Filters








7,862 Hits in 2.7 sec

Pseudonymization for improving the Privacy in E-Health Applications

Bernhard Riedl, Veronika Grascher, Stefan Fenz, Thomas Neubauer
2008 Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)  
This paper presents a detailed description of the new system PIPE (Pseudonymization of Information for Privacy in e-Health) which differs from existing approaches in its ability to securely integrate primary  ...  the prevention of health data misuse.  ...  We want to thank our master students Mathias Kolb and Markus Pehaim as well as the members of our business partner Braincon Technologies, Oswald Boehm, Alexander Krumboeck, and Gert Reinauer for their  ... 
doi:10.1109/hicss.2008.366 dblp:conf/hicss/RiedlGFN08 fatcat:rgd3idh2ibc5xpkqafayrlfgze

An OAuth2-based protocol with strong user privacy preservation for smart city mobile e-Health apps

Victor Sucasas, Georgios Mantas, Ayman Radwan, Jonathan Rodriguez
2016 2016 IEEE International Conference on Communications (ICC)  
In the context of the Smart City concept, mobile e-Health applications can play a pivotal role towards the improvement of citizens' quality of life, since they can enable citizens to access personalized  ...  However, accessing personalized e-Health services through citizens' mobile e-Health applications, running on their mobile devices, raises many privacy issues in terms of citizens' identity and location  ...  signature scheme in order to achieve user privacy preservation for Smart City mobile e-Health apps.  ... 
doi:10.1109/icc.2016.7511598 dblp:conf/icc/SucasasMRR16 fatcat:fcdkznf74baermd6gmuack7wja

Privacy-Preserving Storage and Access of Medical Data through Pseudonymization and Encryption [chapter]

Johannes Heurix, Thomas Neubauer
2011 Lecture Notes in Computer Science  
E-health allows better communication between health care providers and higher availability of medical data.  ...  This article provides an overview of actual privacy threats and presents a pseudonymization approach that preserves the patient's privacy and data confidentiality.  ...  of Economy, Family and Youth of the Republic of Austria and by the City of Vienna.  ... 
doi:10.1007/978-3-642-22890-2_16 fatcat:rkcwdtw35zd25nr4c4s7wmk2ce

Privacy-Preserving Identifiers for IoT: A Systematic Literature Review

Mahdi Akil, Lejla Islami, Simone Fischer-Hubner, Leonardo A. Martucci, Albin Zuccato
2020 IEEE Access  
was leveraged the most by the surveyed papers [14] , [19] , [20] , [29] , [33] , [34] for all identified application domains except for E-health.  ...  An exemption for instance are [31] & [16] proposing a light-weight authentication protocol for sensor node device pseudonyms for E-health applications, probably also as for the processing of medical  ... 
doi:10.1109/access.2020.3023659 fatcat:dc4dbijzljfyxn7hsrkuyfriby

The Limits of Control – (Governmental) Identity Management from a Privacy Perspective [chapter]

Stefan Strauß
2011 IFIP Advances in Information and Communication Technology  
This is also reflected in the increased efforts of governments to introduce electronic ID systems, aiming at security improvements of public services and unifying identification procedures to contribute  ...  Based on this premise, this paper discusses a control dilemma: the general aim of identity management to compensate for a loss of control over personal data to fight increasing security and privacy threats  ...  Some e-ID applications already include access to personal records (e.g., some Austrian e-ID services grant access to tax, health or public registration records).  ... 
doi:10.1007/978-3-642-20769-3_17 fatcat:efsuykfffffcjfajpuee4slsx4

An evaluation of technologies for the pseudonymization of medical data

Thomas Neubauer, Andreas Ekelhart
2009 Proceedings of the 2009 ACM symposium on Applied Computing - SAC '09  
This paper highlights research directions currently pursued for privacy protection in e-health and evaluates common pseudonymization approaches against legal and technical criteria.  ...  Privacy is one of the fundamental issues in health care today.  ...  Pseudonymization of Information for Privacy in e-Health Pseudonymization of Information for Privacy in e-Health (PIPE) [15, 16, 12] introduces a new architecture that provides the following contributions  ... 
doi:10.1145/1529282.1529465 dblp:conf/sac/NeubauerE09 fatcat:hfchk6oeazbo3ah4gpa5st5kuq

An Evaluation of Technologies for the Pseudonymization of Medical Data [chapter]

Thomas Neubauer, Mathias Kolb
2009 Studies in Computational Intelligence  
This paper highlights research directions currently pursued for privacy protection in e-health and evaluates common pseudonymization approaches against legal and technical criteria.  ...  Privacy is one of the fundamental issues in health care today.  ...  Pseudonymization of Information for Privacy in e-Health Pseudonymization of Information for Privacy in e-Health (PIPE) [15, 16, 12] introduces a new architecture that provides the following contributions  ... 
doi:10.1007/978-3-642-01209-9_5 fatcat:63nlofra3nbajklpzb346ozfb4

PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching [article]

William Abramson, William J. Buchanan, Sarwar Sayeed, Nikolaos Pitropakis, Owen Lo
2021 arXiv   pre-print
However, the existing approaches comprise severe flaws in terms of privacy and security.  ...  In order to overcome the challenges, this paper outlines the PAN-DOMAIN infrastructure that allows for citizen identifiers to be matched amongst the TA, the HA and the GA.  ...  Next, Bob uses Zi to generate a pseudonym for the domain. Pseudonym Conversion is depicted in Figure 4. . Health Authority in a blind fashion.  ... 
arXiv:2112.02855v1 fatcat:op6o2v4bgzd4bofur5x2xs7ybi

Technologies for the Pseudonymization of Medical Data: A Legal Evaluation

Thomas Neubauer, Mathias Kolb
2009 2009 Fourth International Conference on Systems  
This paper highlights research directions currently pursued for privacy protection in e-health and evaluates common pseudonymization approaches against legal and technical criteria.  ...  Privacy is one of the fundamental issues in health care today.  ...  ACKNOWLEDGMENTS This work was supported by grants of the Austrian Government's FIT-IT Research Initiative on Trust in IT Systems under the contract 816158 and was performed at Secure Business Austria,  ... 
doi:10.1109/icons.2009.48 dblp:conf/icons/NeubauerK09 fatcat:s4kthmkkjndzrcpmer5ppn3kxa

Recognition and Pseudonymization of Personal Data in Paper-Based Health Records [chapter]

Stefan Fenz, Johannes Heurix, Thomas Neubauer
2012 Lecture Notes in Business Information Processing  
This paper presents the MEDSEC system for the recognition and pseudonymization of personal data in paper-based health records.  ...  E-health requires the sharing of patient-related data when and where necessary.  ...  The research was funded by BRIDGE (#824884) and by COMET K1, FFG -Austrian Research Promotion Agency.  ... 
doi:10.1007/978-3-642-30359-3_14 fatcat:in7gvmsphfa4nb5xagxlmjn5gq

Data Models for the Pseudonymization of DICOM Data

D Abouakil, J Heurix, T Neubauer
2011 2011 44th Hawaii International Conference on System Sciences  
This system provides health care providers with an efficient architecture to reduce the danger of privacy violation and comply to legal demands, such as HIPAA.  ...  However, for highly sensitive medical data this is often not sufficient. This paper presents a data model for systems using DICOM based on the PIPE pseudonymization approach.  ...  center Secure Business Austria funded by the Federal Ministry of Economy, Family and Youth of the Republic of Austria and by the City of Vienna.  ... 
doi:10.1109/hicss.2011.136 dblp:conf/hicss/AbouakilHN11 fatcat:2oxmuziskvcy7nvzal5smkbwpi

Privacy-aware access to Patient-controlled Personal Health Records in emergency situations

Md. Nurul Huda, Shigeki Yamada, Noboru Sonehara
2009 Proceedings of the 3d International ICST Conference on Pervasive Computing Technologies for Healthcare  
The protocol is for the Privacy-aware Patientcontrolled Personal Health Record (p3HR) system.  ...  Governed by privacy protection laws, explicit consent/permission of the respective patient is a prerequisite for sharing personal health records.  ...  A patient creates her unique digital pseudonym [13] [14] and pseudonyms for the quasi-identifiers that must be kept in the database for accurate health history.  ... 
doi:10.4108/icst.pervasivehealth2009.6008 dblp:conf/ph/HudaYS09 fatcat:i7b5so6775c5bi5hozqeudm7oy

Location Privacy Protection Based on ImprovedK-Value Method in Augmented Reality on Mobile Devices

Chunyong Yin, Jinwen Xi, Ruxia Sun
2017 Mobile Information Systems  
Then we proposed the improvedK-value location privacy protection method according to privacy level, which combinesk-anonymity method with pseudonym method.  ...  In addition to the experiment of execution time, it demonstrated that our proposed method can realize the location privacy protection more efficiently.  ...  Acknowledgments This work was funded by the National Natural Science  ... 
doi:10.1155/2017/7251395 fatcat:sbsnpjvi6jds3kqfc4hb65tpji

Ensuring privacy for e-health services

G. Yee, L. Korba, R. Song
2006 First International Conference on Availability, Reliability and Security (ARES'06)  
In this paper, we propose a new approach to protecting personal privacy for e-health services: keeping possession and control over the user's personally identifiable information in the hands of the user  ...  Existing approaches for privacy protection such as access control are predicated on the e-service provider having possession and control over the user's personal data.  ...  Introduction In order for e-health services to be successful, personal privacy must be protected.  ... 
doi:10.1109/ares.2006.59 dblp:conf/IEEEares/YeeKS06 fatcat:sv2fvq7uvra2li3dkemucovafm

Consumer-Centric and Privacy-Preserving Identity Management for Distributed E-Health Systems

Richard Au, Peter Croll
2008 Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)  
A new framework of privacy-preserving identity management for distributed e-Health systems is proposed.  ...  Utilizing a consumer-centric approach, the healthcare consumer maintains a pool of pseudonymous identifiers for use in different healthcare services.  ...  In this paper, a secure and privacy-preserving architecture for the e-health system is proposed.  ... 
doi:10.1109/hicss.2008.101 dblp:conf/hicss/AuC08 fatcat:woi4m7b23fdkpe6st4gqgaggni
« Previous Showing results 1 — 15 out of 7,862 results