The proper protection of personal information is Many countries have laws on these issues such as the increasingly becoming an important issue in an age where misuse Personal Information Protection and Electronic Documents of personal information and identity theft are widespread. At Act (PIPEDA) [4], and the Platform for Privacy Preferences times there is a need however for management or statistical Project (P3P) [5]. An overview of PIPEDA and its principles purposes based on personal information in aggregated form. The will be presented later in the paper in section 3. The P3P k-anonymization technique has been developed to de-associate system enables websites to express their privacy practices in a sensitive attributes and anonymise the information needed to a standard format that can be retrieved automatically and point where the identity and associated details cannot be interpreted easily by user agents. P3P user agents therefore reconstructed.~~~~1 trree asl y sragns.PPusraensterfr reconstructed. provide a mechanism where users can be informed of siteThe protection of personal information has manifested itself in practices (in both machine-and human-readable formats) and various forms, ranging from legislation, to policies such as P3P to automate decision-making based on these practices when and also information systems such as Hippocratic database.appropriate. This has the benefit that users need not read the Unfortunately, none of these provide support for statistical data privacy policies at every site they visit [5] and will be informed research and analysis. The traditional k-anonymity technique if there are changes. However, setting the rules does not proposes a solution to this problem, but determining which guarantee their diligent execution. What is much better is to information can be generalized and which information needs to concentrate on approaches that can actually monitor and be suppressed is potentially difficult to determine. enforce privacy protection at a technical level. Privacyenforcing technology aims at ensuring that privacy laws and In this paper we propose a new idea that integrates personal guidelines are actually applied to the data. Thus, an information ontology with the concept of k-anonymity [1], in information system based on these principles, is designed to order to overcome these problems. We demonstrate the idea with embed components that allow monitoring and ensuring a prototype in the context of healthcare data management, a compliance of the system to privacy rules, guidelines and sector in which maintaining the privacy of individual information conditions. is essential.One of the most frequently used approaches to ensure Keywords-K-anonymityt; Ontology; ; Data acces management privacy of released data is to modify the data by removing all information that can directly link data items to specific individuals.This technique is referred to as data anonymization. But removing the identity information from theIn an age of unprecedented storage, access and retrieval of relea...
The importance of electronic healthcare has caused numerous changes in both substantive and procedural aspects of healthcare processes. These changes have produced new challenges for patient privacy and information secrecy. Traditional privacy policies cannot respond to rapidly increased privacy needs of patients in electronic healthcare. Technically enforceable privacy policies are needed in order to protect patient privacy in modern healthcare with its cross-organizational information sharing and decision making. This paper proposes a personal information flow model that proposes a limited number of acts on this type of information. Ontology-classified chains of these acts can be used instead of the “intended business purposes” in the context of privacy access control. This enables the seamless integration of security and privacy into existing healthcare applications and their supporting infrastructures. In this paper, the authors present their idea of a Chain-Based Access Control (ChBAC) mechanism and provide a comparative analysis of it to Role-Based Access Control (RBAC). The evaluation is grounded in the healthcare domain and examines a range of typical access scenarios and approaches.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.