Miller et al., 1996 - Google Patents
Security considerations for present and future medical databasesMiller et al., 1996
- Document ID
- 14261452254682123245
- Author
- Miller M
- Cooper J
- Publication year
- Publication venue
- International journal of bio-medical computing
External Links
Snippet
In this paper we consider the security of medical databases. We give an overview of the security problems and the possible available mechanisms for the prevention of security compromises. Many of the security problems are common to all databases. However, the …
- 230000002265 prevention 0 abstract description 9
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
- G06F17/30477—Query execution
- G06F17/30507—Applying rules; deductive queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
- G06F17/30533—Other types of queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30587—Details of specialised database models
- G06F17/30592—Multi-dimensional databases and data warehouses, e.g. MOLAP, ROLAP
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Saltzer et al. | The protection of information in computer systems | |
Domingo-Ferrer et al. | A critique of k-anonymity and some of its enhancements | |
US6321201B1 (en) | Data security system for a database having multiple encryption levels applicable on a data element value level | |
Longley | Data security | |
Anderson | Information security in a multi-user computer environment | |
CN118631552B (en) | A computer network security protection method | |
Olovsson | A structured approach to computer security | |
Prakash et al. | A new model for privacy preserving sensitive Data Mining | |
CN117272349A (en) | Method, system and storage medium for protecting security of relational database | |
Grachev et al. | Data security mechanisms implemented in the database with universal model | |
Singh et al. | A review report on security threats on database | |
Pernul | Information systems security: Scope, state-of-the-art, and evaluation of techniques | |
Wilson et al. | Protecting data through perturbation techniques: The impact on knowledge discovery in databases | |
Summers | An overview of computer security | |
Miller et al. | Security considerations for present and future medical databases | |
CN108600178A (en) | A kind of method for protecting and system, reference platform of collage-credit data | |
Haraty | C2 secure database management systems—a comparative study | |
LAWAL et al. | Contemporary Control Measures for Mitigating Threats and Vulnerabilities to organizational Databases | |
Stallings | Operating system security | |
Murray | Security considerations for personal computers | |
Odabi et al. | Data security in health information systems by applying software techniques | |
Bishop | UNIX security in a supercomputing environment | |
Flynn et al. | Data dependent keys for a selective encryption terminal | |
Akhondzadeh | Data Protection & Security in MS-SQL Server DBMS | |
Nazarko et al. | OVERVIEW OF DATABASE INFORMATION PROTECTION APPROACHES IN MODERN DATABASE MANAGEMENT SYSTEMS |