Difference between revisions of "SCOR"
Jump to navigation
Jump to search
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
[[File:SecureCovid.PNG]] | |||
<span style="color: rgb(0, 0, 0); font-family: Verdana, Helvetica, Arial, Lucida, sans-serif; font-size: 15px;">This is a consortium set up to support international collaboration on COVID-19 research while respecting patient privacy.</span> | <span style="color: rgb(0, 0, 0); font-family: Verdana, Helvetica, Arial, Lucida, sans-serif; font-size: 15px;">This is a consortium set up to support international collaboration on COVID-19 research while respecting patient privacy.</span> | ||
<span style="color: rgb(0, 0, 0); font-family: Verdana, Helvetica, Arial, Lucida, sans-serif; font-size: 15px;"> | <span style="color: rgb(0, 0, 0); font-family: Verdana, Helvetica, Arial, Lucida, sans-serif; font-size: 15px;">The consortium includes a security and privacy task force. Its objective is to adapt and customize the privacy-conscious mechanisms (based on multi party homomorphic encryption and additional privacy enhancing technologies) that enable the execution of the research protocols on end-to-end protected data, in such a way that individual data never leaves the premises or the control of the data owner.</span> | ||
[https://securecovidresearch.org/ https://securecovidresearch.org/] | [https://securecovidresearch.org/ https://securecovidresearch.org/] | ||
[[Category:Pages with broken file links]] | [[Category:Pages with broken file links|Pages_with_broken_file_links]] |
Latest revision as of 15:51, 21 April 2020
This is a consortium set up to support international collaboration on COVID-19 research while respecting patient privacy.
The consortium includes a security and privacy task force. Its objective is to adapt and customize the privacy-conscious mechanisms (based on multi party homomorphic encryption and additional privacy enhancing technologies) that enable the execution of the research protocols on end-to-end protected data, in such a way that individual data never leaves the premises or the control of the data owner.