[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Williams, 2010 - Google Patents

Social networking applications in health care: threats to the privacy and security of health information

Williams, 2010

Document ID
8332413603888966723
Author
Williams J
Publication year
Publication venue
Proceedings of the 2010 ICSE workshop on software engineering in health care

External Links

Snippet

The advent of social networking websites for use in health care has prompted concerns about the risks that such systems pose to the security and privacy of personal health information. In this paper, we survey the research literature, in order to provide a current …
Continue reading at dl.acm.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Similar Documents

Publication Publication Date Title
US11790117B2 (en) Systems and methods for enforcing privacy-respectful, trusted communications
US12093426B2 (en) Systems and methods for functionally separating heterogeneous data for analytics, artificial intelligence, and machine learning in global data ecosystems
Williams Social networking applications in health care: threats to the privacy and security of health information
CA3061638C (en) Systems and methods for enforcing centralized privacy controls in de-centralized systems
US10572684B2 (en) Systems and methods for enforcing centralized privacy controls in de-centralized systems
US10043035B2 (en) Systems and methods for enhancing data protection by anonosizing structured and unstructured data and incorporating machine learning and artificial intelligence in classical and quantum computing environments
Tertulino et al. Privacy in electronic health records: a systematic mapping study
Appari et al. Information security and privacy in healthcare: current state of research
US20230054446A1 (en) Systems and methods for functionally separating geospatial information for lawful and trustworthy analytics, artificial intelligence and machine learning
EP3063691B1 (en) Dynamic de-identification and anonymity
Vimalachandran et al. Improving accessibility of the Australian My Health Records while preserving privacy and security of the system
CA3104119C (en) Systems and methods for enforcing privacy-respectful, trusted communications
Seneviratne et al. Enabling privacy through transparency
Li A privacy preservation model for health-related social networking sites
Leibenger et al. Privacy challenges in the quantified self movement–an EU perspective
Arbuckle et al. Building an anonymization pipeline: creating safe data
Els Artificial intelligence as a digital privacy protector
Dankar et al. A risk-based framework for biomedical data sharing
Jiang et al. Healthcare Big Data Privacy Protection Model Based on Risk‐Adaptive Access Control
Williams et al. The regulation of personal health record systems in Canada
Wang A framework for Privacy-Enhanced personalization
Obrezkov Cognition Behind Access Control: A Usability Comparison of Rule-and Category-Based Mechanisms
Kargl et al. Privacy in Mobile Sensing
Kamarinou et al. Protection of Personal Data in Clouds and Rights of Individuals
Bertsima et al. Strengthening Privacy in Healthcare Social Networks