2018
DOI: 10.1016/j.tele.2017.06.007
|View full text |Cite
|
Sign up to set email alerts
|

Semantic privacy-preserving framework for electronic health record linkage

Abstract: The version in the Kent Academic Repository may differ from the final published version. Users are advised to check http://kar.kent.ac.uk for the status of the paper. Users should always cite the published version of record.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 38 publications
0
11
0
Order By: Relevance
“…However, other features for confidentiality, privacy and provenance control are frequently available. All studies presented some authorization mechanism for health data integration through semantic web technologies [6,15,16,18,32,35,36,38,39,47,[50][51][52]57,60]. However, only a few have implemented additional features for authentication [16,18,36,38,51,57], confidentiality [16,18], privacy [16,18,39,47,52], and provenance [47].…”
Section: Access Controlmentioning
confidence: 99%
“…However, other features for confidentiality, privacy and provenance control are frequently available. All studies presented some authorization mechanism for health data integration through semantic web technologies [6,15,16,18,32,35,36,38,39,47,[50][51][52]57,60]. However, only a few have implemented additional features for authentication [16,18,36,38,51,57], confidentiality [16,18], privacy [16,18,39,47,52], and provenance [47].…”
Section: Access Controlmentioning
confidence: 99%
“…1) Privacy protection should be a default setting 2) The privacy should be embedded into the design 3) Full functionality plus full privacy protection 4) The entire lifecycle of data should be protected (data collection, storage, process, share, destroy) 5) Visibility and transparency are important 6) Individual's privacy is respectful 7) Proactive privacy protection instead of remedial action End to end privacy protection and data minimisation are examples that can be considered in the design of a health system [57].…”
Section: Privacy By Designmentioning
confidence: 99%
“…Privacy refers to the protection of information about an individual or a group; they can choose which information about themselves can be shared with others. The content and boundaries of what is private are different in different countries [57]. Privacy is a context-based concept.…”
Section: Privacy and Security Overlapmentioning
confidence: 99%
“…In addition, the exchange of information over the Internet has become essential and needs to achieve access authorisation, particularly in healthcare applications. Extensible access control markup language (XACML) standards include both access control (authorisation) and data management based on XML in the different systems [25]. Effectively, XACML offers features for data access and authorisation for the users at the fine-grained level, which is the most flexible and effective [26,27,28].…”
Section: Overview Of Security and Privacy Techniques In Ehr Systemsmentioning
confidence: 99%