[go: up one dir, main page]

Miller et al., 1996 - Google Patents

Security considerations for present and future medical databases

Miller et al., 1996

Document ID
14261452254682123245
Author
Miller M
Cooper J
Publication year
Publication venue
International journal of bio-medical computing

External Links

Snippet

In this paper we consider the security of medical databases. We give an overview of the security problems and the possible available mechanisms for the prevention of security compromises. Many of the security problems are common to all databases. However, the …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • G06F17/30424Query processing
    • G06F17/30477Query execution
    • G06F17/30507Applying rules; deductive queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • G06F17/30424Query processing
    • G06F17/30533Other types of queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30587Details of specialised database models
    • G06F17/30592Multi-dimensional databases and data warehouses, e.g. MOLAP, ROLAP

Similar Documents

Publication Publication Date Title
Saltzer et al. The protection of information in computer systems
Domingo-Ferrer et al. A critique of k-anonymity and some of its enhancements
US6321201B1 (en) Data security system for a database having multiple encryption levels applicable on a data element value level
Longley Data security
Anderson Information security in a multi-user computer environment
CN118631552B (en) A computer network security protection method
Olovsson A structured approach to computer security
Prakash et al. A new model for privacy preserving sensitive Data Mining
CN117272349A (en) Method, system and storage medium for protecting security of relational database
Grachev et al. Data security mechanisms implemented in the database with universal model
Singh et al. A review report on security threats on database
Pernul Information systems security: Scope, state-of-the-art, and evaluation of techniques
Wilson et al. Protecting data through perturbation techniques: The impact on knowledge discovery in databases
Summers An overview of computer security
Miller et al. Security considerations for present and future medical databases
CN108600178A (en) A kind of method for protecting and system, reference platform of collage-credit data
Haraty C2 secure database management systems—a comparative study
LAWAL et al. Contemporary Control Measures for Mitigating Threats and Vulnerabilities to organizational Databases
Stallings Operating system security
Murray Security considerations for personal computers
Odabi et al. Data security in health information systems by applying software techniques
Bishop UNIX security in a supercomputing environment
Flynn et al. Data dependent keys for a selective encryption terminal
Akhondzadeh Data Protection & Security in MS-SQL Server DBMS
Nazarko et al. OVERVIEW OF DATABASE INFORMATION PROTECTION APPROACHES IN MODERN DATABASE MANAGEMENT SYSTEMS