2006
DOI: 10.1007/s00287-006-0101-0
|View full text |Cite
|
Sign up to set email alerts
|

Der Patient bleibt Herr seiner Daten Realisierung des eGK-Berechtigungskonzepts über ein ticketbasiertes, virtuelles Dateisystem

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2008
2008
2019
2019

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…In our opinion, the most critical and an open issue in context of health records is the protection of patient's privacy. This is due to the sensitive nature of medical data and especially actual concepts only cover specific issues [11,12,13,14]. As a consequence, it would be desirable to have a holistic view which integrates all relevant privacy aspects.…”
Section: Privacy-relevant Requirements and Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…In our opinion, the most critical and an open issue in context of health records is the protection of patient's privacy. This is due to the sensitive nature of medical data and especially actual concepts only cover specific issues [11,12,13,14]. As a consequence, it would be desirable to have a holistic view which integrates all relevant privacy aspects.…”
Section: Privacy-relevant Requirements and Methodsmentioning
confidence: 99%
“…To achieve unlinkability between the objects (PATIENT, FOLDER, etc. ), pseudonymization of relationships [12,20,21] is adopted. In order to pseudonymize a relationship (e.g., PATIENT to FOLDER), the creator of the record chooses a second random primary key per record, encrypted and then integrated into the master table (PATIENT).…”
Section: Figurementioning
confidence: 99%
“…dentist and general practitioner access different partial identities) [35]. The Fraunhofer ISST designed a concept for the German electronic health card (eGK), which uses ticket-based authorization and challenge-based authentication to allow fine-granular access control to data fragments, which are unlinkable by default [5]. Biskup and Flegel use a secret sharing scheme to assign each event in an intrusion detection system a unique pseudonym, which keeps events unlinkable until enough evidence for re-identification is available [2].…”
Section: Examplesmentioning
confidence: 99%
“…Caumanns describes an architecture developed for the German electronic health insurance card [5], which was developed at the Fraunhofer Institute for Software and Systems Engineering. The approach uses a ticket-based (challengeresponse) method to authenticate users, while keeping links between data fragments hidden using pseudonyms.…”
Section: Introductionmentioning
confidence: 99%