메뉴 건너뛰기




Volumn , Issue , 2008, Pages

Pseudonymization for improving the privacy in e-health applications

Author keywords

[No Author keywords available]

Indexed keywords

ARSENIC COMPOUNDS; COMPUTER NETWORKS; HEALTH CARE; INSURANCE; PIPE;

EID: 51449090174     PISSN: 15301605     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HICSS.2008.366     Document Type: Conference Paper
Times cited : (40)

References (40)
  • 4
    • 33746483446 scopus 로고    scopus 로고
    • Implementing EHRs requires a shift in thinking. PHRs - the building blocks of EHRs - may be the quickest path to the fulfillment of disease management
    • J. Pope, "Implementing EHRs requires a shift in thinking. PHRs - the building blocks of EHRs - may be the quickest path to the fulfillment of disease management." Health Management Technology, vol. 27(6), p. 24, 2006.
    • (2006) Health Management Technology , vol.27 , Issue.6 , pp. 24
    • Pope, J.1
  • 5
    • 33644855528 scopus 로고    scopus 로고
    • Hipaa administrative simplification: Enforcement; final rule
    • United States Department of Health & Human Service
    • United States Department of Health & Human Service, "Hipaa administrative simplification: Enforcement; final rule," Federal Register / Rules and Regulations, vol. Vol. 71, No. 32, 2006.
    • (2006) Federal Register / Rules and Regulations, vol , vol.71 , Issue.32
  • 6
    • 0003187764 scopus 로고
    • Directive 95/46/ec of the european parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
    • European Union, "Directive 95/46/ec of the european parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data." Official Journal of the European Communities, vol. L 281, pp. 31-50, 1995, http://europa.eu/scadplus/leg/en/lvb/l14012.htm.
    • (1995) Official Journal of the European Communities , vol.L 281 , pp. 31-50
  • 7
    • 51449099498 scopus 로고
    • Council of Europe, Martinus Nijhoff Publishers
    • Council of Europe, European Convention on Human Rights. Martinus Nijhoff Publishers, 1987.
    • (1987) European Convention on Human Rights
  • 8
    • 51449088297 scopus 로고    scopus 로고
    • Datenschutzgesetz 2000 (DSG 2000), BGBl. I Nr. 165/1999
    • Republic of Austria
    • Republic of Austria, "Datenschutzgesetz 2000 (DSG 2000), BGBl. I Nr. 165/1999," 1999.
    • (1999)
  • 11
    • 33745883087 scopus 로고    scopus 로고
    • Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management A Consolidated Proposal for Terminology
    • Springer Berlin, Heidelberg
    • A. Pfitzmann and M. Koehntopp., "Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management A Consolidated Proposal for Terminology," in Lecture Notes in Computer Science. Springer Berlin / Heidelberg, 2005.
    • (2005) Lecture Notes in Computer Science
    • Pfitzmann, A.1    Koehntopp, M.2
  • 12
    • 34548172730 scopus 로고    scopus 로고
    • Technology, Security and Privacy: The Fear of Frankenstein, the Mythology of Privacy and the Lessons of King Ludd
    • K. Taipale, "Technology, Security and Privacy: The Fear of Frankenstein, the Mythology of Privacy and the Lessons of King Ludd," International Journal of Communications Law & Policy, vol. 9, 2004.
    • (2004) International Journal of Communications Law & Policy , vol.9
    • Taipale, K.1
  • 13
    • 51449120817 scopus 로고    scopus 로고
    • Patent: Encryption system for allowing immediate universal access to medical records while maintaining complete patient control over privacy, US Patent US 2003/0074564 A1, 2003
    • R. L. Peterson, "Patent: Encryption system for allowing immediate universal access to medical records while maintaining complete patient control over privacy," US Patent US 2003/0074564 A1, 2003.
    • Peterson, R.L.1
  • 15
    • 0037768626 scopus 로고    scopus 로고
    • Privacy enhancing technologies: The key to secure communication and management of clinical and genomic data
    • G. de Moor, B. Claerhout, and F. de Meyer, "Privacy enhancing technologies: the key to secure communication and management of clinical and genomic data," Methods of information in medicine, vol. 42, pp. 148-153, 2003.
    • (2003) Methods of information in medicine , vol.42 , pp. 148-153
    • de Moor, G.1    Claerhout, B.2    de Meyer, F.3
  • 16
    • 0033772930 scopus 로고    scopus 로고
    • J. Gulcher, K. Kristjansson, H. Gudbjartsson, K., and Stefanson, Protection of privacy by third-party encryption in genetic research, European journal of human genetics, 8, pp. 739-742, 2000.
    • J. Gulcher, K. Kristjansson, H. Gudbjartsson, K., and Stefanson, "Protection of privacy by third-party encryption in genetic research," European journal of human genetics, vol. 8, pp. 739-742, 2000.
  • 17
    • 0028561148 scopus 로고
    • Medical Requirements for Data Protection
    • Online, Available
    • K. Pommerening, "Medical Requirements for Data Protection," in Proceedings of IFIP Congress, Vol. 2, 1994, pp. 533-540. [Online]. Available: citeseer.ist.psu.edu/330589.html
    • (1994) Proceedings of IFIP Congress , vol.2 , pp. 533-540
    • Pommerening, K.1
  • 19
    • 34247363980 scopus 로고    scopus 로고
    • Research challenges for electronic health records
    • D. Lobach and D. Detmer, "Research challenges for electronic health records," American Journal of Preventive Medicine, vol. 32, Issue 5, pp. 104-111, 2007.
    • (2007) American Journal of Preventive Medicine , vol.32 , Issue.5 , pp. 104-111
    • Lobach, D.1    Detmer, D.2
  • 25
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 26
    • 85015402934 scopus 로고
    • Use of elliptic curves in cryptography, Lecture notes in computer sciences, vol. 218 on Advances in cryptology
    • V. S. Miller, "Use of elliptic curves in cryptography," Lecture notes in computer sciences, vol. 218 on Advances in cryptology - CRYPTO 85, pp. 417-426, 1986.
    • (1986) CRYPTO , vol.85 , pp. 417-426
    • Miller, V.S.1
  • 29
    • 0004093038 scopus 로고    scopus 로고
    • New York, NY, USA: John Wiley & Sons, Inc
    • W. Rankl and W. Effing, Smart Card Handbook. New York, NY, USA: John Wiley & Sons, Inc., 1997.
    • (1997) Smart Card Handbook
    • Rankl, W.1    Effing, W.2
  • 34
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 37
    • 51449093829 scopus 로고    scopus 로고
    • Patent: Verfahren zum be- oder verarbeiten von daten, German Patent, DE 199 25 910 A1, 2001
    • V. Schmidt, W. Striebel, H. Prihoda, M. Becker, and G. D. Lijzer, "Patent: Verfahren zum be- oder verarbeiten von daten," German Patent, DE 199 25 910 A1, 2001.
    • Schmidt, V.1    Striebel, W.2    Prihoda, H.3    Becker, M.4    Lijzer, G.D.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.