[go: up one dir, main page]

Benitez et al., 2010 - Google Patents

Beyond safe harbor: automatic discovery of health information de-identification policy alternatives

Benitez et al., 2010

View PDF
Document ID
2224104611636967405
Author
Benitez K
Loukides G
Malin B
Publication year
Publication venue
Proceedings of the 1st ACM International Health Informatics Symposium

External Links

Snippet

Regulations in various countries permit the reuse of health information without patient authorization provided the data is" de-identified". In the United States, for instance, the Privacy Rule of the Health Insurance Portability and Accountability Act defines two distinct …
Continue reading at pmc.ncbi.nlm.nih.gov (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/30Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
    • G06F19/32Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
    • G06F19/322Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30587Details of specialised database models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/22Health care, e.g. hospitals; Social work

Similar Documents

Publication Publication Date Title
Zhou et al. Preserving privacy in social networks against neighborhood attacks
Durham et al. Quantifying the correctness, computational complexity, and security of privacy-preserving string comparators for record linkage
Wang et al. Anonymizing sequential releases
Tamersoy et al. Anonymization of longitudinal electronic medical records
Martínez et al. A semantic framework to protect the privacy of electronic health records with non-numerical attributes
Mohammed et al. Privacy-preserving heterogeneous health data sharing
Abbasi et al. A clustering‐based anonymization approach for privacy‐preserving in the healthcare cloud
WO2000049531A1 (en) Apparatus and method for depersonalizing information
Li et al. Towards optimal k-anonymization
Villarroel et al. A UML 2.0/OCL extension for designing secure data warehouses
Emam et al. De-identifying a public use microdata file from the Canadian national discharge abstract database
Benitez et al. Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
Alnemari et al. Protecting personally identifiable information (PII) in critical infrastructure data using differential privacy
Khan et al. Clustering based privacy preserving of big data using fuzzification and anonymization operation
Zainab et al. Sensitive and private data analysis: A systematic review
Gkoulalas-Divanis et al. Anonymization of electronic medical records to support clinical analysis
Moqurrab et al. Differential average diversity: an efficient privacy mechanism for electronic health records
Wong et al. Anonymization-based attacks in privacy-preserving data publishing
Li et al. Optimal k-anonymity with flexible generalization schemes through bottom-up searching
Khan et al. Secured technique for healthcare record linkage
Li et al. Towards an anti-inference (k, ℓ)-anonymity model with value association rules
Pejić Bach et al. Data anonymization patent landscape
Li et al. A framework for privacy-preserving medical document sharing
Aleksieva-Petrova et al. Three-Layer Model for Learner Data Anonymization
Dewri et al. A multi-objective approach to data sharing with privacy constraints and preference based objectives