Security and Privacy Issues in Outsourced Personal Health Record
暂无分享,去创建一个
[1] Leslie S. Liu,et al. Barriers to the adoption and use of personal health record systems , 2011, iConference.
[2] Thomas Neubauer,et al. A methodology for the pseudonymization of medical data , 2011, Int. J. Medical Informatics.
[3] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[4] Sharon E. Straus,et al. Personal health records: a scoping review , 2011, J. Am. Medical Informatics Assoc..
[5] Jon Doyle,et al. Guardian Angel: Patient-Centered Health Information Systems , 1994 .
[6] Chien-Ding Lee,et al. A Cryptographic Key Management Solution for HIPAA Privacy/Security Regulations , 2008, IEEE Transactions on Information Technology in Biomedicine.
[7] Yongmin Kim,et al. Challenges to Using an Electronic Personal Health Record by a Low-Income Elderly Population , 2009, Journal of medical Internet research.
[8] J. Wilson‐Barnett,et al. HIV and AIDS care: consumers' views on needs and services. , 1995, Journal of advanced nursing.
[9] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[10] Michael Schrefl,et al. A HYBRID APPROACH INTEGRATING ENCRYPTION AND PSEUDONYMIZATION FOR PROTECTING ELECTRONIC HEALTH RECORDS , 2010, BioMed 2010.
[11] Sandro Etalle,et al. Audit-Based Access Control for Electronic Health Records , 2007, Electron. Notes Theor. Comput. Sci..
[12] David W. Bates,et al. Viewpoint Paper: A Research Agenda for Personal Health Records (PHRs) , 2008, J. Am. Medical Informatics Assoc..
[13] Jian-Guo Bau,et al. Secure Dynamic Access Control Scheme of PHR in Cloud Computing , 2012, Journal of Medical Systems.
[14] David W. Bates,et al. White Paper: Personal Health Records: Definitions, Benefits, and Strategies for Overcoming Barriers to Adoption , 2006, J. Am. Medical Informatics Assoc..
[15] Kenneth D. Mandl,et al. Indivo: a personally controlled health record for health information exchange and communication , 2007, BMC Medical Informatics Decis. Mak..
[16] Jiankun Hu,et al. Corresponding author’s address: , 2022 .
[17] Kuo-Ching Liu,et al. Efficient key management for preserving HIPAA regulations , 2011, J. Syst. Softw..
[18] Noboru Sonehara,et al. Aspects of privacy for electronic health records , 2011, Int. J. Medical Informatics.
[19] Daisuke Mashima,et al. Enabling Robust Information Accountability in E-healthcare Systems , 2012, HealthSec.
[20] Vanga Odelu,et al. An Effective and Secure Key-Management Scheme for Hierarchical Access Control in E-Medicine System , 2012, Journal of Medical Systems.
[21] Charles Safran,et al. Toward a national framework for the secondary use of health data: an American Medical Informatics Association White Paper. , 2007, Journal of the American Medical Informatics Association : JAMIA.
[22] A. Pfitzmann,et al. A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management , 2010 .
[23] W.D. Yu,et al. An Electronic Health Record Content Protection System Using SmartCard and PMR , 2007, 2007 9th International Conference on e-Health Networking, Application and Services.
[24] Sye Loong Keoh,et al. Secure spontaneous emergency access to personal health record , 2011 .
[25] Johannes Drepper,et al. Pseudonymization Service and Data Custodians in Medical Research Networks and Biobanks , 2006, GI Jahrestagung.
[26] Reihaneh Safavi-Naini,et al. Privacy preserving EHR system using attribute-based infrastructure , 2010, CCSW '10.
[27] Y. Kim,et al. Evaluation of Patient-Centered Electronic Health Record to Overcome Digital Divide , 2005, 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference.
[28] Eric Horvitz,et al. Patient controlled encryption: ensuring privacy of electronic medical records , 2009, CCSW '09.
[29] Anish Mathuria,et al. Achieving Forward Secrecy and Unlinkability in Cloud-Based Personal Health Record System , 2015, TrustCom 2015.
[30] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[31] Chien-Ding Lee,et al. A HIPAA-compliant key management scheme with revocation of authorization , 2014, Comput. Methods Programs Biomed..
[32] D. Bates,et al. The digital divide in adoption and use of a personal health record. , 2011, Archives of internal medicine.
[33] William B. Lober,et al. Barriers to the use of a Personal Health Record by an Elderly Population , 2006, AMIA.
[34] Ming Li,et al. Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings , 2010, SecureComm.
[35] Daniela Richter,et al. Pseudonymization of patient identifiers for translational research , 2013, BMC Medical Informatics and Decision Making.
[36] Yu-Yi Chen,et al. A Secure EHR System Based on Hybrid Clouds , 2012, Journal of Medical Systems.
[37] Shiping Chen,et al. A platform for secure monitoring and sharing of generic health data in the Cloud , 2014, Future Gener. Comput. Syst..
[38] G De Moor,et al. Privacy Protection through pseudonymisation in eHealth. , 2008, Studies in health technology and informatics.
[39] B. Halpern-Felsher,et al. Influence of physician confidentiality assurances on adolescents' willingness to disclose information and seek future health care. A randomized controlled trial. , 1997, JAMA.
[40] P. Appelbaum. Privacy in psychiatric treatment: threats and responses. , 2002, The American journal of psychiatry.
[41] C. Thomas,et al. Psychiatrists, the Public, and Confidentiality , 1982, The Journal of nervous and mental disease.
[42] N. Terry,et al. The Emergence of National Electronic Health Record Architectures in the United States and Australia: Models, Costs, and Questions , 2005, Journal of medical Internet research.
[43] D. Lansky,et al. The missing link: bridging the patient-provider health information gap. , 2005, Health affairs.
[44] Bruno Blanchet,et al. An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[45] Huan Liu,et al. Topic taxonomy adaptation for group profiling , 2008, TKDD.
[46] Lynn A. Karoly,et al. Health Insurance Portability and Accountability Act of 1996 (HIPAA) Administrative Simplification , 2010, Practice Management Consultant.
[47] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[48] H. Bauer,et al. Patient attitudes about mandatory reporting of domestic violence. Implications for health care professionals. , 1998, The Western journal of medicine.