메뉴 건너뛰기




Volumn 52, Issue , 2010, Pages 369-380

Electronic health records: An enhanced security paradigm to preserve patient's privacy

Author keywords

[No Author keywords available]

Indexed keywords

COST-EFFICIENT; DEMOGRAPHIC CHANGES; E-HEALTH SERVICES; EHR SYSTEMS; ELECTRONIC HEALTH RECORD; EMERGING MARKETS; HIGHLY SENSITIVE; HOLISTIC APPROACH; MEDICAL DATA; PERSONAL HEALTH RECORD; PRIVACY ISSUE; RAPID GROWTH; SECURITY AND PRIVACY; TREATMENT COSTS;

EID: 77950345299     PISSN: 18650929     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-11721-3_29     Document Type: Article
Times cited : (2)

References (29)
  • 1
    • 77950352511 scopus 로고    scopus 로고
    • HI: Harris Interactive, Survey on Medical Privacy (2004), http://www.harrisinteractive.com/news/newsletters/healthnews/ HI HealthCareNews2004Vol4 Iss13.pdf
    • (2004) Survey on Medical Privacy
  • 2
    • 9144247839 scopus 로고    scopus 로고
    • Access to Electronic health records in primary care - A survey of patients' views
    • Pyper, C., Amery, J., Watson, M., Crook, C.: Access to Electronic health records in primary care - a survey of patients' views. Med. Sci. Monit. 10(11), 17-22 (2004)
    • (2004) Med. Sci. Monit. , vol.10 , Issue.11 , pp. 17-22
    • Pyper, C.1    Amery, J.2    Watson, M.3    Crook, C.4
  • 3
    • 77950352790 scopus 로고    scopus 로고
    • TCG: Trusted Computing Group (2008), http://www.trustedcomputinggroup.org
    • (2008)
  • 6
    • 33645344483 scopus 로고    scopus 로고
    • A review of security of electronic health records
    • Win, K.T.: A review of security of electronic health records. HIM J. 34(1), 13-18 (2005)
    • (2005) HIM J. , vol.34 , Issue.1 , pp. 13-18
    • Win, K.T.1
  • 8
    • 58149354681 scopus 로고    scopus 로고
    • Privacy enhancing methods for ehealth applications: How to prevent statistical analyses and attacks
    • Stingl, C., Slamanig, D.: Privacy Enhancing Methods for eHealth Applications: How to Prevent Statistical Analyses and Attacks. Int. J. Business Intelligence and Data Mining 3, 236-254 (2008)
    • (2008) Int. J. Business Intelligence and Data Mining , vol.3 , pp. 236-254
    • Stingl, C.1    Slamanig, D.2
  • 9
    • 35248849922 scopus 로고    scopus 로고
    • Modelling unlinkability
    • Dingledine R. (ed.) PET 2003. Springer, Heidelberg
    • Steinbrecher, S., Köpsell, S.: Modelling Unlinkability. In: Dingledine, R. (ed.) PET 2003. LNCS, vol.2760, pp. 32-47. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2760 , pp. 32-47
    • Steinbrecher, S.1    Köpsell, S.2
  • 11
    • 67650522224 scopus 로고    scopus 로고
    • A secure e-health architecture based on the appliance of pseudonymization
    • Riedl, B., Grascher, V., Neubauer, T.: A Secure e-Health Architecture based on the Appliance of Pseudonymization. Journal of Software 3, 23-32 (2008)
    • (2008) Journal of Software , vol.3 , pp. 23-32
    • Riedl, B.1    Grascher, V.2    Neubauer, T.3
  • 12
    • 58149336618 scopus 로고    scopus 로고
    • Preserving privacy in a web-based multiuser-system (German)
    • Horster P. (ed.) IT-Verlag
    • Slamanig, D., Stingl, C., Lackner, G., Payer, U.: Preserving Privacy in a Web-based Multiuser-System (German). In: Horster, P. (ed.) Proceedings of DACH-Security 2007, pp. 98-110. IT-Verlag (2007)
    • (2007) Proceedings of DACH-Security 2007 , pp. 98-110
    • Slamanig, D.1    Stingl, C.2    Lackner, G.3    Payer, U.4
  • 13
    • 50249171823 scopus 로고    scopus 로고
    • A survey of anonymous communication channels
    • Microsoft Research
    • Danezis, G., Diaz, C.: A Survey of Anonymous Communication Channels. Technical Report MSR-TR-2008-2035, Microsoft Research (2008)
    • (2008) Technical Report MSR-TR-2008-2035
    • Danezis, G.1    Diaz, C.2
  • 15
    • 26844534244 scopus 로고    scopus 로고
    • Privacy enhanced technologies: Methods, markets, misuse
    • Katsikas, S.K., Ĺopez, J., Pernul, G. (eds.) TrustBus 2005. Springer, Heidelberg
    • Federrath, H.: Privacy Enhanced Technologies: Methods, Markets, Misuse. In: Katsikas, S.K., Ĺopez, J., Pernul, G. (eds.) TrustBus 2005. LNCS, vol.3592, pp. 1-9. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3592 , pp. 1-9
    • Federrath, H.1
  • 19
    • 84956867779 scopus 로고    scopus 로고
    • Anonymous authentication of membership in dynamic groups
    • Franklin M.K. (ed.) FC 1999. Springer, Heidelberg
    • Schechter, S., Parnell, T., Hartemink, A.: Anonymous Authentication of Membership in Dynamic Groups. In: Franklin, M.K. (ed.) FC 1999. LNCS, vol.1648, pp. 184-195. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1648 , pp. 184-195
    • Schechter, S.1    Parnell, T.2    Hartemink, A.3
  • 20
    • 84921018856 scopus 로고    scopus 로고
    • A practical and provably secure coalition- resistant group signature scheme
    • Bellare M. (ed.) CRYPTO 2000. Springer, Heidelberg
    • Ateniese, G., Camenisch, J., Joye,M., Tsudik, G.: A Practical and Provably Secure Coalition- Resistant Group Signature Scheme. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.1880, pp. 255-270. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1880 , pp. 255-270
    • Ateniese, G.1    Camenisch, J.2    Joye, M.3    Tsudik, G.4
  • 21
    • 85024290278 scopus 로고
    • Group signatures
    • Davies D.W. (ed.) EUROCRYPT 1991. Springer, Heidelberg
    • Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.547, pp. 257-265. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.547 , pp. 257-265
    • Chaum, D.1    Van Heyst, E.2
  • 22
    • 84946833891 scopus 로고    scopus 로고
    • How to Leak a Secret
    • Boyd C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
    • Rivest, R.L., Shamir, A., Tauman, Y.: How to Leak a Secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.2248, pp. 552-565. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2248 , pp. 552-565
    • Rivest, R.L.1    Shamir, A.2    Tauman, Y.3
  • 23
    • 35048854233 scopus 로고    scopus 로고
    • Anonymous identification in Ad hoc groups
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Dodis, Y., Kiayias, A., Nicolosi, A., Shoup, V.: Anonymous Identification in Ad Hoc Groups. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.3027, pp. 609-626. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 609-626
    • Dodis, Y.1    Kiayias, A.2    Nicolosi, A.3    Shoup, V.4
  • 24
    • 79960836060 scopus 로고    scopus 로고
    • Deniable ring authentication
    • Yung M. (ed.) CRYPTO 2002. Springer, Heidelberg
    • Naor, M.: Deniable Ring Authentication. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.2442, pp. 481-498. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 481-498
    • Naor, M.1
  • 26
    • 33646153291 scopus 로고    scopus 로고
    • Privacy-preserving electronic health records
    • Dittmann, J., Katzenbeisser, S., Uhl, A. (eds.) CMS 2005. Springer, Heidelberg
    • Demuynck, L., Decker, B.D.: Privacy-Preserving Electronic Health Records. In: Dittmann, J., Katzenbeisser, S., Uhl, A. (eds.) CMS 2005. LNCS, vol.3677, pp. 150-159. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3677 , pp. 150-159
    • Demuynck, L.1    Decker, B.D.2
  • 27
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24, 84-90 (1981)
    • (1981) Commun. ACM , vol.24 , pp. 84-90
    • Chaum, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.