Stian Soiland-Reyes,
The University of Manchester
FAIR packaging of data, metadata and methods
How to identify sensitive source data within the TRE?
TRE-specific identifiers not necessarily globally unique
Is each workflow TRE-customized for accessing a particular data source (e.g. database)?
Inputs may be implicit; workflow not portable across TREs
Do the users know in advance what file paths the source data will have within the TRE?
Identifiers may be mapped before execution
May need to inject database connection credentials
What restrictions apply before permitting user-provided input data and parameters?
TREs may review workflow and how it is being called, e.g. inspect "query
" input
..
..