This project explores the options for access to sensitive data sets; what authentication technologies (e.g. multi-factor authentication) are needed to access sensitive data and secure compute environments. This project seeks to position choices around authentication technologies within the Five Safes framework for research use of sensitive data, proposed in 2003 by Felix Ritchie of the UK Office of National Statistics: • Safe Projects: is the proposed research use of the data appropriate? • Safe People: can the users be trusted to use the data in an appropriate manner? • Safe Settings: does the access facility limit unauthorised use? • Safe Data: is there a disclosure risk in the data itself? • Safe Outputs: are the research results non-...
In the publication multi factor authentication solutions are offered as a necessary tool for decreas...
The ‘Five Safes’ is a popular way to structure thinking about data access solutions. Originally used...
A growing framework of legal and ethical requirements limit scientific and commercial evaluation of ...
This project explores the options for access to sensitive data sets; what authentication technologie...
What is the best way of managing access to sensitive data? This is not a straightforward question, a...
The project set out to understand the requirements for access to sensitive data and how those requir...
Project Aligning approach to Trusted Research Environments Share this page Data Safe Hav...
Research data often have special security requirements. This presentation will show a framework for ...
Not all microdata can be anonymised without losing too much detail. For some data, once sufficient d...
Providers of sensitive/confidential data typically rely on IT-based measures to control the security...
The UK Data Service Secure Lab is a remote access data enclave that enables researchers to access co...
This poster introduces two projects exploring the concept of a secure virtual research environment a...
This paper describes a highly original and new approach to securing data on workstations (desktops a...
The economic and societal benefits of making research data available for reuse and verification are ...
Data services are now at a very exciting crossroad. The possibilities for innovative science repres...
In the publication multi factor authentication solutions are offered as a necessary tool for decreas...
The ‘Five Safes’ is a popular way to structure thinking about data access solutions. Originally used...
A growing framework of legal and ethical requirements limit scientific and commercial evaluation of ...
This project explores the options for access to sensitive data sets; what authentication technologie...
What is the best way of managing access to sensitive data? This is not a straightforward question, a...
The project set out to understand the requirements for access to sensitive data and how those requir...
Project Aligning approach to Trusted Research Environments Share this page Data Safe Hav...
Research data often have special security requirements. This presentation will show a framework for ...
Not all microdata can be anonymised without losing too much detail. For some data, once sufficient d...
Providers of sensitive/confidential data typically rely on IT-based measures to control the security...
The UK Data Service Secure Lab is a remote access data enclave that enables researchers to access co...
This poster introduces two projects exploring the concept of a secure virtual research environment a...
This paper describes a highly original and new approach to securing data on workstations (desktops a...
The economic and societal benefits of making research data available for reuse and verification are ...
Data services are now at a very exciting crossroad. The possibilities for innovative science repres...
In the publication multi factor authentication solutions are offered as a necessary tool for decreas...
The ‘Five Safes’ is a popular way to structure thinking about data access solutions. Originally used...
A growing framework of legal and ethical requirements limit scientific and commercial evaluation of ...