Secure Data Linkage and Information Sharing with GRHANITE

Objectives: To address and simplify the operational, ethics, consent and governance processes during the secure collection of individual identifi ers and the accurate, reliable and confi dential identifi cation and re-identifi cation of individuals to facilitate safety and quality of health care as well as accurate and rigorous evaluation research.

[1]  Matt Henricksen,et al.  Securing Grid Data Using Mandatory Access Controls , 2007, ACSW.

[2]  Peter R. Croll,et al.  Consumer-Centric and Privacy-Preserving Identity Management for Distributed E-Health Systems , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).

[3]  H. Chandler Database , 1985 .

[4]  Huidong Jin,et al.  Current developments of k-anonymous data releasing , 2008 .

[5]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[6]  Helena Handschuh,et al.  Security Analysis of SHA-256 and Sisters , 2003, Selected Areas in Cryptography.

[7]  ASHWIN MACHANAVAJJHALA,et al.  L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[8]  E. Coiera,et al.  Lessons from the NHS National Programme for IT , 2007, The Medical journal of Australia.

[9]  C. van Weel,et al.  Longitudinal Research and Data Collection in Primary Care , 2005, The Annals of Family Medicine.

[10]  H Brenner,et al.  Effects of Record Linkage Errors on Disease Registration , 1998, Methods of Information in Medicine.

[11]  Peter Christen,et al.  Some methods for blindfolded record linkage , 2004, BMC Medical Informatics Decis. Mak..

[12]  Mamoon Yunus,et al.  An Empirical Study of Security Threats and Countermeasures in Web Services-Based Services Oriented Architectures , 2005, WISE.

[13]  Mike P. Papazoglou,et al.  Service oriented architectures: approaches, technologies and research issues , 2007, The VLDB Journal.

[14]  Roger Clarke,et al.  Viewpoint Paper: e-Consent: The Design And Implementation of Consumer Consent Mechanisms in an Electronic Environment , 2004, J. Am. Medical Informatics Assoc..

[15]  Changqing Li Open Database Connectivity , 2009, Encyclopedia of Database Systems.

[16]  Xiaorong Li,et al.  Secure Access to Grid Information Service Using Shibboleth and PERMIS , 2007, The 9th IEEE International Conference on E-Commerce Technology and The 4th IEEE International Conference on Enterprise Computing, E-Commerce and E-Services (CEC-EEE 2007).

[17]  Lifang Gu,et al.  Privacy-preserving data linkage protocols , 2004, WPES '04.

[18]  Ninghui Li,et al.  t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.