메뉴 건너뛰기




Volumn 48, Issue 1, 2010, Pages 29-41

Secure construction of k-unlinkable patient records from distributed providers

Author keywords

Anonymization algorithms; Confidentiality; Distributed databases; Electronic medical records; Privacy

Indexed keywords

ALGORITHMIC APPROACH; ANONYMIZATION; ANONYMIZATION ALGORITHMS; BIOMEDICAL DATA; DATA PROTECTION; DATABANKS; DISTRIBUTED DATABASE; ELECTRONIC MEDICAL RECORD; EXTENDED FORM; HEALTHCARE ORGANIZATIONS; HOSPITAL DISCHARGE; PATIENT INFORMATION; PATIENT RECORD; PRIOR KNOWLEDGE; SECURE PROTOCOLS; SENSITIVE INFORMATIONS; SICKLE-CELL ANEMIA; THIRD PARTIES; UNLINKABILITY;

EID: 73449145604     PISSN: 09333657     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.artmed.2009.09.002     Document Type: Article
Times cited : (12)

References (51)
  • 1
    • 73449096462 scopus 로고    scopus 로고
    • National Institutes of Health. Final NIH statement on sharing research data. NOT-OD-03-032; February 2003.
    • National Institutes of Health. Final NIH statement on sharing research data. NOT-OD-03-032; February 2003.
  • 2
    • 0036363705 scopus 로고    scopus 로고
    • Future of security and privacy in medical information
    • Wiederhold G. Future of security and privacy in medical information. Stud Health Technol Inform 80 (2002) 213-229
    • (2002) Stud Health Technol Inform , vol.80 , pp. 213-229
    • Wiederhold, G.1
  • 3
    • 0036754633 scopus 로고    scopus 로고
    • Confidentiality issues for medical data miners
    • Berman J.J. Confidentiality issues for medical data miners. Artif Intell Med 26 1-2 (2002) 25-36
    • (2002) Artif Intell Med , vol.26 , Issue.1-2 , pp. 25-36
    • Berman, J.J.1
  • 5
    • 73449136180 scopus 로고    scopus 로고
    • National Institutes of Health. Policy for sharing of data obtained in NIH supported or conducted genome-wide association studies (GWAS). NOT-OD-07-088; August 2007.
    • National Institutes of Health. Policy for sharing of data obtained in NIH supported or conducted genome-wide association studies (GWAS). NOT-OD-07-088; August 2007.
  • 6
    • 33846936304 scopus 로고    scopus 로고
    • Evaluating common de-identification heuristics for personal health information
    • El Emam K., Jabbouri S., Sams S., Drouet Y., and Power M. Evaluating common de-identification heuristics for personal health information. J Med Internet Res 8 4 (2006) e28
    • (2006) J Med Internet Res , vol.8 , Issue.4
    • El Emam, K.1    Jabbouri, S.2    Sams, S.3    Drouet, Y.4    Power, M.5
  • 8
    • 11144348715 scopus 로고    scopus 로고
    • An evaluation of the current state of genomic data privacy protection technology and a roadmap for the future
    • Malin B. An evaluation of the current state of genomic data privacy protection technology and a roadmap for the future. J Am Med Inform Assoc 12 January-February (1) (2005) 28-34
    • (2005) J Am Med Inform Assoc , vol.12 , Issue.January-February 1 , pp. 28-34
    • Malin, B.1
  • 10
    • 0031150446 scopus 로고    scopus 로고
    • Weaving technology and policy together to maintain confidentiality
    • Sweeney L. Weaving technology and policy together to maintain confidentiality. J Law Med Ethics 25 Summer-Fall (2-3) (1997) 98-110
    • (1997) J Law Med Ethics , vol.25 , Issue.Summer-Fall 2-3 , pp. 98-110
    • Sweeney, L.1
  • 11
    • 2942522665 scopus 로고    scopus 로고
    • How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems
    • Malin B., and Sweeney L. How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems. J Biomed Inform 37 3 (2004) 179-192
    • (2004) J Biomed Inform , vol.37 , Issue.3 , pp. 179-192
    • Malin, B.1    Sweeney, L.2
  • 12
    • 36049037582 scopus 로고    scopus 로고
    • K-unlinkability: a formal privacy protection model for distributed data
    • Malin B. K-unlinkability: a formal privacy protection model for distributed data. Data Knowledge Eng 64 (2008) 294-311
    • (2008) Data Knowledge Eng , vol.64 , pp. 294-311
    • Malin, B.1
  • 13
    • 34447262334 scopus 로고    scopus 로고
    • A computational model to protect patient data from location-based re-identification
    • Malin B. A computational model to protect patient data from location-based re-identification. Artif Intell Med 40 3 (2007) 223-239
    • (2007) Artif Intell Med , vol.40 , Issue.3 , pp. 223-239
    • Malin, B.1
  • 14
    • 39049178823 scopus 로고    scopus 로고
    • A secure protocol to distribute unlinkable health data
    • Malin B., and Sweeney L. A secure protocol to distribute unlinkable health data. AMIA Annu Symp Proc (2005) 485-489
    • (2005) AMIA Annu Symp Proc , pp. 485-489
    • Malin, B.1    Sweeney, L.2
  • 15
    • 33749641301 scopus 로고    scopus 로고
    • Composition and disclosure of unlinkable distributed databases
    • Liu L., Reuter A., Whang K.Y., and Zhang J. (Eds), IEEE CS Press, New York
    • Malin B., and Sweeney L. Composition and disclosure of unlinkable distributed databases. In: Liu L., Reuter A., Whang K.Y., and Zhang J. (Eds). Proceedings of 22nd IEEE international conference on data engineering (2006), IEEE CS Press, New York 118
    • (2006) Proceedings of 22nd IEEE international conference on data engineering , pp. 118
    • Malin, B.1    Sweeney, L.2
  • 17
    • 0036811143 scopus 로고    scopus 로고
    • Achieving k-anonymity privacy protection using generalization and suppression
    • Sweeney L. Achieving k-anonymity privacy protection using generalization and suppression. Int J Uncertainty Fuzziness Knowledge-based Syst 10 5 (2002) 571-588
    • (2002) Int J Uncertainty Fuzziness Knowledge-based Syst , vol.10 , Issue.5 , pp. 571-588
    • Sweeney, L.1
  • 18
    • 0033105319 scopus 로고    scopus 로고
    • Using Boolean reasoning to anonymize databases
    • Øhrn A., and Ohno-Machado L. Using Boolean reasoning to anonymize databases. Artif Intell Med 15 (1999) 235-254
    • (1999) Artif Intell Med , vol.15 , pp. 235-254
    • Øhrn, A.1    Ohno-Machado, L.2
  • 20
    • 33947621113 scopus 로고    scopus 로고
    • Securing electronic health records without impeding the flow of information
    • Agrawal R., and Johnson C. Securing electronic health records without impeding the flow of information. Int J Med Inform 76 5-6 (2007) 471-479
    • (2007) Int J Med Inform , vol.76 , Issue.5-6 , pp. 471-479
    • Agrawal, R.1    Johnson, C.2
  • 21
    • 33845788271 scopus 로고    scopus 로고
    • An unsupervised classification method for inferring original case locations from low-resolution disease maps
    • Brownstein J., Cassa C., Kohane I., and Mandl K. An unsupervised classification method for inferring original case locations from low-resolution disease maps. Int J Health Geogr 6 (2006) 56
    • (2006) Int J Health Geogr , vol.6 , pp. 56
    • Brownstein, J.1    Cassa, C.2    Kohane, I.3    Mandl, K.4
  • 22
    • 33644669418 scopus 로고    scopus 로고
    • A context-sensitive approach to anonymizing spatial surveillance data: impact on outbreak detection
    • Cassa C., Grannis S., Overhage M., and Mandl K. A context-sensitive approach to anonymizing spatial surveillance data: impact on outbreak detection. J Am Med Inform Assoc 13 2 (2006) 160-165
    • (2006) J Am Med Inform Assoc , vol.13 , Issue.2 , pp. 160-165
    • Cassa, C.1    Grannis, S.2    Overhage, M.3    Mandl, K.4
  • 25
    • 3042797039 scopus 로고    scopus 로고
    • Privacy: a machine learning view
    • Vinterbo S. Privacy: a machine learning view. IEEE Trans Knowledge Data Eng 16 8 (2004) 939-948
    • (2004) IEEE Trans Knowledge Data Eng , vol.16 , Issue.8 , pp. 939-948
    • Vinterbo, S.1
  • 28
    • 73449141494 scopus 로고    scopus 로고
    • Winkler W. Using simulated annealing for k-anonymity. Washington, DC: US Census Bureau Statistical Research Division. Technical Report 2002-07; 2002.
    • Winkler W. Using simulated annealing for k-anonymity. Washington, DC: US Census Bureau Statistical Research Division. Technical Report 2002-07; 2002.
  • 29
    • 41849147857 scopus 로고    scopus 로고
    • Allowing privacy problems to jump out of local optimums: an ordered greed framework
    • Bonchi F., Ferrari E., Malin B., and Saygin Y. (Eds), Springer
    • Chaytor R. Allowing privacy problems to jump out of local optimums: an ordered greed framework. In: Bonchi F., Ferrari E., Malin B., and Saygin Y. (Eds). Proceedings of the 1st ACM SIGKDD workshop on privacy, security, and trust in KDD (2008), Springer 33-55
    • (2008) Proceedings of the 1st ACM SIGKDD workshop on privacy, security, and trust in KDD , pp. 33-55
    • Chaytor, R.1
  • 32
    • 36048997303 scopus 로고    scopus 로고
    • A secure distributed framework for achieving k-anonymity
    • Jiang W., and Clifton C. A secure distributed framework for achieving k-anonymity. VLDB J 15 4 (2006) 316-333
    • (2006) VLDB J , vol.15 , Issue.4 , pp. 316-333
    • Jiang, W.1    Clifton, C.2
  • 34
    • 84919085619 scopus 로고
    • An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
    • Pohlig S., and Hellman M. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Trans Information Theory 24 (1978) 106-110
    • (1978) IEEE Trans Information Theory , vol.24 , pp. 106-110
    • Pohlig, S.1    Hellman, M.2
  • 35
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest R., Shamir A., and Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21 2 (1978) 120-126
    • (1978) Commun ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 36
    • 4544361334 scopus 로고    scopus 로고
    • Privacy-preserving distributed mining of association rules on horizontally partitioned data
    • Kantarcioglu M., and Clifton C. Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans Knowledge Data Eng 16 9 (2004) 1026-1037
    • (2004) IEEE Trans Knowledge Data Eng , vol.16 , Issue.9 , pp. 1026-1037
    • Kantarcioglu, M.1    Clifton, C.2
  • 37
    • 28444494676 scopus 로고    scopus 로고
    • Configurable security protocols for multi-party data analysis with malicious participants
    • Aberer K., Franklin M., and Nishio S. (Eds), IEEE CS Press, New York
    • Malin B., Airoldi E., Edoho-Eket S., and Li Y. Configurable security protocols for multi-party data analysis with malicious participants. In: Aberer K., Franklin M., and Nishio S. (Eds). Proceedings of the 21st IEEE international conference on data engineering (2005), IEEE CS Press, New York 533-544
    • (2005) Proceedings of the 21st IEEE international conference on data engineering , pp. 533-544
    • Malin, B.1    Airoldi, E.2    Edoho-Eket, S.3    Li, Y.4
  • 38
    • 2942627386 scopus 로고    scopus 로고
    • State of Illinois Health Care Cost Containment Council, Springfield, IL: State of Illinois Health Care Cost Containment Council; March
    • State of Illinois Health Care Cost Containment Council. Data release overview. Springfield, IL: State of Illinois Health Care Cost Containment Council; March 1998.
    • (1998) Data release overview
  • 41
    • 1542374034 scopus 로고    scopus 로고
    • Zero-check: a zero-knowledge protocol for reconciling patient identities across institutions
    • Berman J.J. Zero-check: a zero-knowledge protocol for reconciling patient identities across institutions. Arch Pathol Lab Med 128 March (3) (2004) 344-346
    • (2004) Arch Pathol Lab Med , vol.128 , Issue.March 3 , pp. 344-346
    • Berman, J.J.1
  • 42
    • 0642275698 scopus 로고    scopus 로고
    • A proposed architecture and method of operation for improving the protection of privacy and confidentiality in disease registers
    • Churches T. A proposed architecture and method of operation for improving the protection of privacy and confidentiality in disease registers. BMC Med Res Methodol 3 1 (2003) 1
    • (2003) BMC Med Res Methodol , vol.3 , Issue.1 , pp. 1
    • Churches, T.1
  • 43
    • 0037768626 scopus 로고    scopus 로고
    • Privacy enhancing technologies: the key to secure communication and management of clinical and genomic data
    • de Moor G., Claerhout B., and de Meyer F. Privacy enhancing technologies: the key to secure communication and management of clinical and genomic data. Methods Inf Med 42 (2003) 148-153
    • (2003) Methods Inf Med , vol.42 , pp. 148-153
    • de Moor, G.1    Claerhout, B.2    de Meyer, F.3
  • 45
    • 14844352151 scopus 로고    scopus 로고
    • Ethical and legal aspects of applied genomic technologies: practical solutions
    • Manasco P. Ethical and legal aspects of applied genomic technologies: practical solutions. Curr Mol Med 5 February (2005) 23-28
    • (2005) Curr Mol Med , vol.5 , Issue.February , pp. 23-28
    • Manasco, P.1
  • 46
    • 15544384731 scopus 로고    scopus 로고
    • Security infrastructure services for electronic archives and electronic health records
    • Pharow P., and Blobel B. Security infrastructure services for electronic archives and electronic health records. Stud Health Technol Inform 103 (2004) 434-440
    • (2004) Stud Health Technol Inform , vol.103 , pp. 434-440
    • Pharow, P.1    Blobel, B.2
  • 49
    • 13444256330 scopus 로고    scopus 로고
    • Some methods for blindfolded record linkage
    • Churches T., and Christen P. Some methods for blindfolded record linkage. BMC Med Inform Decis Mak 4 June (2004) 9
    • (2004) BMC Med Inform Decis Mak , vol.4 , Issue.June , pp. 9
    • Churches, T.1    Christen, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.