Sciweavers

826 search results - page 2 / 166
» Medical Requirements for Data Protection
Sort
View
CBMS
2008
IEEE
14 years 8 days ago
What Do You Want to Know? Investigating the Information Requirements of Patient Supporters
There is a vast amount of data associated with any one patient. It is challenging for medical staff to understand all this data. It is even harder for a lay person, who may not ev...
Wendy Moncur, Judith Masthoff, Ehud Reiter
ICDE
2005
IEEE
167views Database» more  ICDE 2005»
14 years 7 months ago
Privacy and Ownership Preserving of Outsourced Medical Data
The demand for the secondary use of medical data is increasing steadily to allow for the provision of better quality health care. Two important issues pertaining to this sharing o...
Elisa Bertino, Beng Chin Ooi, Yanjiang Yang, Rober...
EDBT
2010
ACM
237views Database» more  EDBT 2010»
14 years 18 days ago
BronzeGate: real-time transactional data obfuscation for GoldenGate
Data privacy laws have appeared recently, such as the HIPAA laws for protecting medical records, and the PCI guidelines for protecting Credit Card information. Data privacy can be...
Shenoda Guirguis, Alok Pareek
EDBT
2008
ACM
154views Database» more  EDBT 2008»
14 years 5 months ago
Data utility and privacy protection trade-off in k-anonymisation
K-anonymisation is an approach to protecting privacy contained within a dataset. A good k-anonymisation algorithm should anonymise a dataset in such a way that private information...
Grigorios Loukides, Jianhua Shao
GRID
2008
Springer
13 years 5 months ago
A Secure Grid Medical Data Manager Interfaced to the gLite Middleware
The medical community is producing and manipulating a tremendous volume of digital data for which computerized archiving, processing and analysis is needed. Grid infrastructures ar...
Johan Montagnat, Ákos Frohner, Daniel Jouve...