Sharing data for the public good and protecting individual privacy: informatics solutions to combine different goals
暂无分享,去创建一个
[1] Eugene J. Schweitzer,et al. Reconciliation of the cloud computing model with US federal electronic health record regulations , 2012, J. Am. Medical Informatics Assoc..
[2] Anand D. Sarwate,et al. Protecting count queries in study design , 2012, J. Am. Medical Informatics Assoc..
[3] Isaac S. Kohane,et al. Strategies for maintaining patient privacy in i2b2 , 2011, J. Am. Medical Informatics Assoc..
[4] Jihoon Kim,et al. Using statistical and machine learning to help institutions detect suspicious access to electronic health records , 2011, J. Am. Medical Informatics Assoc..
[5] Jihoon Kim,et al. iDASH: integrating data for analysis, anonymization, and sharing , 2012, J. Am. Medical Informatics Assoc..
[6] Jihoon Kim,et al. Grid Binary LOgistic REgression (GLORE): building shared models without sharing data , 2012, J. Am. Medical Informatics Assoc..
[7] Bradley Malin,et al. Never too old for anonymity: a statistical standard for demographic data sharing via the HIPAA Privacy Rule , 2011, J. Am. Medical Informatics Assoc..
[8] Bradley Malin,et al. Biomedical data privacy: problems, perspectives, and recent advances , 2013, J. Am. Medical Informatics Assoc..
[9] Amar K. Das,et al. A simple heuristic for blindfolded record linkage , 2012, J. Am. Medical Informatics Assoc..
[10] Kenneth D. Mandl,et al. Social but safe? Quality and safety of diabetes-related online social networks , 2011, J. Am. Medical Informatics Assoc..
[11] Jun Hu,et al. A secure protocol for protecting the identity of providers when disclosing data for disease surveillance , 2011, J. Am. Medical Informatics Assoc..