Filters








7,555 Hits in 1.2 sec

Improving patients privacy with Pseudonymization

Thomas Neubauer, Bernhard Riedl
2008 Studies in Health Technology and Informatics  
Electronic health records promise to improve communication between health care providers, thus leading to better quality of patients' treatment and reduced costs.  ...  As highly sensitive patient information provides a promising goal (e.g., for attackers), there is an increasing social and political pressure to guarantee patients privacy.  ...  Riedl / Improving Patients Privacy with Pseudonymization  ... 
pmid:18487812 fatcat:ljicrujckva5vbculkam6ybypq

Privacy-Preserving Storage and Access of Medical Data through Pseudonymization and Encryption [chapter]

Johannes Heurix, Thomas Neubauer
2011 Lecture Notes in Computer Science  
This article provides an overview of actual privacy threats and presents a pseudonymization approach that preserves the patient's privacy and data confidentiality.  ...  The solution also addresses the identifying nature of genetic data by extending the basic pseudonymization approach with queryable encryption.  ...  By fully encrypting health data with a secret key only known to the patient, his or her privacy can be assured as well.  ... 
doi:10.1007/978-3-642-22890-2_16 fatcat:rkcwdtw35zd25nr4c4s7wmk2ce

An evaluation of technologies for the pseudonymization of medical data

Thomas Neubauer, Andreas Ekelhart
2009 Proceedings of the 2009 ACM symposium on Applied Computing - SAC '09  
Although, it is a fundamental right of every individual to demand privacy and a variety of laws were enacted that demand the protection of patients' privacy, approaches for protecting privacy often do  ...  not comply with legal requirements or basic security requirements.  ...  Introduction Privacy is not only a fundamental issues in health care today but a trade-off between the patient's demands for privacy as well as the society's need for improving efficiency and reducing  ... 
doi:10.1145/1529282.1529465 dblp:conf/sac/NeubauerE09 fatcat:hfchk6oeazbo3ah4gpa5st5kuq

An Evaluation of Technologies for the Pseudonymization of Medical Data [chapter]

Thomas Neubauer, Mathias Kolb
2009 Studies in Computational Intelligence  
Although, it is a fundamental right of every individual to demand privacy and a variety of laws were enacted that demand the protection of patients' privacy, approaches for protecting privacy often do  ...  not comply with legal requirements or basic security requirements.  ...  Introduction Privacy is not only a fundamental issues in health care today but a trade-off between the patient's demands for privacy as well as the society's need for improving efficiency and reducing  ... 
doi:10.1007/978-3-642-01209-9_5 fatcat:63nlofra3nbajklpzb346ozfb4

A secure architecture for the pseudonymization of medical data

Bernhard Riedl, Thomas Neubauer, Gernot Goluch, Oswald Boehm, Gert Reinauer, Alexander Krumboeck
2007 The Second International Conference on Availability, Reliability and Security (ARES'07)  
Although the concept of pseudonymization allows an association with a patient only under specified and controlled circumstances, existing approaches have major vulnerabilities.  ...  However, patients and commissioners for data protection have legitimate concerns about the privacy and confidentiality of the stored data.  ...  The discussion of privacy is one of the fundamental issues in health care today and a trade-off between the patient's need for privacy as well as the society's needs to improve efficiency and reduce costs  ... 
doi:10.1109/ares.2007.22 dblp:conf/IEEEares/RiedlNGBRK07 fatcat:3i6le2mpjzdz5oci4uekainqju

A PRIVACY MANAGEMENT ARCHITECTURE FOR PATIENT-CONTROLLED PERSONAL HEALTH RECORD SYSTEM

MD. NURUL HUDA, NOBORU SONEHARA, SHIGEKI YAMADA
2009 Journal of Engineering Science and Technology  
information transparently with others (e.g., healthcare providers).  ...  In this paper, we present the architecture of our Privacy-aware Patient-controlled Personal Health Record (P3HR) system through which a patient can view her integrated health history, and share her health  ...  Patients retained control and responsibility to initiate their own iHealthRecord. It improved access to records and sharing them with others in a more convenient way.  ... 
doaj:554aeb9346b74ac485e14573b750e98f fatcat:ekca772uvrdtzf6slxxaqjwnpq

Recognition and Pseudonymization of Personal Data in Paper-Based Health Records [chapter]

Stefan Fenz, Johannes Heurix, Thomas Neubauer
2012 Lecture Notes in Business Information Processing  
patients and employees that guarantees privacy.  ...  E-health requires the sharing of patient-related data when and where necessary.  ...  (ii) Encryption assures patients' privacy by encrypting the medical records with the patients' private key.  ... 
doi:10.1007/978-3-642-30359-3_14 fatcat:in7gvmsphfa4nb5xagxlmjn5gq

Technologies for the Pseudonymization of Medical Data: A Legal Evaluation

Thomas Neubauer, Mathias Kolb
2009 2009 Fourth International Conference on Systems  
Although, it is a fundamental right of every individual to demand privacy and a variety of laws were enacted that demand the protection of patients' privacy, approaches for protecting privacy often do  ...  not comply with legal requirements or basic security requirements.  ...  INTRODUCTION Privacy is one of the fundamental issues in health care today and a trade-off between the patient's demands for privacy as well as the society's need for improving efficiency and reducing  ... 
doi:10.1109/icons.2009.48 dblp:conf/icons/NeubauerK09 fatcat:s4kthmkkjndzrcpmer5ppn3kxa

Privacy-aware access to Patient-controlled Personal Health Records in emergency situations

Md. Nurul Huda, Shigeki Yamada, Noboru Sonehara
2009 Proceedings of the 3d International ICST Conference on Pervasive Computing Technologies for Healthcare  
Patient-controlled Personal Health Record (PHR) systems may facilitate a patient not only to share her health records with health care professionals but also to control her health privacy, in a convenient  ...  Governed by privacy protection laws, explicit consent/permission of the respective patient is a prerequisite for sharing personal health records.  ...  Patients retain control and responsibility to initiate their own iHealthRecord. It improved access to records and share them with others in a more convenient way.  ... 
doi:10.4108/icst.pervasivehealth2009.6008 dblp:conf/ph/HudaYS09 fatcat:i7b5so6775c5bi5hozqeudm7oy

A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration [chapter]

Alevtina Dubovitskaya, Visara Urovi, Matteo Vasirani, Karl Aberer, Michael I. Schumacher
2015 IFIP Advances in Information and Communication Technology  
Our proposed solution defines how to achieve data integration in a heterogeneous network of many clinical institutions, while preserving data utility and patients' privacy.  ...  The contribution of the paper is twofold: Firstly, we propose a secure and scalable cloud eHealth architecture to store and exchange patients' data for the treatment.  ...  However, to improve utility of the data from RSDB, the possibility to de-generalize the data from RSDB without violation of patients' privacy (during bounded time interval) need to be considered.  ... 
doi:10.1007/978-3-319-18467-8_39 fatcat:tgjtv7dxpzhq5ntewo5dat2d5a

Data Models for the Pseudonymization of DICOM Data

D Abouakil, J Heurix, T Neubauer
2011 2011 44th Hawaii International Conference on System Sciences  
This system provides health care providers with an efficient architecture to reduce the danger of privacy violation and comply to legal demands, such as HIPAA.  ...  This paper presents a data model for systems using DICOM based on the PIPE pseudonymization approach.  ...  Improved access to test results, improved compliance with chronic care and prevention guidelines, and a reduction in prescribing errors demonstrate the power of easy health data access.  ... 
doi:10.1109/hicss.2011.136 dblp:conf/hicss/AbouakilHN11 fatcat:2oxmuziskvcy7nvzal5smkbwpi

Adversarial Learning of Privacy-Preserving Text Representations for De-Identification of Medical Records

Max Friedrich, Arne Köhn, Gregor Wiedemann, Chris Biemann
2019 Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics  
We introduce a method to create privacy-preserving shareable representations of medical text (i.e. they contain no PHI) that does not require expensive manual pseudonymization.  ...  However, obtaining a large and diverse dataset to train such a classifier that works well across many types of medical text poses a challenge as privacy laws prohibit the sharing of raw medical records  ...  P s e u d o n y m iz a ti o n Pseudonymized patient notes [ ]Patient [ ]Hosp. . .  ... 
doi:10.18653/v1/p19-1584 dblp:conf/acl/FriedrichKWB19 fatcat:awgrl7dsevdhrl2fky3eegeipa

API Driven On-Demand Participant ID Pseudonymization in Heterogeneous Multi-Study Research

Shorabuddin Syed, Mahanazuddin Syed, Hafsa Bareen Syeda, Maryam Garza, William Bennett, Jonathan Bona, Salma Begum, Ahmad Baghal, Meredith Zozus, Fred Prior
2021 Healthcare Informatics Research  
Study participant records from various sources are linked together and to patient records when possible to address research questions while ensuring patient privacy.  ...  We developed a novel approach of an ondemand pseudonymization process that will aide researchers in obtaining a comprehensive and holistic view of study participant data without compromising patient privacy  ...  General Data Protection Regulation (GDPR) to ensure patient privacy and confidentiality [11, 12] .  ... 
doi:10.4258/hir.2021.27.1.39 pmid:33611875 pmcid:PMC7921568 fatcat:ewtvhesxrrhdbmkxi7qups7mue

Pseudonymization for improving the Privacy in E-Health Applications

Bernhard Riedl, Veronika Grascher, Stefan Fenz, Thomas Neubauer
2008 Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)  
Electronic health records (EHR) promise to improve communication between health care providers, thus leading to better quality of patients' treatment and reduced costs.  ...  This paper presents a detailed description of the new system PIPE (Pseudonymization of Information for Privacy in e-Health) which differs from existing approaches in its ability to securely integrate primary  ...  However, the discussion of privacy is one of the fundamental issues in health care today and a trade-off between the patient's requirement for privacy as well as the society's needs for improving efficiency  ... 
doi:10.1109/hicss.2008.366 dblp:conf/hicss/RiedlGFN08 fatcat:rgd3idh2ibc5xpkqafayrlfgze

Medical Information Privacy Assurance: Cryptographic and System Aspects [chapter]

Giuseppe Ateniese, Reza Curtmola, Breno de Medeiros, Darren Davis
2003 Lecture Notes in Computer Science  
The firsthand experience of experts in information security and assurance who studied or worked with health applications has been of a different sort: While general principles of security still apply in  ...  In this paper we describe some recent results of an on-going research on medical information privacy carried out at the Johns Hopkins University under the support of the National Science Foundation (NSF  ...  In our privacy framework, users would select multiple pseudonyms that allow them to interact anonymously with multiple organizations.  ... 
doi:10.1007/3-540-36413-7_15 fatcat:l7m4e5xrejfdfj46p6ib7zook4
« Previous Showing results 1 — 15 out of 7,555 results