Filters








4,256 Hits in 2.8 sec

A secure architecture for the pseudonymization of medical data

Bernhard Riedl, Thomas Neubauer, Gernot Goluch, Oswald Boehm, Gert Reinauer, Alexander Krumboeck
2007 The Second International Conference on Availability, Reliability and Security (ARES'07)  
This paper provides a new architecture for the pseudonymization of medical data that combines primary and secondary use in one system and thus provides a solution to vulnerabilities of existing approaches  ...  However, patients and commissioners for data protection have legitimate concerns about the privacy and confidentiality of the stored data.  ...  Acknowledgment This work was performed at Secure Business Austria, a competence center that is funded by the Austrian Federal Ministry of Economics and Labor (BMWA) as well as by the provincial government  ... 
doi:10.1109/ares.2007.22 dblp:conf/IEEEares/RiedlNGBRK07 fatcat:3i6le2mpjzdz5oci4uekainqju

Data Models for the Pseudonymization of DICOM Data

D Abouakil, J Heurix, T Neubauer
2011 2011 44th Hawaii International Conference on System Sciences  
However, for highly sensitive medical data this is often not sufficient. This paper presents a data model for systems using DICOM based on the PIPE pseudonymization approach.  ...  DICOM has become the most widely implemented and supported communications standard for medical imaging. The security of DICOM relies on the encryption of the communication channels.  ...  center Secure Business Austria funded by the Federal Ministry of Economy, Family and Youth of the Republic of Austria and by the City of Vienna.  ... 
doi:10.1109/hicss.2011.136 dblp:conf/hicss/AbouakilHN11 fatcat:2oxmuziskvcy7nvzal5smkbwpi

Improving patients privacy with Pseudonymization

Thomas Neubauer, Bernhard Riedl
2008 Studies in Health Technology and Informatics  
This paper presents the new system PIPE (Pseudonymization of Information for Privacy in e-Health), that differs from existing approaches in its ability to securely integrate primary and secondary usage  ...  e-Health requires the sharing of patient related data when and where necessary.  ...  Acknowledgments This work was performed at Secure Business Austria, a competence center that is funded by the Austrian Federal Ministry of Economics and Labor (BMWA) as well as by the provincial government  ... 
pmid:18487812 fatcat:ljicrujckva5vbculkam6ybypq

Recognition and Pseudonymization of Personal Data in Paper-Based Health Records [chapter]

Stefan Fenz, Johannes Heurix, Thomas Neubauer
2012 Lecture Notes in Business Information Processing  
This paper presents the MEDSEC system for the recognition and pseudonymization of personal data in paper-based health records.  ...  While the digitization of medical data and the organization of this data within EHRs have been introduced in some areas, massive amounts of paper-based health records are still produced on a daily basis  ...  The research was funded by BRIDGE (#824884) and by COMET K1, FFG -Austrian Research Promotion Agency.  ... 
doi:10.1007/978-3-642-30359-3_14 fatcat:in7gvmsphfa4nb5xagxlmjn5gq

An evaluation of technologies for the pseudonymization of medical data

Thomas Neubauer, Andreas Ekelhart
2009 Proceedings of the 2009 ACM symposium on Applied Computing - SAC '09  
Although, it is a fundamental right of every individual to demand privacy and a variety of laws were enacted that demand the protection of patients' privacy, approaches for protecting privacy often do  ...  Thereby, it supports decision makers in deciding on privacy systems and researchers in identifying the gaps of current approaches for privacy protection as a basis for further research.  ...  As shown in figure 2 , the link between personal data and pseudonymized medical data is protected through a hull-architecture.  ... 
doi:10.1145/1529282.1529465 dblp:conf/sac/NeubauerE09 fatcat:hfchk6oeazbo3ah4gpa5st5kuq

An Evaluation of Technologies for the Pseudonymization of Medical Data [chapter]

Thomas Neubauer, Mathias Kolb
2009 Studies in Computational Intelligence  
Although, it is a fundamental right of every individual to demand privacy and a variety of laws were enacted that demand the protection of patients' privacy, approaches for protecting privacy often do  ...  Thereby, it supports decision makers in deciding on privacy systems and researchers in identifying the gaps of current approaches for privacy protection as a basis for further research.  ...  As shown in figure 2 , the link between personal data and pseudonymized medical data is protected through a hull-architecture.  ... 
doi:10.1007/978-3-642-01209-9_5 fatcat:63nlofra3nbajklpzb346ozfb4

A Secure e-Health Architecture based on the Appliance of Pseudonymization

Bernhard Riedl, Veronika Grascher, Thomas Neubauer
2008 Journal of Software  
This paper introduces the new architecture PIPE (Pseudonymization of Information for Privacy in e-Health) that integrates primary and secondary usage of health data.  ...  These concerns and the lack of existing approaches that provide a sufficient level of security raise the need for a system that guarantees data privacy and keeps the access to health data under strict  ...  This work was performed at Secure Business Austria, a competence center that is funded by the Austrian Federal Ministry of Economics and Labor (BMWA) as well as by the provincial government of Vienna.  ... 
doi:10.4304/jsw.3.2.23-32 fatcat:oecnz3y3dbdlxa2t46q5rpkqiy

Technologies for the Pseudonymization of Medical Data: A Legal Evaluation

Thomas Neubauer, Mathias Kolb
2009 2009 Fourth International Conference on Systems  
Although, it is a fundamental right of every individual to demand privacy and a variety of laws were enacted that demand the protection of patients' privacy, approaches for protecting privacy often do  ...  Thereby, it supports decision makers in deciding on privacy systems and researchers in identifying the gaps of current approaches for privacy protection as a basis for further research.  ...  a competence center that is funded by the Austrian Federal Ministry of Economics and Labor (BMWA) as well as by the provincial government of Vienna.  ... 
doi:10.1109/icons.2009.48 dblp:conf/icons/NeubauerK09 fatcat:s4kthmkkjndzrcpmer5ppn3kxa

ID Based Cryptography and Anonymity in Delay/Disruption Tolerant Networks [chapter]

Naveed Ahmad, Haitham Cruickshank, Zhili Sun
2010 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
In addition, we use pseudonyms to provide anonymity and hide the identity of the end user.  ...  In this paper, we will provide security solution for the Delay/Disruption Tolerant Networking in rural areas using this technique.  ...  Acknowledgement We would like to thank the EU Information Society Technologies SATNex II Network of Excellence VIII for supporting this research work.  ... 
doi:10.1007/978-3-642-13618-4_19 fatcat:bqmsbnawajff3knhlvpdbn6n7m

Privacy-Preserving Storage and Access of Medical Data through Pseudonymization and Encryption [chapter]

Johannes Heurix, Thomas Neubauer
2011 Lecture Notes in Computer Science  
This article provides an overview of actual privacy threats and presents a pseudonymization approach that preserves the patient's privacy and data confidentiality.  ...  The solution also addresses the identifying nature of genetic data by extending the basic pseudonymization approach with queryable encryption.  ...  This work was supported by grants of the Austrian Government's BRIDGE Research Initiative (contract 824884) and was performed at the research center Secure Business Austria funded by the Federal Ministry  ... 
doi:10.1007/978-3-642-22890-2_16 fatcat:rkcwdtw35zd25nr4c4s7wmk2ce

Privacy-preserving electronic health record linkage using pseudonym identifiers

Bandar Alhaqbani, Colin Fidge
2008 HealthCom 2008 - 10th International Conference on e-health Networking, Applications and Services  
This is done through the use of indirect pseudonym identifiers. We then explain how this architecture can be implemented using existing technologies.  ...  Here we present an architecture for linking electronic medical records in a way that gives patients control over what information is revealed about them.  ...  The second author is supported by Australian Research Council Linkage-Projects grant LP0776344, Information Security Evaluation of Embedded Computer Software.  ... 
doi:10.1109/health.2008.4600120 fatcat:2mu4gy6kobetdje7jdtganuwmm

Secondary use of the EHR via pseudonymisation

Klaus Pommerening, Michael Reng
2004 Studies in Health Technology and Informatics  
Whereas for one-time use of the data this procedure is straightforward, long-term data accumulation or the necessity of re-identification require a more sophisticated approach.  ...  This paper describes possible model architectures, developed for medical research networks, but useful in other contexts as well.  ...  Discussion I • The TMF model architecture (variants A and B) provides ways for building central data pools for medical and health care research, that -conform to the German and European data protection  ... 
pmid:15747953 fatcat:fr3lstmtlbfmdccbf5baicvh3a

Pseudonymization for improving the Privacy in E-Health Applications

Bernhard Riedl, Veronika Grascher, Stefan Fenz, Thomas Neubauer
2008 Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)  
This paper presents a detailed description of the new system PIPE (Pseudonymization of Information for Privacy in e-Health) which differs from existing approaches in its ability to securely integrate primary  ...  the prevention of health data misuse.  ...  This work was performed at Secure Business Austria, a competence center that is funded by the Austrian Federal Ministry of Economics and Labor (BMWA) as well as by the provincial government of Vienna.  ... 
doi:10.1109/hicss.2008.366 dblp:conf/hicss/RiedlGFN08 fatcat:rgd3idh2ibc5xpkqafayrlfgze

Pseudonymization with Metadata Encryption for Privacy-Preserving Searchable Documents

Johannes Heurix, Michael Karlinger, Thomas Neubauer
2012 2012 45th Hawaii International Conference on System Sciences  
This work presents a security protocol for data privacy that is strictly controlled by the data owner.  ...  The average costs of data leakage are steadily on the rise.  ...  Therefore, this work presents a security architecture for data privacy that is strictly controlled by the data owner, i.e., the data owner decides who is granted access to the data, which takes away the  ... 
doi:10.1109/hicss.2012.491 dblp:conf/hicss/HeurixKN12 fatcat:pyqyxablqvc6rdykvs2cmob3xy

A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration [chapter]

Alevtina Dubovitskaya, Visara Urovi, Matteo Vasirani, Karl Aberer, Michael I. Schumacher
2015 IFIP Advances in Information and Communication Technology  
The contribution of the paper is twofold: Firstly, we propose a secure and scalable cloud eHealth architecture to store and exchange patients' data for the treatment.  ...  Secondly, we present an algorithm for efficient aggregation of the health data for the research purposes from multiple sources independently.  ...  This work was supported by the Nano-Tera initiative, in the framework of an RTD project ISyPeM2: developing therapeutic drug monitoring by designing a point-of-care system to measure drug concentration  ... 
doi:10.1007/978-3-319-18467-8_39 fatcat:tgjtv7dxpzhq5ntewo5dat2d5a
« Previous Showing results 1 — 15 out of 4,256 results