This poster introduces two projects exploring the concept of a secure virtual research environment allowing researchers to analyse data that are sensitive, private or protected under copyright law. The data always remain safe and, depending on the specific legal restrictions, cannot be copied or even viewed. This type of research infrastructure can help substantially improve the results of humanities and social sciences research by making far more data available for analysis. Researchers who want to analyse datasets by applying computational analysis tools usually obtain a copy of the data from a data provider. This has some disadvantages. Firstly, copying, storing, and managing the data on their computers is cumbersome and error prone. Se...
Providers of sensitive/confidential data typically rely on IT-based measures to control the security...
Research data often have special security requirements. This presentation will show a framework for ...
This project explores the options for access to sensitive data sets; what authentication technologie...
Privacy, copyright and competition considerations stand in the way of sharing sensitive data for sci...
Privacy, copyright and competition considerations stand in the way of sharing sensitive data for sci...
Privacy, copyright and competition considerations stand in the way of sharing sensitive data for sci...
Privacy, copyright and competition considerations stand in the way of sharing sensitive data for sci...
This white paper provides the necessary basis for understanding the requirements and specifications ...
‘Tools-to-data’ is a secure environment that allows researchers to analyse data that are sensitive, ...
Presented on 15 February 2023 at the Research Software Engineering in Data and AI workshop hosted by...
Scientific progress today requires multi-institutional and cross-disciplinary sharing and analysis o...
Background: Research studies exploring the determinants of disease require sufficient statistical po...
This article describes the approach taken by NORC and NIST to provide remote researcher access to co...
Many areas of research deal with sensitive data that cannot be shared widely. They have to be protec...
The economic and societal benefits of making research data available for reuse and verification are ...
Providers of sensitive/confidential data typically rely on IT-based measures to control the security...
Research data often have special security requirements. This presentation will show a framework for ...
This project explores the options for access to sensitive data sets; what authentication technologie...
Privacy, copyright and competition considerations stand in the way of sharing sensitive data for sci...
Privacy, copyright and competition considerations stand in the way of sharing sensitive data for sci...
Privacy, copyright and competition considerations stand in the way of sharing sensitive data for sci...
Privacy, copyright and competition considerations stand in the way of sharing sensitive data for sci...
This white paper provides the necessary basis for understanding the requirements and specifications ...
‘Tools-to-data’ is a secure environment that allows researchers to analyse data that are sensitive, ...
Presented on 15 February 2023 at the Research Software Engineering in Data and AI workshop hosted by...
Scientific progress today requires multi-institutional and cross-disciplinary sharing and analysis o...
Background: Research studies exploring the determinants of disease require sufficient statistical po...
This article describes the approach taken by NORC and NIST to provide remote researcher access to co...
Many areas of research deal with sensitive data that cannot be shared widely. They have to be protec...
The economic and societal benefits of making research data available for reuse and verification are ...
Providers of sensitive/confidential data typically rely on IT-based measures to control the security...
Research data often have special security requirements. This presentation will show a framework for ...
This project explores the options for access to sensitive data sets; what authentication technologie...