scispace - formally typeset
Search or ask a question
Topic

Data access

About: Data access is a research topic. Over the lifetime, 13141 publications have been published within this topic receiving 172859 citations. The topic is also known as: Data access.


Papers
More filters
Journal Article
TL;DR: This paper outlines an approach that draws on both advances in the social science and the computer science literatures to develop new access modalities that not only provide access but preserve data and create scientific communities.
Abstract: The vast amount of data now collected on human beings and organizations as a result of cyberinfrastructure advances has created similarly vast opportunities for social scientists to study and understand human behavior. It has also made traditional ways of protecting social science data obsolete. The challenge to social scientists is to exploit advances in cyberinfrastructure to develop new access modalities that not only provide access but preserve data and create scientific communities. This paper outlines an approach that draws on both advances in the social science and the computer science literatures.

51 citations

Patent
08 Aug 2002
TL;DR: In this paper, a system and method of data encryption and decryption for controlling access to a data storage device such as a hard disk drive or optical drive is provided, which utilizes data encryption techniques combined with a token device to control access to data stored on the storage device.
Abstract: A system and method of data encryption and decryption for controlling access to a data storage device such as a hard disk drive or optical drive is provided. The invented method utilizes data encryption and decryption techniques, combined with a token device, to control access to data stored on the data storage device.

51 citations

Proceedings ArticleDOI
03 Nov 2006
TL;DR: The access control architecture was developed for a health data integration system, but both the architecture and some of its components for authentication and authorisation could be readily reused in other similar systems.
Abstract: We describe the implementation of role-based access control in a data service integration system. Users in research or other projects may access a diverse collection of data sources but are to allowed access to only the part of the data collection that is necessary for their purposes. To simplify the administration of the access control, Role Based Access control is used, with the role hierarchy defined within and limited to each project. User queries to the integration system are analysed for their data access needs and those needs checked against the access control policies. The policies for the data held by individual data custodians can be managed and implemented by the custodian, or held in a central authorisation server in the integration system. The system is built around the Security Assertion Markup Language and eXtensible Access Control Markup Language standards. The access control architecture was developed for a health data integration system, but both the architecture and some of its components for authentication and authorisation could be readily reused in other similar systems.

51 citations

Journal ArticleDOI
23 Mar 2015-Trials
TL;DR: Key issues in data sharing are described, including the challenges of open access to data, and some of the key questions that all reviewers should ask when deciding whether a request to share data is reasonable are presented.
Abstract: The move towards increased transparency around clinical trials is welcome. Much focus has been on under-reporting of trials and access to individual patient data to allow independent verification of findings. There are many other good reasons for data sharing from clinical trials. We describe some key issues in data sharing, including the challenges of open access to data. These include issues in consent and disclosure; risks in identification, including self-identification; risks in distorting data to prevent self-identification; and risks in analysis. These risks have led us to develop a controlled access policy, which safeguards the rights of patients entered in our trials, guards the intellectual property rights of the original researchers who designed the trial and collected the data, provides a barrier against unnecessary duplication, and ensures that researchers have the necessary resources and skills to analyse the data. We briefly discuss the practicalities of our current approach to data sharing, including ensuring that data are discoverable and how to deal with old studies. We describe data sharing activities at the MRC Clinical Trials Unit. One hundred and three data sharing activities were logged from 2012 to 2014 from external and internal applicants. The motivations are varied, but none have been for replication of the primary results. For any request to share data, we note the important role of independent reviewers as well as reviewers who know the study well, and present some of the key questions that all reviewers should ask when deciding whether a request is reasonable. We consider the responsibilities of all parties. We highlight the potential for opportunity costs. Clinical trial data should be shared for reasonable requests but there are many practical issues that must be explicitly considered.

51 citations

Proceedings ArticleDOI
11 Sep 2010
TL;DR: This paper presents a compiler-based approach used for analyzing data access behavior in multi-threaded applications and shows a 20% speedup over shared caching and 5% speed up over the closest runtime approximation, “first touch”.
Abstract: Data access latency, a limiting factor in the performance of chip multiprocessors, grows significantly with the number of cores in non-uniform cache architectures with distributed cache banks. To mitigate this effect, it is necessary to leverage the data access locality and choose an optimum data placement. Achieving this is especially challenging when other constraints such as cache capacity, coherence messages and runtime overhead need to be considered. This paper presents a compiler-based approach used for analyzing data access behavior in multi-threaded applications. The proposed experimental compiler framework employs novel compilation techniques to discover and represent multi-threaded memory access patterns (MMAPs). At run time, symbolic MMAPs are resolved and used by a partitioning algorithm to choose a partition of allocated memory blocks among the forked threads in the analyzed application. This partition is used to enforce data ownership by associating the data with the core that executes the thread owning the data. We demonstrate how this information can be used in an experimental architecture to accelerate applications. In particular, our compiler assisted approach shows a 20% speedup over shared caching and 5% speedup over the closest runtime approximation, "first touch".

51 citations


Network Information
Related Topics (5)
Software
130.5K papers, 2M citations
86% related
Cloud computing
156.4K papers, 1.9M citations
86% related
Cluster analysis
146.5K papers, 2.9M citations
85% related
The Internet
213.2K papers, 3.8M citations
85% related
Information system
107.5K papers, 1.8M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202351
2022125
2021403
2020721
2019906
2018816