf">https://zenodo.org/communities/lory</relatedIdentifier>
    <relatedIdentifier relatedIdentifierType="URL" relationType="IsPartOf">https://zenodo.org/communities/lory_hslu</relatedIdentifier>
    <relatedIdentifier relatedIdentifierType="URL" relationType="IsPartOf">https://zenodo.org/communities/lory_hslu_i</relatedIdentifier>
    <relatedIdentifier relatedIdentifierType="URL" relationType="IsPartOf">https://zenodo.org/communities/lory_hslu_i_trs</relatedIdentifier>
  </relatedIdentifiers>
  <rightsList>
    <rights rightsURI="https://creativecommons.org/licenses/by-nc/4.0/legalcode">Creative Commons Attribution Non Commercial 4.0 International</rights>
    <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights>
  </rightsList>
  <descriptions>
    <description descriptionType="Abstract">&lt;p&gt;The main focus of this IT security concept is to strictly secure the upload of and access to the sensitive data collected for the Optimus Study Cycle 3. The institutions participating in the study will upload their case data. Case data can occur in non-anonymized form, including personal and very sensitive information if an institution can only provide the data in the way they are originally stored. Some case data might be anonymized depending on the software export capabilities of the tools used by an institution. This security concept considers the most challenging scenario of original case data and provides solutions to protect these data effectively:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Access limited to only pre-registered users requiring 2-factor-authentication.&lt;/li&gt;
	&lt;li&gt;Immediate removal of case data from the internet infrastructure and storage in a highly secured and encrypted backend system (deletion after end of the study),&lt;/li&gt;
	&lt;li&gt;Automated extraction of anonymized study data, which removes all sensitive and personal information.&lt;/li&gt;
	&lt;li&gt;Access of all users limited to study data based on a need-to-know and role-based access control.&lt;/li&gt;
&lt;/ul&gt;</description>
    <description descriptionType="Other">+ Sprache: eng + Reihe: Technical Report, 1/2017</description>
  </descriptions>
</resource>
965
36
views
downloads
All versions This version
Views 965965
Downloads 3636
Data volume 36.8 MB36.8 MB
Unique views 901901
Unique downloads 3535

Share

Cite as