Working paper Open Access

Optimus Study Cycle 3 – IT Security Concept

Koehler, Jana; Schnürle, Stefan; Portmann, Roland


JSON-LD (schema.org) Export

{
  "description": "<p>The main focus of this IT security concept is to strictly secure the upload of and access to the sensitive data collected for the Optimus Study Cycle 3. The institutions participating in the study will upload their case data. Case data can occur in non-anonymized form, including personal and very sensitive information if an institution can only provide the data in the way they are originally stored. Some case data might be anonymized depending on the software export capabilities of the tools used by an institution. This security concept considers the most challenging scenario of original case data and provides solutions to protect these data effectively:</p>\n\n<ul>\n\t<li>Access limited to only pre-registered users requiring 2-factor-authentication.</li>\n\t<li>Immediate removal of case data from the internet infrastructure and storage in a highly secured and encrypted backend system (deletion after end of the study),</li>\n\t<li>Automated extraction of anonymized study data, which removes all sensitive and personal information.</li>\n\t<li>Access of all users limited to study data based on a need-to-know and role-based access control.</li>\n</ul>", 
  "license": "https://creativecommons.org/licenses/by-nc/4.0/legalcode", 
  "creator": [
    {
      "@type": "Person", 
      "name": "Koehler, Jana"
    }, 
    {
      "@type": "Person", 
      "name": "Schn\u00fcrle, Stefan"
    }, 
    {
      "@type": "Person", 
      "name": "Portmann, Roland"
    }
  ], 
  "headline": "Optimus Study Cycle 3 \u2013 IT Security Concept", 
  "image": "https://zenodo.org/static/img/logos/zenodo-gradient-round.svg", 
  "datePublished": "2017-01-01", 
  "url": "https://zenodo.org/record/1288550", 
  "@context": "https://schema.org/", 
  "identifier": "https://doi.org/10.5281/zenodo.1288550", 
  "@id": "https://doi.org/10.5281/zenodo.1288550", 
  "@type": "ScholarlyArticle", 
  "name": "Optimus Study Cycle 3 \u2013 IT Security Concept"
}
943
36
views
downloads
All versions This version
Views 943943
Downloads 3636
Data volume 36.8 MB36.8 MB
Unique views 880880
Unique downloads 3535

Share

Cite as