Williams, 2010 - Google Patents
Social networking applications in health care: threats to the privacy and security of health informationWilliams, 2010
- Document ID
- 8332413603888966723
- Author
- Williams J
- Publication year
- Publication venue
- Proceedings of the 2010 ICSE workshop on software engineering in health care
External Links
Snippet
The advent of social networking websites for use in health care has prompted concerns about the risks that such systems pose to the security and privacy of personal health information. In this paper, we survey the research literature, in order to provide a current …
- 230000036541 health 0 title abstract description 98
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11790117B2 (en) | Systems and methods for enforcing privacy-respectful, trusted communications | |
US12093426B2 (en) | Systems and methods for functionally separating heterogeneous data for analytics, artificial intelligence, and machine learning in global data ecosystems | |
Williams | Social networking applications in health care: threats to the privacy and security of health information | |
CA3061638C (en) | Systems and methods for enforcing centralized privacy controls in de-centralized systems | |
US10572684B2 (en) | Systems and methods for enforcing centralized privacy controls in de-centralized systems | |
US10043035B2 (en) | Systems and methods for enhancing data protection by anonosizing structured and unstructured data and incorporating machine learning and artificial intelligence in classical and quantum computing environments | |
Tertulino et al. | Privacy in electronic health records: a systematic mapping study | |
Appari et al. | Information security and privacy in healthcare: current state of research | |
US20230054446A1 (en) | Systems and methods for functionally separating geospatial information for lawful and trustworthy analytics, artificial intelligence and machine learning | |
EP3063691B1 (en) | Dynamic de-identification and anonymity | |
Vimalachandran et al. | Improving accessibility of the Australian My Health Records while preserving privacy and security of the system | |
CA3104119C (en) | Systems and methods for enforcing privacy-respectful, trusted communications | |
Seneviratne et al. | Enabling privacy through transparency | |
Li | A privacy preservation model for health-related social networking sites | |
Leibenger et al. | Privacy challenges in the quantified self movement–an EU perspective | |
Arbuckle et al. | Building an anonymization pipeline: creating safe data | |
Els | Artificial intelligence as a digital privacy protector | |
Dankar et al. | A risk-based framework for biomedical data sharing | |
Jiang et al. | Healthcare Big Data Privacy Protection Model Based on Risk‐Adaptive Access Control | |
Williams et al. | The regulation of personal health record systems in Canada | |
Wang | A framework for Privacy-Enhanced personalization | |
Obrezkov | Cognition Behind Access Control: A Usability Comparison of Rule-and Category-Based Mechanisms | |
Kargl et al. | Privacy in Mobile Sensing | |
Kamarinou et al. | Protection of Personal Data in Clouds and Rights of Individuals | |
Bertsima et al. | Strengthening Privacy in Healthcare Social Networks |