메뉴 건너뛰기




Volumn 4, Issue , 2004, Pages

Some methods for blindfolded record linkage

Author keywords

[No Author keywords available]

Indexed keywords

ARTICLE; AUTOMATION; CALCULATION; COMPUTER PROGRAM; COST; MEDICAL INFORMATICS; METHODOLOGY; COMPARATIVE STUDY; COMPUTER LANGUAGE; COMPUTER NETWORK; COMPUTER SECURITY; CONFIDENTIALITY; ELECTRONIC MEDICAL RECORD; HUMAN; LEGISLATION AND JURISPRUDENCE; MEDICAL RECORD; ORGANIZATION AND MANAGEMENT; PRIVACY; PROCEDURES; PUBLIC HEALTH; STANDARDS;

EID: 13444256330     PISSN: 14726947     EISSN: 14726947     Source Type: Journal    
DOI: 10.1186/1472-6947-4-9     Document Type: Article
Times cited : (107)

References (62)
  • 4
    • 0036450652 scopus 로고    scopus 로고
    • Research use of linked health data-a best practice protocol
    • Kelman CW, Bass AJ, Holman CD: Research use of linked health data-a best practice protocol. Aust N Z J Public Health 2002, 26:251-255.
    • (2002) Aust N Z J Public Health , vol.26 , pp. 251-255
    • Kelman, C.W.1    Bass, A.J.2    Holman, C.D.3
  • 5
    • 0642275698 scopus 로고    scopus 로고
    • A proposed architecture and method of operation for improving the protection of privacy and confidentiality in disease registers
    • Churches T: A proposed architecture and method of operation for improving the protection of privacy and confidentiality in disease registers. BMC Med Res Methodol 2003, 3:1 [http:/ /www.biomedcentral.com/1471-2288/3/1].
    • (2003) BMC Med Res Methodol , vol.3 , pp. 1
    • Churches, T.1
  • 6
  • 7
    • 18144444441 scopus 로고
    • A one way public key cryptosystem for the linkage of nominal files in epidemiological studies
    • Dusserre L, Quantin C, Bouzelat H: A one way public key cryptosystem for the linkage of nominal files in epidemiological studies. Medinfo 1995, 8:644-7.
    • (1995) Medinfo , vol.8 , pp. 644-647
    • Dusserre, L.1    Quantin, C.2    Bouzelat, H.3
  • 9
    • 0031317926 scopus 로고    scopus 로고
    • A computerized record hash coding and linkage procedure to warrant epidemiological follow-up data security
    • Quantin C, Bouzelat H, Dusserre L: A computerized record hash coding and linkage procedure to warrant epidemiological follow-up data security. Stud Health Technol Inform 1997, 43:339-42.
    • (1997) Stud Health Technol Inform , vol.43 , pp. 339-342
    • Quantin, C.1    Bouzelat, H.2    Dusserre, L.3
  • 10
    • 84887755089 scopus 로고    scopus 로고
    • Security aspects of medical file regrouping for the epidemiological follow-up
    • Quantin C, Kerkri E, Allaert FA, Bouzelat H, Dusserre L: Security aspects of medical file regrouping for the epidemiological follow-up. Medinfo 1998, 9:1135-7.
    • (1998) Medinfo , vol.9 , pp. 1135-1137
    • Quantin, C.1    Kerkri, E.2    Allaert, F.A.3    Bouzelat, H.4    Dusserre, L.5
  • 11
    • 0032032036 scopus 로고    scopus 로고
    • How to ensure data security of an epidemiological follow-up: Quality assessment of an anonymous record linkage procedure
    • Quantin C, Bouzelat H, Allaert FA, Benhamiche AM, Faivre J, Dusserre L: How to ensure data security of an epidemiological follow-up: quality assessment of an anonymous record linkage procedure. Int J Med Inf 1998, 49:117-22.
    • (1998) Int J Med Inf , vol.49 , pp. 117-122
    • Quantin, C.1    Bouzelat, H.2    Allaert, F.A.3    Benhamiche, A.M.4    Faivre, J.5    Dusserre, L.6
  • 15
    • 0020312165 scopus 로고
    • Protocols for secure communication
    • Proc of 23rd IEEE Symposium on the Foundations of Computer Science (FOCS)
    • Yao AC: Protocols for secure communication. In Proc of 23rd IEEE Symposium on the Foundations of Computer Science (FOCS). IEEE 1982:160-6.
    • (1982) IEEE , pp. 160-166
    • Yao, A.C.1
  • 20
    • 0035229267 scopus 로고    scopus 로고
    • PKI (public key infrastructure) - How and why it works
    • Etheridge Y: PKI (public key infrastructure) - how and why it works. Health Manag Technol 2001, 22:20-21.
    • (2001) Health Manag Technol , vol.22 , pp. 20-21
    • Etheridge, Y.1
  • 21
    • 0001116877 scopus 로고
    • Binary codes capable of correcting deletions, insertions and reversals
    • Levenshtein VI: Binary codes capable of correcting deletions, insertions and reversals. Sov Phys Dokl 1966.
    • (1966) Sov Phys Dokl
    • Levenshtein, V.I.1
  • 25
    • 3042683432 scopus 로고    scopus 로고
    • Message authentication using hash functions - The HMAC construction
    • Bellare M, Canetti R, Krawczyk H: Message authentication using hash functions - the HMAC construction. RSA Laboratories' CryptoBytes 1996, 2:1-5 [http://www.cs.ucsd.edu/users/mihir/papers/ hmac.html].
    • (1996) RSA Laboratories' CryptoBytes , vol.2 , pp. 1-5
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 26
    • 13444268632 scopus 로고    scopus 로고
    • Chaffing and winnowing: Confidentiality without encryption
    • Rivest RL: Chaffing and Winnowing: Confidentiality without Encryption. MIT Lab for Computer Science 1998 [http://the ory.lcs.mit.edu/~rivest/chaffing. txt].
    • (1998) MIT Lab for Computer Science
    • Rivest, R.L.1
  • 27
    • 84976659284 scopus 로고
    • Approximate string comparison
    • Hall PAV, Dowling GR: Approximate string comparison. Computing Surveys 1980, 12:381-42.
    • (1980) Computing Surveys , vol.12 , pp. 381-442
    • Pav, H.1    Dowling, G.R.2
  • 28
    • 0012620707 scopus 로고
    • Hanging on the metaphone
    • Philips L: Hanging on the Metaphone. Computer Language 1990, 7:39-43.
    • (1990) Computer Language , vol.7 , pp. 39-43
    • Philips, L.1
  • 29
    • 0016083316 scopus 로고
    • The use of an association measure based on character structure to identify semantically related pairs of words and document titles
    • Adamson GW, Boreham J: The use of an association measure based on character structure to identify semantically related pairs of words and document titles. Information and Storage Retrieval 1974, 10:253-60.
    • (1974) Information and Storage Retrieval , vol.10 , pp. 253-260
    • Adamson, G.W.1    Boreham, J.2
  • 31
    • 4243079033 scopus 로고    scopus 로고
    • Approximate string comparison and its effect on an advanced record linkage system
    • Washington DC: Federal Committee on Statistical Methodology, Office of Management and Budget
    • Porter EH, Winkler WE: Approximate String Comparison and its Effect on an Advanced Record Linkage System. In Record Linkage Techniques - 1997: Proceedings of an International Workshop and Exposition, March 1997, Arlington VA 1997 [http://www.census.gov/srd/ papers/pdf/rr97-2.pdf]. Washington DC: Federal Committee on Statistical Methodology, Office of Management and Budget
    • (1997) Record Linkage Techniques - 1997: Proceedings of an International Workshop and Exposition, March 1997, Arlington VA
    • Porter, E.H.1    Winkler, W.E.2
  • 32
    • 84950419860 scopus 로고
    • Advances in record-linkage methodology as applied to matching the 1985 census of Tampa, Florida
    • Jaro MA: Advances in Record-Linkage Methodology as Applied to Matching the 1985 census of Tampa, Florida. Journal of the American Statistical Association 1989, 89:414-420.
    • (1989) Journal of the American Statistical Association , vol.89 , pp. 414-420
    • Ma, J.1
  • 34
    • 0042697921 scopus 로고
    • London: Department of Computing, Imperial College
    • Howe D: Free On-Line Dictionary of Computing 1994 [http://foldoc.doc.ic. ac.uk]. London: Department of Computing, Imperial College
    • (1994) Free On-Line Dictionary of Computing
    • Howe, D.1
  • 38
    • 13444268632 scopus 로고    scopus 로고
    • Chaffing and Winnowing: Confidentiality without Encryption
    • Rivest RL: Chaffing and Winnowing: Confidentiality without Encryption. MIT Lab for Computer Science 1998 [http://the ory.lcs.mit.edu/~rivest/chaffing. txt].
    • (1998) MIT Lab for Computer Science
    • Rivest, R.L.1
  • 40
    • 33845953872 scopus 로고    scopus 로고
    • National Security Agency: Security Enhanced Linux [http:// www.nsa.gov/selinux/].
    • Security Enhanced Linux
  • 41
    • 13444268632 scopus 로고    scopus 로고
    • Chaffing and Winnowing: Confidentiality without Encryption
    • Rivest RL: Chaffing and Winnowing: Confidentiality without Encryption. MIT Lab for Computer Science 1998 [http://the ory.lcs.mit.edu/~rivest/chaffing. txt].
    • (1998) MIT Lab for Computer Science
    • Rivest, R.L.1
  • 49
    • 2942747394 scopus 로고
    • Advanced methods for record linkage
    • Washington, DC: Statistical Research Division
    • Winkler WE: Advanced Methods for Record Linkage. Technical report 1994 [http://www.census.gov/srd/papers/pdf/rr94-5.pdf]. Washington, DC: Statistical Research Division, U.S. Bureau of the Census
    • (1994) Technical Report
    • Winkler, W.E.1
  • 50
    • 2942741943 scopus 로고    scopus 로고
    • Methods for record linkage and Bayesian networks
    • Washington, DC: Statistical Research Division
    • Winkler WE: Methods for Record Linkage and Bayesian Networks. Research Report Series Statistics #2002-05 2002 [http:// www.census.gov/srd/papers/pdf/ rrs2002-05.pdf]. Washington, DC: Statistical Research Division, U.S. Bureau of the Census
    • (2002) Research Report Series Statistics #2002-05
    • Winkler, W.E.1
  • 51
    • 0002940254 scopus 로고
    • Using the EM algorithm for weight computation in the Fellegi-Sunter model of record linkage
    • American Statistical Association
    • Winkler WE: Using the EM algorithm for weight computation in the Fellegi-Sunter model of record linkage. Proceedings of the Section on Survey Research Methods, American Statistical Association 1988:667-71 [http://www.census.gov/srd/papers/pdf/rr2000-05.pdf].
    • (1988) Proceedings of the Section on Survey Research Methods , pp. 667-671
    • Winkler, W.E.1
  • 52
    • 1842353812 scopus 로고
    • The discrimination power of dependency structures in record linkage
    • Thibaudeau Y: The discrimination power of dependency structures in record linkage. Survey Methodology 1993, 19:31-38.
    • (1993) Survey Methodology , vol.19 , pp. 31-38
    • Thibaudeau, Y.1
  • 58
    • 84884417241 scopus 로고    scopus 로고
    • Preparation of name and address data for record linkage using hidden Markov models
    • Churches T, Christen P, Lim K, Zhu JX: Preparation of name and address data for record linkage using hidden Markov models. BMC Medical Informatics and Decision Making 2002, 2:9 [http:// www.biomedcentral.com/1472-6947/2/9].
    • (2002) BMC Medical Informatics and Decision Making , vol.2 , pp. 9
    • Churches, T.1    Christen, P.2    Lim, K.3    Zhu, J.X.4
  • 59
    • 3242883472 scopus 로고    scopus 로고
    • Threshold protocol for the exchange of confidential medical data
    • Berman JJ: Threshold protocol for the exchange of confidential medical data. BMC Medical Research Methodology 2002, 2:12 [http://www.biomedcentral.com/ 1471-2288/2/12].
    • (2002) BMC Medical Research Methodology , vol.2 , pp. 12
    • Berman, J.J.1
  • 60
    • 4344626072 scopus 로고    scopus 로고
    • Febrl - Freely extensible biomedical record linkage
    • Canberra: Australian National University
    • Christen P, Churches T: Febrl - Freely extensible biomedical record linkage. ANU Computer Science Technical Reports TR-CS-02-05 2002 [http:/ /datamining.anu.edu.au/linkage.html]. Canberra: Australian National University
    • (2002) ANU Computer Science Technical Reports TR-CS-02-05
    • Christen, P.1    Churches, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.