Trusted research environments are definitely about trust

被引:4
|
作者
Affleck, Paul [1 ]
Westaway, Jenny [1 ]
Smith, Maurice [1 ]
Schrecker, Geoff [1 ]
机构
[1] Univ Leeds, Fac Med & Hlth, Leeds, England
关键词
Ethics-Research;
D O I
10.1136/jme-2022-108678
中图分类号
B82 [伦理学(道德学)];
学科分类号
摘要
In their highly topical paper, Graham et al argued that Trusted Research Environments (TREs) are not actually about trust because they reduce or remove' ... the need for trust in the use and sharing of patient health data'. We believe this is fundamentally mistaken. TREs mitigate or remove some risks, but they do not address all public concerns. In this regard, TREs provide evidence for people to decide whether the bodies holding and using their data can be trusted. TREs may make it easier for people to trust but there is still a need for that trust.
引用
收藏
页码:656 / 657
页数:2
相关论文
共 50 条
  • [21] Bootstrapping Trust in a "Trusted" Virtualized Platform
    Lauer, Hagen
    Sakzad, Amin
    Rudolph, Carsten
    Nepal, Surya
    PROCEEDINGS OF THE 1ST ACM WORKSHOP ON WORKSHOP ON CYBER-SECURITY ARMS RACE (CYSARM '19), 2019, : 11 - 22
  • [22] Trusted Environments for Volunteer Computing
    Ianni, Michele
    Masciari, Elio
    2018 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), 2018, : 526 - 529
  • [23] Survey on chain of trust of trusted system
    Xu, Ming-Di
    Zhang, Huan-Guo
    Zhang, Fan
    Yang, Lian-Jia
    Zhang, Fan, 2024, Chinese Institute of Electronics (42): : 2024 - 2031
  • [24] The Trust Management Model of Trusted Software
    Wu Jin
    Liao Yongjian
    Nie Xuyun
    Liu Mengjuan
    2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 534 - 537
  • [25] The trust measurement scheme in trusted computing
    Zhang, Li-Qiang
    Zhang, Huan-Guo
    Zhang, Fan
    Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (05): : 586 - 591
  • [26] RT-Trust: Automated refactoring for different trusted execution environments under real-time constraints
    Liu, Yin
    An, Kijin
    Tilevich, Eli
    JOURNAL OF COMPUTER LANGUAGES, 2020, 56 (56)
  • [27] Publication of research articles: Definitely desirable
    Patnayak, R.
    Jena, A.
    JOURNAL OF POSTGRADUATE MEDICINE, 2016, 62 (02) : 138 - 138
  • [28] Research on Security Threats Using VPN in Zero Trust Environments
    Kim, Eunyoung
    Sohn, Kiwook
    INFORMATION SECURITY APPLICATIONS, WISA 2023, 2024, 14402 : 55 - 66
  • [29] Triad: Trusted Timestamps in Untrusted Environments
    Fernandez, Gabriel
    Brito, Andrey
    Fetzer, Christof
    2023 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE, CLOUDCOM 2023, 2023, : 169 - 176
  • [30] Trust Metrics Based on a Trusted Network Element
    Hiltunen, Jouni
    Kuusijarvi, Jarkko
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 660 - 667