The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2015
DOI: 10.1186/s12967-015-0545-6
|View full text |Cite
|
Sign up to set email alerts
|

A workflow-driven approach to integrate generic software modules in a Trusted Third Party

Abstract: BackgroundCohort studies and registries rely on massive amounts of personal medical data. Therefore, data protection and information security as well as ethical aspects gain in importance and need to be considered as early as possible during the establishment of a study. Resulting legal and ethical obligations require a precise implementation of appropriate technical and organisational measures for a Trusted Third Party.MethodsThis paper defines and organises a consistent workflow-management to realize a Trust… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
65
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
1
1

Relationship

5
2

Authors

Journals

citations
Cited by 44 publications
(68 citation statements)
references
References 6 publications
0
65
0
1
Order By: Relevance
“…The CDM infrastructure and DZHK‐wide harmonization and standardization enable a high data security. High data quality is the basis for good clinical and epidemiological research …”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…The CDM infrastructure and DZHK‐wide harmonization and standardization enable a high data security. High data quality is the basis for good clinical and epidemiological research …”
Section: Discussionmentioning
confidence: 99%
“…High data quality is the basis for good clinical and epidemiological research. 5,10 All in all, the approval for quality control for about 55% of the entered data is given by the recruiting study centres via the review right. For the other data, the documentation is not completed, and the quality control cannot be applied.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…They received training in how to use the documentation system and have completed appropriate psychiatric/psychotherapeutic education programmes. The telemedical conversation was conducted on the basis of eCRFs in a computer-aided documentation system in accordance with the current standards for data security and data privacy [15,16]. The standardised conversation contained a structured standardised part and an individualised part.…”
Section: Telemedical Interventionmentioning
confidence: 99%
“…Location privacy protection method mainly refers to the fact that the user provides false user location privacy information or anonymous user's identity information and location information to the server in the process of location service. The model of location privacy protection is divided into 2 categories, which are trusted third party (TTP, shown in Figure 1) and free trusted third party (FTTP) [13]. This paper only discusses the previous class method.…”
Section: Related Workmentioning
confidence: 99%