PERiMETER – pseudonymization and personal metadata encryption for privacy-preserving searchable documents
Tóm tắt
Tài liệu tham khảo
Bouchard S (2011) Three of top 6 data breaches of 2011 were in healthcare. Healthcare Finance News, 19 December.
Carr J (2002) Strategies and issues: thwarting insider attacks. Network Magazine, September 5.
Cunningham H, Maynard D and Bontcheva K (2011) Text Processing with GATE. Gateway Press, California.
Eggers WD (2007) Government 2.0: Using Technology to Improve Education, Cut Red Tape, Reduce Gridlock, and Enhance Democracy. Rowman and Littlefield, Lanham, MD.
Horowitz BT (2011) Patients sue Sutter health over data breach involving 4.24 million people. Health Care IT News, 30 November.
IHE (2010) IHE IT infrastructure (ITI) technical framework 7.0.
NEMA (2008) Digital imaging and communications in medicine. Standard, National Electrical Manufacturers Association, Rosslyn, VA.
OASIS (2010) eXtensible access control markup language (XACML) version 3.0. Committee Specification 01.
Ponemon Institute (2011) Second annual benchmark study on patient privacy & data security. Research Report.
RØstad L and Edsberg O (2006) A study of access control for healthcare systems based on audit trails from audit logs. In Proceedings of the 22nd Annual Computer Security Applications Conference, Miami Beach, pp 175–186.
Sweeney L (2002) k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10 (5), 557–570.
Thielscher C, Gottfried M, Umbreit S, Boegner F, Haack J and Schroeders N (2005) Patent: data processing system for patient data. Int. Patent, WO 03/034294 A2.