Privacy Policy Enforcement For Health Information Data Access

被引:0
|
作者
Currim, Faiz [1 ]
Jung, Eunjin [1 ]
Xiao, Xin [1 ]
Jo, Insoon [1 ]
机构
[1] Univ Iowa, Dept Management Sci, Iowa City, IA 52242 USA
关键词
database; privacy; security; fine-grained access control; QUERIES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless technology is steadily improving the access and cost-effectiveness of healthcare data management. With the growth in information access, comes the challenge of maintaining patient record privacy and security. Our work develops an algorithm to evaluate ad-hoc user queries against database policies. We consider an efficient evaluation algorithm (defined at the schema-level), based on a classification of attributes in the policy and query (both of which can be written in SQL). Our algorithm can be used for policy integration as well, and scales well with typical query sizes that may be expected for mobile devices.
引用
收藏
页码:39 / 44
页数:6
相关论文
共 50 条
  • [41] COVID-19 health data analysis and personal data preserving: A homomorphic privacy enforcement approach
    Dhasarathan, Chandramohan
    Hasan, Mohammad Kamrul
    Islam, Shayla
    Abdullah, Salwani
    Mokhtar, Umi Asma
    Javed, Abdul Rehman
    Goundar, Sam
    [J]. COMPUTER COMMUNICATIONS, 2023, 199 : 87 - 97
  • [42] HEALTH INFORMATION PRIVACY
    GOSTIN, LO
    [J]. CORNELL LAW REVIEW, 1995, 80 (03) : 451 - 528
  • [43] Privacy-aware Policy Establishment and Enforcement for Information Center Repository: A Case Study of Government Meteorological Information Center Repository
    Lertladechanon, Yotsapon
    Prompoon, Nakornthip
    [J]. 2014 FOURTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION AND COMMUNICATION TECHNOLOGY AND IT'S APPLICATIONS (DICTAP), 2014, : 291 - 296
  • [44] Balancing privacy with access to information for commercial fisheries data: A critical review of Fisheries and Oceans Canada's "rule of five" policy
    Tomasic, Nicole
    [J]. FACETS, 2023, 8 : 80 - 90
  • [45] Balancing Access to Health Data and Privacy: A Review of the Issues and Approaches for the Future
    Lane, Julia
    Schur, Claudia
    [J]. HEALTH SERVICES RESEARCH, 2010, 45 (05) : 1456 - 1467
  • [46] Mobile Access to Information Systems in law Enforcement: an Evaluation of its Implications for Data Quality
    Lindsay, Rachael
    Jackson, Thomas
    Cooke, Louise
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND EVALUATION, 2010, : 188 - 196
  • [47] Technological Threats to Privacy and Information Access
    Stuart, David
    [J]. ONLINE, 2012, 36 (05): : 35 - 37
  • [48] Adaptive information access: Personalization and privacy
    Smyth, Barry
    [J]. INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2007, 21 (02) : 183 - 205
  • [49] BIAP: Balancing information access and privacy
    Whitman, J
    McLeod, J
    Hare, C
    [J]. JOURNAL OF THE SOCIETY OF ARCHIVISTS, 2001, 22 (02): : 253 - 274
  • [50] On Dynamic & Subjective Trust for Privacy Policy Enforcement in Cloud Computing
    Ramachandran, Karthick
    Lutfiyya, Hanan
    Perry, Mark
    [J]. 2013 IEEE 15TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2013 IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (HPCC_EUC), 2013, : 1585 - 1592