메뉴 건너뛰기




Volumn 16, Issue 1, 2012, Pages 166-175

Secure management of biomedical data with cryptographic hardware

Author keywords

Cryptographic hardware; Cryptography; Databases; Genomics; Privacy; Security

Indexed keywords

AUTOMATED METHODS; BANDWIDTH CONSTRAINT; BIOMEDICAL COMMUNITY; BIOMEDICAL DATA; BIOMEDICAL INVESTIGATIONS; CLINICAL DATA; CRYPTOGRAPHIC HARDWARE; CRYPTOGRAPHIC PROTOCOLS; DE-IDENTIFICATION; GENOMIC DATA; GENOMICS; MEDICAL CENTER; SECURE PROTOCOLS; SECURITY; THIRD PARTIES;

EID: 84856847778     PISSN: 10897771     EISSN: None     Source Type: Journal    
DOI: 10.1109/TITB.2011.2171701     Document Type: Article
Times cited : (60)

References (41)
  • 1
    • 70350729454 scopus 로고    scopus 로고
    • Comparative effectiveness research and genomic medicine: An evolving partnership for 21st century medicine
    • M. Khoury, E. C. Rich, G. Randhawa, S. Teutsch, and J. Niederhuber, "Comparative effectiveness research and genomic medicine: An evolving partnership for 21st century medicine," Genet. Med., vol. 11, no. 10, pp. 707-711, 2009
    • (2009) Genet. Med. , vol.11 , Issue.10 , pp. 707-711
    • Khoury, M.1    Rich, E.C.2    Randhawa, G.3    Teutsch, S.4    Niederhuber, J.5
  • 2
    • 79951472909 scopus 로고    scopus 로고
    • Charting a course for genomic medicine from base pairs to bedside
    • National Human Genome Research Institute
    • E. Green, M. Guyer, and National Human Genome Research Institute, "Charting a course for genomic medicine from base pairs to bedside," Nature Genet., vol. 470, pp. 204-213, 2011
    • (2011) Nature Genet. , vol.470 , pp. 204-213
    • Green, E.1    Guyer, M.2
  • 3
    • 33644853781 scopus 로고    scopus 로고
    • A call for the creation of per-sonalized medicine databases
    • D. Gurwitz, J. Lunshof, and R. Altman, "A call for the creation of per-sonalized medicine databases," Nature Rev. Drug Discov., vol. 5, no. 1, pp. 23-26,2006
    • (2006) Nature Rev. Drug Discov. , vol.5 , Issue.1 , pp. 23-26
    • Gurwitz, D.1    Lunshof, J.2    Altman, R.3
  • 4
    • 60149102060 scopus 로고    scopus 로고
    • Size matters: Just how big is big?: Quantifying realistic sample size requirements for human genome epidemiology
    • P. Burton, A. Hansell, I. Fortier, T. Manalio, M. Khoury, J. Little, and P. Elliott, "Size matters: Just how big is big?: Quantifying realistic sample size requirements for human genome epidemiology," Int. J. Epidemiol., vol. 38, no. 1, pp. 263-273, 2009
    • (2009) Int. J. Epidemiol. , vol.38 , Issue.1 , pp. 263-273
    • Burton, P.1    Hansell, A.2    Fortier, I.3    Manalio, T.4    Khoury, M.5    Little, J.6    Elliott, P.7
  • 7
    • 41849087888 scopus 로고    scopus 로고
    • The UK biobank sample handling and storage validation studies
    • T. Peakman and P. Elliott, "The UK biobank sample handling and storage validation studies," Int. J. Epidemiol., vol. 37, Suppl 1, pp. i2-i6, 2008
    • (2008) Int. J. Epidemiol. , vol.37 , Issue.SUPPL. 1
    • Peakman, T.1    Elliott, P.2
  • 8
    • 11144348715 scopus 로고    scopus 로고
    • An evaluation of the current state of genomic data privacy protection technology and a roadmap for the future
    • DOI 10.1197/jamia.M1603, PII S1067502704001549
    • B. Malin, "An evaluation of the current state of genomic data privacy protection technology and a roadmap for the future," J. Amer. Med. Informat. Assoc., vol. 12, no. 1, pp. 28-34, 2005 (Pubitemid 40038620)
    • (2005) Journal of the American Medical Informatics Association , vol.12 , Issue.1 , pp. 28-34
    • Malin, B.A.1
  • 9
    • 77953149045 scopus 로고    scopus 로고
    • Evaluating re-identification risks with respect to the HIPAA Privacy Rule
    • K. Benitez and B. Malin, "Evaluating re-identification risks with respect to the HIPAA Privacy Rule," J. Amer. Med. Informat. Assoc., vol. 17, no. 2, pp. 169-177, 2010
    • (2010) J. Amer. Med. Informat. Assoc. , vol.17 , Issue.2 , pp. 169-177
    • Benitez, K.1    Malin, B.2
  • 10
    • 51749089052 scopus 로고    scopus 로고
    • A cryptographic ap-proach to securely share and query genomic sequences
    • Sep.
    • M. Kantarcioglu, W. Jiang, Y. Liu, and B. Malin, "A cryptographic ap-proach to securely share and query genomic sequences," IEEE Trans. Inf. Technol. Biomed., vol. 12, no. 5, pp. 606-617, Sep. 2008
    • (2008) IEEE Trans. Inf. Technol. Biomed. , vol.12 , Issue.5 , pp. 606-617
    • Kantarcioglu, M.1    Jiang, W.2    Liu, Y.3    Malin, B.4
  • 13
    • 33750252128 scopus 로고    scopus 로고
    • Private information storage with logarithm-space secure hardware
    • A. Iliev and S. W. Smith, "Private information storage with logarithm-space secure hardware," in Proc. Int. Inf. Security Workshops, 2004, pp.199-214
    • (2004) Proc. Int. Inf. Security Workshops , pp. 199-214
    • Iliev, A.1    Smith, S.W.2
  • 14
    • 77954517653 scopus 로고    scopus 로고
    • Secure coprocessor-based intrusion detection
    • Sep.
    • X. Zhang et al., "Secure coprocessor-based intrusion detection," in Proc. ACM SIGOPS Eur. Workshop, Sep. 2002, pp. 239-242
    • (2002) Proc. ACM SIGOPS Eur. Workshop , pp. 239-242
    • Zhang, X.1
  • 15
    • 84942776290 scopus 로고    scopus 로고
    • Towards accountable man-agement of identity and privacy: Sticky policies and enforceable tracing services
    • M. C. Mont, S. Pearson, and P. Bramhall, "Towards accountable man-agement of identity and privacy: Sticky policies and enforceable tracing services," in Proc. 14th Int. Workshop Database Expert Syst. Appl., 2003, pp. 377-382
    • (2003) Proc. 14th Int. Workshop Database Expert Syst. Appl. , pp. 377-382
    • Mont, M.C.1    Pearson, S.2    Bramhall, P.3
  • 16
    • 78650202743 scopus 로고    scopus 로고
    • Small, stupid, and scalable: Secure com-puting with faerieplay
    • [Online]. Available
    • A. Iliev and S. W. Smith. (2010). Small, stupid, and scalable: Secure com-puting with faerieplay. in Proc. fifth ACM Workshop on Scalable Trusted Computing, pp. 41-52. [Online]. Available: http://doi.acm.org/10.1145/1867635. 1867643
    • (2010) Proc. Fifth ACM Workshop on Scalable Trusted Computing , pp. 41-52
    • Iliev, A.1    Smith, S.W.2
  • 21
    • 84856902066 scopus 로고    scopus 로고
    • Building disclo-sure risk aware query optimizers for relational databases
    • M. Canim, M. Kantarcioglu, B. Hore, and S. Mehrotra, "Building disclo-sure risk aware query optimizers for relational databases," Proc. VLDB Endowment, vol. 3, no. 1-2, pp. 13-24, 2010
    • (2010) Proc. VLDB Endowment , vol.3 , Issue.1-2 , pp. 13-24
    • Canim, M.1    Kantarcioglu, M.2    Hore, B.3    Mehrotra, S.4
  • 22
    • 70349871610 scopus 로고    scopus 로고
    • Query optimization in en-crypted relational databases by vertical schema partitioning
    • M. Canim, M. Kantarcioglu, and A. Inan, "Query optimization in en-crypted relational databases by vertical schema partitioning," in Proc. Secure Data Manage., 2009, pp. 1-16
    • (2009) Proc. Secure Data Manage. , pp. 1-16
    • Canim, M.1    Kantarcioglu, M.2    Inan, A.3
  • 23
    • 33746639153 scopus 로고    scopus 로고
    • Gene PING: Secure, scalable management ofpersonal genomic data
    • [Online]. Available
    • B. Adida and I. Kohane. (2006). Gene PING: Secure, scalable management ofpersonal genomic data. BMC Genom, 7(1), p. 93. [Online]. Available: http://www.biomedcentral.com/1471-2164/7/93
    • (2006) BMC Genom , vol.7 , Issue.1 , pp. 93
    • Adida, B.1    Kohane, I.2
  • 29
    • 84856876189 scopus 로고    scopus 로고
    • Understanding transparent data encryption (TDE)
    • Understanding transparent data encryption (TDE). (2010). [Online]. Avail-able: http://msdn.microsoft.com/en-us/library/bb934049.aspx
    • (2010)
  • 30
    • 84856924455 scopus 로고    scopus 로고
    • Understanding extensible key management (EKM) [Online] Available
    • Understanding extensible key management (EKM). (2010). [Online]. Available: http://technet.microsoft.com/en-us/library/bb895340.aspx
    • (2010)
  • 31
    • 84861257829 scopus 로고    scopus 로고
    • IBM [Online] Available
    • IBM. (2004). IBM 4764 cryptographic coprocessor. [Online]. Available: http://www.ibm.com/security/cryptocards
    • (2004) IBM 4764 Cryptographic Coprocessor
  • 33
    • 11044228380 scopus 로고    scopus 로고
    • Matchbox: Secure data sharing
    • DOI 10.1109/MIC.2004.68
    • K. Goldman and E. Valdez, "Matchbox: Secure data sharing," IEEE Internet Comput., vol. 8, no. 6, pp. 18-24, Nov./Dec 2004 (Pubitemid 40043363)
    • (2004) IEEE Internet Computing , vol.8 , Issue.6 , pp. 18-24
    • Goldman, K.1    Valdez, E.2
  • 35
    • 84856902063 scopus 로고    scopus 로고
    • National Institute of Standards and Technology National Institute of Standards and Technol-ogy, Tech. Rep. NIST Special Publication FIPS-197. [Online]. Available
    • National Institute of Standards and Technology. (2001). "Advanced en-cryption standard (AES)," National Institute of Standards and Technol-ogy, Tech. Rep. NIST Special Publication FIPS-197. [Online]. Available: http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
    • (2001) Advanced En-cryption Standard (AES)
  • 37
    • 65549130531 scopus 로고    scopus 로고
    • Collaborative genome-wide association studies of diverse diseases: Programs of the NHGRI's office of population genomics
    • T. Manolio, "Collaborative genome-wide association studies of diverse diseases: Programs of the NHGRI's office of population genomics," Phar-macogenomics, vol. 10, no. 2, pp. 235-241, 2009
    • (2009) Phar-macogenomics , vol.10 , Issue.2 , pp. 235-241
    • Manolio, T.1
  • 40
    • 84856902065 scopus 로고    scopus 로고
    • Security standards for the protec-tion of electronic protected health information
    • Dept. of Health and Human Services Feb. 20
    • Dept. of Health and Human Services, "Security standards for the protec-tion of electronic protected health information," Federal Register, vol. 45, no. 164, Feb. 20, 2003
    • (2003) Federal Register , vol.45 , Issue.164
  • 41
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases: A comparative study
    • N. R. Adam and J. C. Worthmann, "Security-control methods for statistical databases: A comparative study," ACM Comput. Surveys, vol. 21, no. 4, pp. 515-556, 1989.
    • (1989) ACM Comput. Surveys , vol.21 , Issue.4 , pp. 515-556
    • Adam, N.R.1    Worthmann, J.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.