Filters








3,124 Hits in 2.5 sec

A Secure e-Health Architecture based on the Appliance of Pseudonymization

Bernhard Riedl, Veronika Grascher, Thomas Neubauer
2008 Journal of Software  
These concerns and the lack of existing approaches that provide a sufficient level of security raise the need for a system that guarantees data privacy and keeps the access to health data under strict  ...  This paper introduces the new architecture PIPE (Pseudonymization of Information for Privacy in e-Health) that integrates primary and secondary usage of health data.  ...  This work was performed at Secure Business Austria, a competence center that is funded by the Austrian Federal Ministry of Economics and Labor (BMWA) as well as by the provincial government of Vienna.  ... 
doi:10.4304/jsw.3.2.23-32 fatcat:oecnz3y3dbdlxa2t46q5rpkqiy

Pseudonymization for improving the Privacy in E-Health Applications

Bernhard Riedl, Veronika Grascher, Stefan Fenz, Thomas Neubauer
2008 Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)  
the prevention of health data misuse.  ...  This paper presents a detailed description of the new system PIPE (Pseudonymization of Information for Privacy in e-Health) which differs from existing approaches in its ability to securely integrate primary  ...  This work was performed at Secure Business Austria, a competence center that is funded by the Austrian Federal Ministry of Economics and Labor (BMWA) as well as by the provincial government of Vienna.  ... 
doi:10.1109/hicss.2008.366 dblp:conf/hicss/RiedlGFN08 fatcat:rgd3idh2ibc5xpkqafayrlfgze

Improving patients privacy with Pseudonymization

Thomas Neubauer, Bernhard Riedl
2008 Studies in Health Technology and Informatics  
e-Health requires the sharing of patient related data when and where necessary.  ...  of health data.  ...  Acknowledgments This work was performed at Secure Business Austria, a competence center that is funded by the Austrian Federal Ministry of Economics and Labor (BMWA) as well as by the provincial government  ... 
pmid:18487812 fatcat:ljicrujckva5vbculkam6ybypq

Security and privacy for mobile healthcare networks: from a quality of protection perspective

Kuan Zhang, Kan Yang, Xiaohui Liang, Zhou Su, Xuemin Shen, Henry H. Luo
2015 IEEE wireless communications  
Figure 6 . 6 Performance comparison of mobile Sybil detection (TH is the threshold to change pseudonyms: a) FNR vs. TH; b) FPR vs. TH.  ...  If a pseudonym is changed when the number of contacts is below a threshold TH, L-1 attackers can be detected. C-2: Mobile users collect the contact signa- Cloud server ture of each encountered user.  ... 
doi:10.1109/mwc.2015.7224734 fatcat:emp56s7jf5eqljipg5wjjf2jmi

An evaluation of technologies for the pseudonymization of medical data

Thomas Neubauer, Andreas Ekelhart
2009 Proceedings of the 2009 ACM symposium on Applied Computing - SAC '09  
Although, it is a fundamental right of every individual to demand privacy and a variety of laws were enacted that demand the protection of patients' privacy, approaches for protecting privacy often do  ...  Privacy is one of the fundamental issues in health care today.  ...  Therefore the patient's inner private key K −1 A is divided into shared secrets by the use of Shamir's threshold scheme [18] . This scheme allows sharing keys between several operators.  ... 
doi:10.1145/1529282.1529465 dblp:conf/sac/NeubauerE09 fatcat:hfchk6oeazbo3ah4gpa5st5kuq

Achieve Privacy-Preserving Priority Classification on Patient Health Data in Remote eHealthcare System

Guoming Wang, Rongxing Lu, Yong Liang Guan
2019 IEEE Access  
For this reason, many privacy-preserving schemes have been proposed in recent years. However, the efficiency and accuracy of those privacy-preserving schemes become a big issue to be solved.  ...  In this paper, we propose an efficient and privacy-preserving priority classification scheme, named PPC, for classifying patients' encrypted data at the WBAN-gateway in a remote eHealthcare system.  ...  Some pseudonymization schemes encrypt the real identities of the user record as the pseudonyms.  ... 
doi:10.1109/access.2019.2891775 fatcat:6gjo3zg7vfdo5m6ejcsup7oa6m

Anonymity-preserving Reputation Management System for health sector

Farhana Jabeen, Zara Hamid, Wadood Abdul, Sanaa Ghouzali, Abid Khan, Saif Ur Rehman Malik, Mansoor Shaukat Khan, Sarfraz Nawaz, Hua Wang
2018 PLoS ONE  
One of the important requirements of TRSs in the health sector is rating secrecy, which mandates that the identification information about the service consumer should be kept secret to prevent any privacy  ...  In this paper, we present a framework for solving the problem of reconciling trust with anonymity in the health sector.  ...  Hedaquin [14] is a system that allows to evaluate the quality of the healthcare data in a patient's health record.  ... 
doi:10.1371/journal.pone.0195021 pmid:29649267 pmcid:PMC5896921 fatcat:7xgniq5djnay7gxm3hl2ix5s6q

Technologies for the Pseudonymization of Medical Data: A Legal Evaluation

Thomas Neubauer, Mathias Kolb
2009 2009 Fourth International Conference on Systems  
Although, it is a fundamental right of every individual to demand privacy and a variety of laws were enacted that demand the protection of patients' privacy, approaches for protecting privacy often do  ...  Privacy is one of the fundamental issues in health care today.  ...  a competence center that is funded by the Austrian Federal Ministry of Economics and Labor (BMWA) as well as by the provincial government of Vienna.  ... 
doi:10.1109/icons.2009.48 dblp:conf/icons/NeubauerK09 fatcat:s4kthmkkjndzrcpmer5ppn3kxa

An Evaluation of Technologies for the Pseudonymization of Medical Data [chapter]

Thomas Neubauer, Mathias Kolb
2009 Studies in Computational Intelligence  
Although, it is a fundamental right of every individual to demand privacy and a variety of laws were enacted that demand the protection of patients' privacy, approaches for protecting privacy often do  ...  Privacy is one of the fundamental issues in health care today.  ...  Therefore the patient's inner private key K −1 A is divided into shared secrets by the use of Shamir's threshold scheme [18] . This scheme allows sharing keys between several operators.  ... 
doi:10.1007/978-3-642-01209-9_5 fatcat:63nlofra3nbajklpzb346ozfb4

Privacy-enabled remote health monitoring applications for resource constrained wearable devices

Davy Preuveneers, Wouter Joosen
2016 Proceedings of the 31st Annual ACM Symposium on Applied Computing - SAC '16  
values, and other parameters in a privacy friendly manner to ensure confidentiality such that even a curious cloud service provider remains oblivious of sensitive health data.  ...  In this paper, we present and evaluate a practical smartwatch based lifelog application for diabetics that leverages the cloud and homomorphic encryption for caregivers to analyze blood glucose, insulin  ...  Acknowledgment This research is partially funded by the Research Fund KU Leuven and the ICON funding programme of iMinds.  ... 
doi:10.1145/2851613.2851683 dblp:conf/sac/PreuveneersJ16 fatcat:ezzie76u4vdszcv2itzpdzvlim

Privacy-Preserving Identifiers for IoT: A Systematic Literature Review

Mahdi Akil, Lejla Islami, Simone Fischer-Hubner, Leonardo A. Martucci, Albin Zuccato
2020 IEEE Access  
privacy-preserving data provenance 2019 [31] E-health person Cen. protection of E-health data communication 2019 [32] VANET short-term Cen.  ...  A simple revocation scheme involves a trusted party that has a one-to-one mapping of pseudonyms and pseudonym holders (e.g.  ... 
doi:10.1109/access.2020.3023659 fatcat:dc4dbijzljfyxn7hsrkuyfriby

VPKIaaS

Hamid Noroozi, Mohammad Khodaei, Panos Papadimitratos
2018 Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks - WiSec '18  
Our full-blown implementation on the Google Cloud Platform shows that deploying a VPKI for a large-scale scenario can be cost-effective, while efficiently issuing pseudonyms for the requesters.  ...  in the presence of benign failures or any resource depletion attack, and that it dynamically scales out, or possibly scales in, according to the requests' arrival rate.  ...  ACKNOWLEDGEMENT This work has been partially supported by the Swedish Foundation for Strategic Research (SSF).  ... 
doi:10.1145/3212480.3226100 dblp:conf/wisec/NorooziKP18 fatcat:urbr6z46qvd3bgwhbusaq4anyy

An Overview of De-Identification Techniques and Their Standardization Directions

Heung Youl YOUM
2020 IEICE transactions on information and systems  
Its objective is to remove the association between a set of identifying attributes and the data principal where identifying attribute is attribute in a dataset that is able to contribute to uniquely identifying  ...  a data principal within a specific operational context and data principal is entity to which data relates.  ...  The regulations in the health sector require controlled re-identification which leads to reversible pseudonym.  ... 
doi:10.1587/transinf.2019ici0002 fatcat:kk4mohqj7ra7zk2yqtm46nlw5y

A secure architecture for the pseudonymization of medical data

Bernhard Riedl, Thomas Neubauer, Gernot Goluch, Oswald Boehm, Gert Reinauer, Alexander Krumboeck
2007 The Second International Conference on Availability, Reliability and Security (ARES'07)  
This paper provides a new architecture for the pseudonymization of medical data that combines primary and secondary use in one system and thus provides a solution to vulnerabilities of existing approaches  ...  However, patients and commissioners for data protection have legitimate concerns about the privacy and confidentiality of the stored data.  ...  Acknowledgment This work was performed at Secure Business Austria, a competence center that is funded by the Austrian Federal Ministry of Economics and Labor (BMWA) as well as by the provincial government  ... 
doi:10.1109/ares.2007.22 dblp:conf/IEEEares/RiedlNGBRK07 fatcat:3i6le2mpjzdz5oci4uekainqju

Anonymous Authentication of Visitors for Mobile Crowd Sensing at Amusement Parks [chapter]

Divyan Munirathnam Konidala, Robert H. Deng, Yingjiu Li, Hoong Chuin Lau, Stephen E. Fienberg
2013 Lecture Notes in Computer Science  
We utilize queuing theory to analyze the performance of a typical app server receiving numerous simultaneous requests from visitors to process a core function of our protocol.  ...  ; deters adversaries outside the park from sending in huge amounts of false data, which lead to erroneous analyses and recommendations and bring down the app server.  ...  This research/project is supported by the Singapore National Research Foundation under its International Research Centre @ Singapore Funding Initiative and administered by the IDM Programme Office.  ... 
doi:10.1007/978-3-642-38033-4_13 fatcat:ciavrdmspzb37f2khxuiwzuaja
« Previous Showing results 1 — 15 out of 3,124 results