2005
DOI: 10.1007/s10916-005-1105-z
|View full text |Cite
|
Sign up to set email alerts
|

Protecting Medical Data for Decision-Making Analyses

Abstract: In this paper, we present a procedure for data protection, which can be applied before any model building based analyses are performed. In medical environments, abundant data exist, but because of the lack of knowledge, they are rarely analyzed, although they hide valuable and often life-saving knowledge. To be able to analyze the data, the analyst needs to have a full access to the relevant sources, but this may be in the direct contradiction with the demand that data remain secure, and more importantly in me… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2007
2007
2015
2015

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…One can only increase the time required. Thus let us assume a typical 60-year time span of usefulness of stored information [40][41][42][43][44]. In other words, a safe password today (in 2014) would be made of at least nine characters from upper and lowercase letters, numbers and symbols, but it would not be safe in 10 years from now.…”
Section: Background On Password Strength -Why Are Good Passwords mentioning
confidence: 99%
“…One can only increase the time required. Thus let us assume a typical 60-year time span of usefulness of stored information [40][41][42][43][44]. In other words, a safe password today (in 2014) would be made of at least nine characters from upper and lowercase letters, numbers and symbols, but it would not be safe in 10 years from now.…”
Section: Background On Password Strength -Why Are Good Passwords mentioning
confidence: 99%
“…The basic idea of secure multiparty computation is that a computation is secure if at the end of the computation, no party knows anything except its own input and the results, which is used in the field of PPDM. Linfton et al proposed distributed data mining, in which secure multiparty computation was used to build the secure set union and preserve the privacy [6,7]. In terms of data mining, most of the way of preserving privacy are based on Clustering, Bayesian classification and decision tree.…”
Section: Introductionmentioning
confidence: 99%