메뉴 건너뛰기




Volumn , Issue , 2007, Pages 318-324

A secure architecture for the pseudonymization of medical data

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER ARCHITECTURE; COMPUTER CONTROL; HEALTH CARE; HOSPITAL DATA PROCESSING; QUALITY OF SERVICE;

EID: 34548159019     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2007.22     Document Type: Conference Paper
Times cited : (39)

References (23)
  • 1
    • 34548181121 scopus 로고    scopus 로고
    • The Austrian Cancer Register
    • The Austrian Cancer Register.
  • 3
    • 34548172993 scopus 로고    scopus 로고
    • Drug-related morbidity and mortality: Updating the cost-of-illness model
    • Technical report
    • F. R. Ernst and A. J. Grizzle. Drug-related morbidity and mortality: Updating the cost-of-illness model. Technical report, 1995.
    • (1995)
    • Ernst, F.R.1    Grizzle, A.J.2
  • 4
    • 34548172993 scopus 로고    scopus 로고
    • Drug-related morbidity and mortality: Updating the cost-of-illness model
    • Technical report
    • F. R. Ernst and A. J. Grizzle. Drug-related morbidity and mortality: Updating the cost-of-illness model. Technical report, 2001.
    • (2001)
    • Ernst, F.R.1    Grizzle, A.J.2
  • 6
    • 34548179891 scopus 로고    scopus 로고
    • An efficient mechanism to ensure location privacy in telecom service applications
    • O. Jorns, S. Bessler, and R. Pailer. An efficient mechanism to ensure location privacy in telecom service applications. In Net-Con 2004, Mallorca, Spain, 2004.
    • (2004) Net-Con 2004, Mallorca, Spain
    • Jorns, O.1    Bessler, S.2    Pailer, R.3
  • 9
    • 33646456203 scopus 로고    scopus 로고
    • The PREPaRe system - Patient Oriented Access to the Personal Electronic Medical Record
    • CARS 2001 Computer Assisted Radiology and Surgery, H.U. Lemke, et al, Eds, Elsevier, Amsterdam, Netherlands
    • S. Maerkle, K. Koechy, R. Tschirley, and H. U. Lemke. The PREPaRe system - Patient Oriented Access to the Personal Electronic Medical Record. In CARS 2001 Computer Assisted Radiology and Surgery, H.U. Lemke, et al. (Eds.), Excerpta Medica International Congress Series, Elsevier, Amsterdam, Netherlands, pages 849-854, 2001.
    • (2001) Excerpta Medica International Congress Series , pp. 849-854
    • Maerkle, S.1    Koechy, K.2    Tschirley, R.3    Lemke, H.U.4
  • 11
    • 34548184949 scopus 로고    scopus 로고
    • A. Pfitzmann and M. Koehntopp. Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management A Consolidated Proposal for Terminology. In Lecture Notes in Computer Science. Springer Berlin / Heidelberg, 2005.
    • A. Pfitzmann and M. Koehntopp. Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management A Consolidated Proposal for Terminology. In Lecture Notes in Computer Science. Springer Berlin / Heidelberg, 2005.
  • 12
    • 0028561148 scopus 로고
    • Medical Requirements for Data Protection
    • K. Pommerening. Medical Requirements for Data Protection. In IFIP Congress, Vol. 2, pages 533-540, 1994.
    • (1994) IFIP Congress , vol.2 , pp. 533-540
    • Pommerening, K.1
  • 13
    • 20444375246 scopus 로고    scopus 로고
    • Secondary use of the Electronic Health Record via pseudonymisation
    • K. Pommerening and M. Reng. Secondary use of the Electronic Health Record via pseudonymisation. Medical Care Compunetics 1, -:441-446, 2004.
    • (2004) Medical Care Compunetics , vol.1 , pp. 441-446
    • Pommerening, K.1    Reng, M.2
  • 14
    • 33746483446 scopus 로고    scopus 로고
    • Implementing EHRs requires a shift in thinking. PHRs-the building blocks of EHRs-may be the quickest path to the fulfillment of disease management
    • 276
    • J. Pope. Implementing EHRs requires a shift in thinking. PHRs-the building blocks of EHRs-may be the quickest path to the fulfillment of disease management. Health Management Technology, 27(6):24,26,120, 2006.
    • (2006) Health Management Technology , vol.24 , Issue.26 , pp. 120
    • Pope, J.1
  • 18
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Commun. ACM, 22(11):612-613, 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 19
    • 34548172730 scopus 로고    scopus 로고
    • Technology, Security and Privacy: The Fear of Frankenstein, the Mythology of Privacy and the Lessons of King Ludd
    • K. Taipale. Technology, Security and Privacy: The Fear of Frankenstein, the Mythology of Privacy and the Lessons of King Ludd. International Journal of Communications Law & Policy, 9:-, 2004.
    • (2004) International Journal of Communications Law & Policy , pp. 9
    • Taipale, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.