Digital fingerprints: implementing algorithms as technical controls
Date
2016-06-03
Authors
Gazvoda, Gregg, author
Covance, publisher
Journal Title
Journal ISSN
Volume Title
Abstract
Description
Presented at the National data integrity conference: data sharing: the how, why, when and when not to share held on June 2-3, 2016 at University of Colorado, Denver, Colorado. The National Data Integrity Conference is a gathering of people sharing new challenges and solutions regarding research data and integrity. This conference aims to provide attendees with both an understanding of data integrity issues and impart practical tools and skills to deal with them. Topics addressed will include data privacy, openness, policy, education and the impacts of sharing data, how to do it, when to do it, and when not to. Speakers and audience members come from diverse fields such as: Academic Research; Information Technology; Quality Assurance; Regulatory Compliance; Private Industry; Grant Funding; Government.
PowerPoint presentation during Lightning Talks given on June 3, 2016.
Includes bibliographical references.
PowerPoint presentation during Lightning Talks given on June 3, 2016.
Includes bibliographical references.
Rights Access
Subject
evolution
data collection systems
controls
hash function
MD5 algorithm
risks