메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Anonymisation vs. pseudonymisation: Which one is most useful for both privacy protection and usefulness of e-healthcare data

Author keywords

[No Author keywords available]

Indexed keywords

HEALTH CARE;

EID: 77950330795     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/icitst.2009.5402501     Document Type: Conference Paper
Times cited : (8)

References (23)
  • 1
    • 84990370617 scopus 로고    scopus 로고
    • An authentication architecture for healthcare information systems
    • C. Chousiadis, I. K. Mavridis, and G. I. Pangalos, "An authentication architecture for healthcare information systems," Health Informatics Journal, vol. 8, pp. 199, 2002.
    • (2002) Health Informatics Journal , vol.8 , pp. 199
    • Chousiadis, C.1    Mavridis, I.K.2    Pangalos, G.I.3
  • 2
    • 0035177398 scopus 로고    scopus 로고
    • Delivering the electronic healthcare record for the 21st century
    • J. Grimson, "Delivering the electronic healthcare record for the 21st century," International Journal of Medical Informatics, vol. 64, pp. 111-127, 2001.
    • (2001) International Journal of Medical Informatics , vol.64 , pp. 111-127
    • Grimson, J.1
  • 3
    • 49249087521 scopus 로고    scopus 로고
    • Heuristics for de-identifying health data
    • K. El Emam, "Heuristics for de-identifying health data," IEEE Security & Privacy, vol. 6, pp. 58-61, 2008.
    • (2008) IEEE Security & Privacy , vol.6 , pp. 58-61
    • El Emam, K.1
  • 4
    • 0002779304 scopus 로고    scopus 로고
    • Privacy, information technology, and health care
    • C. R. Thomas, "Privacy, information technology, and health care," Commun. ACM, vol. 40, pp. 92-100, 1997.
    • (1997) Commun. ACM , vol.40 , pp. 92-100
    • Thomas, C.R.1
  • 5
    • 33745183324 scopus 로고    scopus 로고
    • HIT and MIS: Implications of health information technology and medical information systems
    • P. G. Goldschmidt, "HIT and MIS: implications of health information technology and medical information systems," Commun. ACM, vol. 48, pp. 68-74, 2005.
    • (2005) Commun. ACM , vol.48 , pp. 68-74
    • Goldschmidt, P.G.1
  • 7
    • 67849099103 scopus 로고    scopus 로고
    • Privacy preservation and information security protection for patients' portable electronic health records
    • L. C. Huang, H. C. Chu, C. Y. Lien, C. H. Hsiao, and T. Kao, "Privacy preservation and information security protection for patients' portable electronic health records," Computers in Biology and Medicine, 2009.
    • (2009) Computers in Biology and Medicine
    • Huang, L.C.1    Chu, H.C.2    Lien, C.Y.3    Hsiao, C.H.4    Kao, T.5
  • 9
    • 84937564790 scopus 로고    scopus 로고
    • Anonymity, unobservability, and pseudonymity-a proposal for terminology
    • A. Pfitzmann and M. Kohntopp, "Anonymity, unobservability, and pseudonymity-a proposal for terminology," Lecture Notes in Computer Science, pp. 1-9, 2001.
    • (2001) Lecture Notes in Computer Science , pp. 1-9
    • Pfitzmann, A.1    Kohntopp, M.2
  • 10
    • 85016682337 scopus 로고    scopus 로고
    • Privacy through pseudonymity in user-adaptive systems
    • J
    • K. Alfred, J, and S. rg, "Privacy through pseudonymity in user-adaptive systems," ACM Trans. Internet Technol, vol.3, pp. 149-183, 2003.
    • (2003) ACM Trans. Internet Technol , vol.3 , pp. 149-183
    • Alfred, K.1    Rg, S.2
  • 16
    • 33745183962 scopus 로고    scopus 로고
    • Usable privacy and security for personal information management
    • K. Clare-Marie, B. Carolyn, and K. John, "Usable privacy and security for personal information management," Commun. ACM, vol.49, pp. 56-57, 2006.
    • (2006) Commun. ACM , vol.49 , pp. 56-57
    • Clare-Marie, K.1    Carolyn, B.2    John, K.3
  • 18
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • D. Chaum, "Security without identification: transaction systems to make big brother obsolete," Commun. ACM, vol.28, pp. 1030-1044,1985.
    • (1985) Commun. ACM , vol.28 , pp. 1030-1044
    • Chaum, D.1
  • 21
    • 13444310528 scopus 로고    scopus 로고
    • Privacy protection for clinical and genomic data the use of privacyenhancing techniques in medicine
    • B. Claerhout and G. J. E. DeMoor, "Privacy protection for clinical and genomic data The use of privacyenhancing techniques in medicine," International Journal of Medical Informatics, vol.74, pp. 257-265, 2005.
    • (2005) International Journal of Medical Informatics , vol.74 , pp. 257-265
    • Claerhout, B.1    Demoor, G.J.E.2
  • 22
    • 34548557737 scopus 로고    scopus 로고
    • Multi-centric Universal Pseudonymisation for Secondary Use of the EHR
    • L. L. Iacono, "Multi-centric Universal Pseudonymisation for Secondary Use of the EHR," Studies in health technology and informatics, vol.126, pp. 239, 2007.
    • (2007) Studies in Health Technology and Informatics , vol.126 , pp. 239
    • Iacono, L.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.