Alabdulkarim et al., 2019 - Google Patents
PPSDT: A novel privacy-preserving single decision tree algorithm for clinical decision-support systems using IoT devicesAlabdulkarim et al., 2019
View HTML- Document ID
- 5210382264301821565
- Author
- Alabdulkarim A
- Al-Rodhaan M
- Ma T
- Tian Y
- Publication year
- Publication venue
- Sensors
External Links
Snippet
Medical service providers offer their patients high quality services in return for their trust and satisfaction. The Internet of Things (IoT) in healthcare provides different solutions to enhance the patient-physician experience. Clinical Decision-Support Systems are used to improve …
- 238000004422 calculation algorithm 0 title abstract description 68
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/32—Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
- G06F19/322—Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/22—Health care, e.g. hospitals; Social work
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fang et al. | Privacy preserving machine learning with homomorphic encryption and federated learning | |
Alabdulkarim et al. | PPSDT: A novel privacy-preserving single decision tree algorithm for clinical decision-support systems using IoT devices | |
Li et al. | Online/offline MA-CP-ABE with cryptographic reverse firewalls for IoT | |
Yin et al. | An IoT-based anonymous function for security and privacy in healthcare sensor networks | |
Tang et al. | Privacy-preserving distributed deep learning via homomorphic re-encryption | |
Hussien et al. | Blockchain-based access control scheme for secure shared personal health records over decentralised storage | |
Wu et al. | Hidden policy attribute-based data sharing with direct revocation and keyword search in cloud computing | |
Gu et al. | A review of privacy enhancement methods for federated learning in healthcare systems | |
Zhu et al. | Secure and privacy-preserving body sensor data collection and query scheme | |
El-Yahyaoui et al. | A verifiable fully homomorphic encryption scheme for cloud computing security | |
Wibawa et al. | BFV-based homomorphic encryption for privacy-preserving CNN models | |
Jiang et al. | EPPS: Efficient and privacy-preserving personal health information sharing in mobile healthcare social networks | |
Ali et al. | Lightweight fine-grained access control for wireless body area networks | |
Gaur et al. | A machine-learning–blockchain-based authentication using smart contracts for an ioht system | |
Yang et al. | Blockchain-based multiple authorities attribute-based encryption for EHR access control scheme | |
Yang et al. | Quantum nonlocality in any forked tree-shaped network | |
Wei et al. | Efficient privacy-preserving K-means clustering from secret-sharing-based secure three-party computation | |
Yin et al. | PPK-means: Achieving privacy-preserving clustering over encrypted multi-dimensional cloud data | |
Abunadi et al. | Optimal multikey homomorphic encryption with steganography approach for multimedia security in Internet of everything environment | |
Liu et al. | Towards an efficient privacy-preserving decision tree evaluation service in the Internet of Things | |
Li et al. | Public auditing with privacy protection in a multi-user model of cloud-assisted body sensor networks | |
Feng et al. | Certificateless searchable encryption scheme in multi-user environment | |
Jiang et al. | A Blockchain-Based Secure Multi-Party Computation Scheme with Multi-Key Fully Homomorphic Proxy Re-Encryption | |
Zhang et al. | Time delay complex Chen chaotic system and secure communication scheme for wireless body area networks | |
Ping et al. | A multi-keyword searchable encryption scheme based on probability trapdoor over encryption cloud data |