Automated Transformation of Semi-Structured Text Elements
aisel.aisnet.org/amcis2012/proceedings/ISHealthcare/17 Interconnected systems, such as electronic health records (EHR), considerably improved the handling and processing of health information while keeping the costs at a controlled level. Since the EHR virtually stores all data in digitized form, personal medical documents are easily and swiftly available when…
PERiMETER – Pseudonymization and Personal Metadata Encryption for Privacy-Preserving Searchable Documents
[:en] The average costs of data leakage are steadily on the rise. Especially in healthcare, the disclosure of sensitive information may have unfavorable consequences for the patient. As a consequence, several data security and access control mechanisms have been introduced, ranging from data encryption to…
Recognition and Privacy Preservation of Paper-Based Health Records
ebooks.iospress.nl/publication/21844 While the digitization of medical data within electronic health records has been introduced in some areas, massive amounts of paper-based health records are still produced on a daily basis. This data has to be stored for decades due to legal reasons but is of…
Recognition and Pseudonymization of Personal Data in Paper-Based Health Records
Recognition and Pseudonymization of Personal Data in Paper-Based Health Records: E-health requires the sharing of patient-related data when and where necessary. Electronic health records (EHR) allow the structured and expandable collection of medical data needed for clinical research studies and thereby not only enable the…
Pseudonymization with Metadata Encryption for Privacy-Preserving Searchable Documents
[:en] The average costs of data leakage are steadily on the rise. As a consequence, several data security and access control mechanisms have been introduced, ranging from data encryption to intrusion detection or role-based access control, doing a great work in protecting sensitive information. However,…
A Methodology for the Pseudonymization of Medical Data
[:en] A Methodology for the Pseudonymization of Medical Data: E-health enables the sharing of patient-related data whenever and wherever necessary. Electronic health records (EHRs) promise to improve communication between health care providers, thus leading to better quality of patients’ treatment and reduced costs. However, as…
Privacy-Preserving Storage and Access of Medical Data Through Pseudonymization and Encryption
[:en] Privacy-Preserving Storage and Access of Medical Data Through Pseudonymization and Encryption: E-health allows better communication between health care providers and higher availability of medical data. However, the downside of interconnected systems is the increased probability of unauthorized access to highly sensitive records what could…
A Hybrid Approach Integrating Encryption and Pseudonymization for Protecting Electronic Health Records
Federated Health Information Systems (FHIS) integrate autonomous information systems of participating health care providers to facilitate the exchange of Electronic Health Records (EHR), which improve the quality and efficiency of patients‘ care. However, the main problem with collecting and maintaining the sensitive data in electronic…
Data Models for the Pseudonymization of DICOM Data
DICOM has become the most widely implemented and supported communications standard for medical imaging. The security of DICOM relies on the encryption of the communication channels. However, for highly sensitive medical data this is often not sufficient. This paper presents a data model for systems…
On the Security of Outsourced and Untrusted Databases
ieeexplore.ieee.org/xpl/articleDetails.jsp The outsourcing of databases to third parties has become a viable alternative to traditional in-house data management. Database management by third parties including the storage and maintenance allows companies to reduce their expenses and profit from the expertise of data storage specialists. However, the…