Security and Privacy Issues in Outsourced Personal Health Record

E-health effectively uses information and communications technology to support health-related services for its users.

[1]  Leslie S. Liu,et al.  Barriers to the adoption and use of personal health record systems , 2011, iConference.

[2]  Thomas Neubauer,et al.  A methodology for the pseudonymization of medical data , 2011, Int. J. Medical Informatics.

[3]  ASHWIN MACHANAVAJJHALA,et al.  L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[4]  Sharon E. Straus,et al.  Personal health records: a scoping review , 2011, J. Am. Medical Informatics Assoc..

[5]  Jon Doyle,et al.  Guardian Angel: Patient-Centered Health Information Systems , 1994 .

[6]  Chien-Ding Lee,et al.  A Cryptographic Key Management Solution for HIPAA Privacy/Security Regulations , 2008, IEEE Transactions on Information Technology in Biomedicine.

[7]  Yongmin Kim,et al.  Challenges to Using an Electronic Personal Health Record by a Low-Income Elderly Population , 2009, Journal of medical Internet research.

[8]  J. Wilson‐Barnett,et al.  HIV and AIDS care: consumers' views on needs and services. , 1995, Journal of advanced nursing.

[9]  Ninghui Li,et al.  t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[10]  Michael Schrefl,et al.  A HYBRID APPROACH INTEGRATING ENCRYPTION AND PSEUDONYMIZATION FOR PROTECTING ELECTRONIC HEALTH RECORDS , 2010, BioMed 2010.

[11]  Sandro Etalle,et al.  Audit-Based Access Control for Electronic Health Records , 2007, Electron. Notes Theor. Comput. Sci..

[12]  David W. Bates,et al.  Viewpoint Paper: A Research Agenda for Personal Health Records (PHRs) , 2008, J. Am. Medical Informatics Assoc..

[13]  Jian-Guo Bau,et al.  Secure Dynamic Access Control Scheme of PHR in Cloud Computing , 2012, Journal of Medical Systems.

[14]  David W. Bates,et al.  White Paper: Personal Health Records: Definitions, Benefits, and Strategies for Overcoming Barriers to Adoption , 2006, J. Am. Medical Informatics Assoc..

[15]  Kenneth D. Mandl,et al.  Indivo: a personally controlled health record for health information exchange and communication , 2007, BMC Medical Informatics Decis. Mak..

[16]  Jiankun Hu,et al.  Corresponding author’s address: , 2022 .

[17]  Kuo-Ching Liu,et al.  Efficient key management for preserving HIPAA regulations , 2011, J. Syst. Softw..

[18]  Noboru Sonehara,et al.  Aspects of privacy for electronic health records , 2011, Int. J. Medical Informatics.

[19]  Daisuke Mashima,et al.  Enabling Robust Information Accountability in E-healthcare Systems , 2012, HealthSec.

[20]  Vanga Odelu,et al.  An Effective and Secure Key-Management Scheme for Hierarchical Access Control in E-Medicine System , 2012, Journal of Medical Systems.

[21]  Charles Safran,et al.  Toward a national framework for the secondary use of health data: an American Medical Informatics Association White Paper. , 2007, Journal of the American Medical Informatics Association : JAMIA.

[22]  A. Pfitzmann,et al.  A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management , 2010 .

[23]  W.D. Yu,et al.  An Electronic Health Record Content Protection System Using SmartCard and PMR , 2007, 2007 9th International Conference on e-Health Networking, Application and Services.

[24]  Sye Loong Keoh,et al.  Secure spontaneous emergency access to personal health record , 2011 .

[25]  Johannes Drepper,et al.  Pseudonymization Service and Data Custodians in Medical Research Networks and Biobanks , 2006, GI Jahrestagung.

[26]  Reihaneh Safavi-Naini,et al.  Privacy preserving EHR system using attribute-based infrastructure , 2010, CCSW '10.

[27]  Y. Kim,et al.  Evaluation of Patient-Centered Electronic Health Record to Overcome Digital Divide , 2005, 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference.

[28]  Eric Horvitz,et al.  Patient controlled encryption: ensuring privacy of electronic medical records , 2009, CCSW '09.

[29]  Anish Mathuria,et al.  Achieving Forward Secrecy and Unlinkability in Cloud-Based Personal Health Record System , 2015, TrustCom 2015.

[30]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[31]  Chien-Ding Lee,et al.  A HIPAA-compliant key management scheme with revocation of authorization , 2014, Comput. Methods Programs Biomed..

[32]  D. Bates,et al.  The digital divide in adoption and use of a personal health record. , 2011, Archives of internal medicine.

[33]  William B. Lober,et al.  Barriers to the use of a Personal Health Record by an Elderly Population , 2006, AMIA.

[34]  Ming Li,et al.  Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings , 2010, SecureComm.

[35]  Daniela Richter,et al.  Pseudonymization of patient identifiers for translational research , 2013, BMC Medical Informatics and Decision Making.

[36]  Yu-Yi Chen,et al.  A Secure EHR System Based on Hybrid Clouds , 2012, Journal of Medical Systems.

[37]  Shiping Chen,et al.  A platform for secure monitoring and sharing of generic health data in the Cloud , 2014, Future Gener. Comput. Syst..

[38]  G De Moor,et al.  Privacy Protection through pseudonymisation in eHealth. , 2008, Studies in health technology and informatics.

[39]  B. Halpern-Felsher,et al.  Influence of physician confidentiality assurances on adolescents' willingness to disclose information and seek future health care. A randomized controlled trial. , 1997, JAMA.

[40]  P. Appelbaum Privacy in psychiatric treatment: threats and responses. , 2002, The American journal of psychiatry.

[41]  C. Thomas,et al.  Psychiatrists, the Public, and Confidentiality , 1982, The Journal of nervous and mental disease.

[42]  N. Terry,et al.  The Emergence of National Electronic Health Record Architectures in the United States and Australia: Models, Costs, and Questions , 2005, Journal of medical Internet research.

[43]  D. Lansky,et al.  The missing link: bridging the patient-provider health information gap. , 2005, Health affairs.

[44]  Bruno Blanchet,et al.  An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..

[45]  Huan Liu,et al.  Topic taxonomy adaptation for group profiling , 2008, TKDD.

[46]  Lynn A. Karoly,et al.  Health Insurance Portability and Accountability Act of 1996 (HIPAA) Administrative Simplification , 2010, Practice Management Consultant.

[47]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[48]  H. Bauer,et al.  Patient attitudes about mandatory reporting of domestic violence. Implications for health care professionals. , 1998, The Western journal of medicine.