메뉴 건너뛰기




Volumn 80, Issue , 2002, Pages 213-229

Future of security and privacy in medical information

Author keywords

[No Author keywords available]

Indexed keywords

MEDICAL COMPUTING;

EID: 0036363705     PISSN: 09269630     EISSN: 18798365     Source Type: Book Series    
DOI: 10.3233/978-1-60750-924-0-213     Document Type: Article
Times cited : (4)

References (34)
  • 3
    • 84944371864 scopus 로고
    • Computer surveillance of hospital-acquired infections and antibiotic use
    • R. Scott Evans et al. : "Computer Surveillance of Hospital-acquired Infections and Antibiotic Use"; J. of theAMA, Vol. 256 No. 8, 1986, pp. 1007-1011.
    • (1986) J. of TheAMA , vol.256 , Issue.8 , pp. 1007-1011
    • Scott Evans, R.1
  • 5
    • 0029490197 scopus 로고
    • Confidential communication on the internet
    • Thomas Beth: December
    • Thomas Beth: "Confidential Communication on the Internet"; Scientific American, December 1995, pp. 88-91.
    • (1995) Scientific American , pp. 88-91
  • 9
    • 85077745984 scopus 로고
    • TCP wrapper: Network monitoring, access control, and booby traps
    • Baltimore MD
    • Wietse Venema: "TCP wrapper: Network Monitoring, Access Control, and Booby Traps"; Proc. 3rd Usenix Security Symp., Baltimore MD, 1992.
    • (1992) Proc. 3rd Usenix Security Symp.
    • Venema, W.1
  • 13
    • 0344024833 scopus 로고    scopus 로고
    • Guaranteeing anonymity when sharing medical data, the DATAFLY system
    • Latanya Sweeney, Washington DC, Hanley & Belfus
    • Latanya Sweeney: "Guaranteeing anonymity when sharing medical data, the DATAFLY system"; Proceedings, Journal of the American Medical Informatics Association, Washington DC, Hanley & Belfus, 1997.
    • (1997) Proceedings, Journal of the American Medical Informatics Association
  • 14
    • 84976657250 scopus 로고
    • An authorization mechanism for a relational database system
    • Sept.
    • Patricia P. Griffiths and Bradford W. Wade: "An Authorization Mechanism for a Relational Database System"; ACM Trans, on Database Systems, Vol. 1 No. 3, Sept. 1976, pp. 242-255.
    • (1976) ACM Trans, on Database Systems , vol.1 , Issue.3 , pp. 242-255
    • Griffiths, P.P.1    Wade, B.W.2
  • 16
    • 84887073412 scopus 로고
    • Tuckerman: The ips cryptographic programs
    • A. G. Konheim, M. H. Mack, R. K. McNeil, B. Tuckerman: The IPS Cryptographic Programs"; IBMSys. J., Vol. 19 No2, 1980, pp. 302-307.
    • (1980) IBMSys. J. , vol.19 , Issue.2 , pp. 302-307
    • Konheim, A.G.1    Mack, M.H.2    McNeil B, R.K.3
  • 17
    • 0024012004 scopus 로고
    • The first ten years of public-key cryptography
    • May Whitfield Diifie
    • Whitfield Diifie: "The First Ten Years of Public-Key Cryptography"; Proc. IEEE, Vol. 76 No. 5, May 1988, pp. 560-577.
    • (1988) Proc. IEEE , vol.76 , Issue.5 , pp. 560-577
  • 18
    • 0025442003 scopus 로고
    • The seaview security model
    • Therea Lunt et al. : "The SeaView Security Model"; IEEE Trans, on Software Eng., Vol. 16 No. 6, 1990, pp. 593-607.
    • (1990) IEEE Trans, on Software Eng. , vol.16 , Issue.6 , pp. 593-607
    • Lunt, T.1
  • 19
    • 84976678844 scopus 로고
    • Information organization using Rums
    • June
    • A. Luniewski et al. "Information organization using Rums" SIGMOD '93, ACM S1GMOD Record, June] 1993, vol. 22, no. 2 p. 560-561
    • (1993) SIGMOD '93, ACM S1GMOD Record , vol.22 , Issue.2 , pp. 560-561
    • Luniewski, A.1
  • 20
    • 0002779304 scopus 로고    scopus 로고
    • Rindfleisch: Privacy, information technology, and health care
    • Aug.
    • Thomas C. Rindfleisch: Privacy, Information Technology, and Health Care; Comm. ACM; Vol. 40 No. 8, Aug. 1997, pp. 92-100.
    • (1997) Comm. ACM , vol.40 , Issue.8 , pp. 92-100
    • Thomas, C.1
  • 21
    • 0030087440 scopus 로고    scopus 로고
    • Sharing manufacturing information in virtual enterprises
    • February
    • M. Hardwick, D. L. Spooner, T. Rando, and KC Morris: "Sharing Manufacturing Information In Virtual Enterprises"; Comm. ACM, Vol. 39 no. 2, pp. 46-54, February 1996.
    • (1996) Comm. ACM , vol.39 , Issue.2 , pp. 46-54
    • Hardwick, M.1    Spooner, D.L.2    Rando, T.3    Morris, K.C.4
  • 25
    • 0031359436 scopus 로고    scopus 로고
    • Rule-based database access control-a practical approach
    • Tor Didriksen:
    • Tor Didriksen: "Rule-based Database Access Control-A Practical Approach"; Proc. 2nd ACMworkshop on Rule-based Access Control, 1997, pp. 143-151.
    • (1997) Proc. 2nd ACMworkshop on Rule-based Access Control , pp. 143-151
  • 26
    • 0024627547 scopus 로고
    • Secure query processing strategies
    • March
    • T. Keefe, B. Thuraisingham, and W. Tsai: "Secure Query Processing Strategies"; IEEE Computer, Vol. 22 No. 3, March 1989, pp. 63-70.
    • (1989) IEEE Computer , vol.22 , Issue.3 , pp. 63-70
    • Keefe, T.1    Thuraisingham, B.2    Tsai, W.3
  • 27
    • 0030333205 scopus 로고    scopus 로고
    • Replacing personally-identifying information in medical records, the scrub system
    • Latanya Sweeney, Washington, DC: Hanley & Belfus
    • Latanya Sweeney: "Replacing personally-identifying information in medical records, the SCRUB system"; J. J. Cimino, ed. Proceedings, Journal of the American Medical Informatics Association, Washington, DC: Hanley & Belfus, 1996, Pp. 333-337.
    • (1996) Proceedings, Journal of the American Medical Informatics Association , pp. 333-337
    • Cimino, J.J.1
  • 29
    • 0001031920 scopus 로고    scopus 로고
    • Wavelet-based progressive transmission and security filtering for medical image distribution
    • in Stephen Wong (ed. ) Kluwer publishers
    • James Z. Wang, Gio Wiederhold, and Jia Li: Wavelet-based Progressive Transmission and Security Filtering for Medical Image Distribution"; in Stephen Wong (ed. ): Medical Image Databases', Kluwer publishers, 1998, pp. 303-324.
    • (1998) Medical Image Databases , pp. 303-324
    • Wang, J.Z.1    Wiederhold, G.2    Li, J.3
  • 30
    • 0024914229 scopus 로고
    • Wortmann: Security-control methods for statistical databases: A comparative study
    • Dec.
    • N. R. Adam andJ. C. Wortmann: Security-Control Methods for Statistical Databases: a Comparative Study; ACM Computing Surveys, Vol. 25 No. 4, Dec. 1989.
    • (1989) ACM Computing Surveys , vol.25 , Issue.4
    • Adam, N.R.C.J.1
  • 31
    • 0023861339 scopus 로고
    • Inference aggregation detection in database management systems
    • Oakland CA, April
    • T. Hinke: "Inference Aggregation Detection in Database Management Systems"; Proc. IEEE Symposium on Security and Privacy, Oakland CA, April 1988.
    • (1988) Proc. IEEE Symposium on Security and Privacy
    • Hinke, T.1
  • 32
    • 0029686313 scopus 로고    scopus 로고
    • National health information privacy bill generates heat at scamc
    • Bill Braithwaite: "National health information privacy bill generates heat at SCAMC"; Journal of the American Informatics Association, Vol. 3 no. l, 1996, pp. 95-96
    • (1996) Journal of the American Informatics Association , vol.3 , Issue.1 , pp. 95-96
    • Braithwaite, B.1
  • 33
    • 0030748330 scopus 로고    scopus 로고
    • Maintaining the confidentiality of medical records shared over the internet and the world wide web
    • 15 July
    • David M. Rind, Isaac S. Kohane, Peter Szolovits, Charles Safran, Henry C. Chueh, and G. Octo Baraett: "Maintaining the Confidentiality of Medical Records Shared over the Internet and the World Wide Web"; Annals of Internal Medicine, 15 July 1997. pp. 127-141.
    • (1997) Annals of Internal Medicine , pp. 127-141
    • Rind, D.M.1    Kohane, I.S.2    Szolovits, P.3    Safran, C.4    Chueh, H.C.5    Octo Baraett, G.6
  • 34
    • 84887095869 scopus 로고    scopus 로고
    • Protecting information when access is granted for collaboration
    • in B. Thuraisingham, Z. Tarri, K. Ditttrich (eds)
    • Gio Wiederhold: "Protecting Information when Access is Granted for Collaboration"; in B. Thuraisingham, Z. Tarri, K. Ditttrich (eds): Proc. IFIP WG11. 3 in Database Security; IFIP-Kluwer, pp. 3-11.
    • Proc. IFIP WG11. 3 in Database Security; IFIP-Kluwer , pp. 3-11
    • Wiederhold, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.