2010
DOI: 10.1016/j.cmpb.2009.12.001
|View full text |Cite
|
Sign up to set email alerts
|

Strategies for health data exchange for secondary, cross-institutional clinical research

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
45
0
2

Year Published

2014
2014
2022
2022

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 78 publications
(47 citation statements)
references
References 26 publications
0
45
0
2
Order By: Relevance
“…However, this is only possible if P trusts C i to check this (i.e., if P gave C i an access to the K S P,Cj -key shared between P and C j ). If SearchOver procedure returns a single pseudonym, C i will update RSDB with the P' data with gnrlQID that corresponds to PS j P (lines [8][9][10]. If the result of SearchOver contains more than one pseudonym, C i checks whether there is a possibility to merge the pseudonyms related to P by applying MergePseud procedure (line 12 ).…”
Section: Anonymization Of Patients' Data For Research Purposesmentioning
confidence: 99%
See 2 more Smart Citations
“…However, this is only possible if P trusts C i to check this (i.e., if P gave C i an access to the K S P,Cj -key shared between P and C j ). If SearchOver procedure returns a single pseudonym, C i will update RSDB with the P' data with gnrlQID that corresponds to PS j P (lines [8][9][10]. If the result of SearchOver contains more than one pseudonym, C i checks whether there is a possibility to merge the pseudonyms related to P by applying MergePseud procedure (line 12 ).…”
Section: Anonymization Of Patients' Data For Research Purposesmentioning
confidence: 99%
“…Using encryption combined with pseudonymization techniques [9,17,26] has been proposed recently for building eHealth system in the cloud. There exists also a number of architectures that employ Attribute-Based encryption (ABE) scheme [14][15][16]19,27].…”
Section: Existing Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…Aiming at allowing physicians to access patients' health data without disclosing patients' personal data, the pseudo anonymity technique has been applied in several works [31][32] [8]. Of these, [8] used an approach for reversible pseudonym generation; [32] proposed the possibility of sharing pseudonyms based on Shamir secret sharing [35]. Besides anonymize identity, many works (e.g., [2][9] [13][14] [15] to list a few) suggested that EHR data should also be encrypted in order to increase security.…”
Section: Electronic Health Record Systemmentioning
confidence: 99%
“…RELATED WORK In the literature, to de-identify (or anonymise) patients' records, two types of pseudonyms can be, namely, irreversible and reversible pseudonyms [7]. Irreversible pseudonyms are pseudonyms that cannot be reversed back to the patient's real identity.…”
Section: Introductionmentioning
confidence: 99%