2011
DOI: 10.1016/j.ijmedinf.2010.10.016
|View full text |Cite
|
Sign up to set email alerts
|

A methodology for the pseudonymization of medical data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
68
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
5
3
2

Relationship

2
8

Authors

Journals

citations
Cited by 118 publications
(69 citation statements)
references
References 10 publications
1
68
0
Order By: Relevance
“…This strategy allowed to decode anonymized data information provided from DICOM files. Differently, Neubauer et al [50] proposed a methodology for the anonymization of medical data that 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 stores health data decoupled from the corresponding patient-identifying information, thus allowing privacy-preserving secondary use of the health records in clinical studies without additional anonymization steps. This approach allowed the unlinked storage of medical data and related patient-identifying information, while still making it possible to reestablish the patient/health data relationship for authorized users.…”
Section: Securitymentioning
confidence: 95%
“…This strategy allowed to decode anonymized data information provided from DICOM files. Differently, Neubauer et al [50] proposed a methodology for the anonymization of medical data that 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 stores health data decoupled from the corresponding patient-identifying information, thus allowing privacy-preserving secondary use of the health records in clinical studies without additional anonymization steps. This approach allowed the unlinked storage of medical data and related patient-identifying information, while still making it possible to reestablish the patient/health data relationship for authorized users.…”
Section: Securitymentioning
confidence: 95%
“…Aiming at allowing physicians to access patients' health data without disclosing patients' personal data, the pseudo anonymity technique has been applied in several works [31][32] [8]. Of these, [8] used an approach for reversible pseudonym generation; [32] proposed the possibility of sharing pseudonyms based on Shamir secret sharing [35].…”
Section: Electronic Health Record Systemmentioning
confidence: 99%
“…We developed an approach denominated as 'Pseudonymization of Information for Privacy in E-Health' (PIPE) to provide a secured and privacy-preserving storage and retrieval of sensitive medical data [7]. The basic idea is that many medical records alone such as X-ray images (of frequent mishaps like broken legs) are insufficient to uniquely identify the patient after depersonalization.…”
Section: The Pipe Approachmentioning
confidence: 99%