• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,408
Next 10 →

The Cricket Location-Support System

by Nissanka B. Priyantha, Anit Chakraborty, Hari Balakrishnan , 2000
"... This paper presents the design, implementation, and evaluation of Cricket, a location-support system for in-building, mobile, locationdependent applications. It allows applications running on mobile and static nodes to learn their physical location by using listeners that hear and analyze informatio ..."
Abstract - Cited by 1058 (11 self) - Add to MetaCart
that improve accuracy. Our experience with Cricket shows that several location-dependent applications such as in-building active maps and device control can be developed with little effort or manual configuration. 1

A Secure e-Health Architecture based on the Appliance of Pseudonymization

by unknown authors
"... Abstract — Due to the cost pressure on the health care system an increase in the need for electronic healthcare records (EHR) could be observed in the last decade, because EHRs promise massive savings by digitizing and centrally providing medical data. As highly sensitive patient information is exch ..."
Abstract - Add to MetaCart
, authorization and data recovery that allows to restore the access to the health care records if the patients ’ security token is lost or stolen. The concept can be used as basis for national EHR initiatives or as an extension to EHR applications. Index Terms — privacy, security, e-health, pseudonymization

Transforming Data to Satisfy Privacy Constraints

by Vijay S. Iyengar , 2002
"... Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can also contain other kinds of personal information (e.g., date of birth, zip code, gender) that are potentially identifying ..."
Abstract - Cited by 250 (0 self) - Add to MetaCart
of preserving privacy for the specified usage. In particular, we investigate the privacy transformation in the context of data mining applications like building classification and regression models. Second, our work improves on previous approaches by allowing more flexible generalizations for the data. Lastly

Pseudonymous contextaware transport applications

by David Evans, Alastair R. Beresford - In Proceedings of the UKUbinet Workshop , 2006
"... Abstract: This position paper examines some of the privacy features required in context-aware transport applications. We begin by describing why pseudonymity is preferable to access control for protecting privacy. We then present three sample transport applications and describe the key pseudonymity ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract: This position paper examines some of the privacy features required in context-aware transport applications. We begin by describing why pseudonymity is preferable to access control for protecting privacy. We then present three sample transport applications and describe the key pseudonymity

Collaborative filtering with privacy via factor analysis

by John Canny - In Proceedings of the 25th annual international ACM SIGIR conference on Research and development in information retrieval , 2002
"... Collaborative filtering is valuable in e-commerce, and for direct recommendations for music, movies, news etc. But today’s systems use centralized databases and have several disadvantages, including privacy risks. As we move toward ubiquitous computing, there is a great potential for individuals to ..."
Abstract - Cited by 210 (9 self) - Add to MetaCart
data. Our experiments on several test datasets show that the algorithm is more accurate than previously reported methods, and the improvements increase with the sparseness of the dataset. Finally, factor analysis with privacy is applicable to other kinds of statistical analyses of survey

A Legal Evaluation of Pseudonymization Approaches

by Thomas Neubauer, Mathias Kolb
"... Abstract—Privacy is one of the fundamental issues in health care today and a fundamental right of every individual. Several laws were enacted that demand the protection of patients ’ privacy. However, approaches for protecting privacy often do not comply with legal requirements or basic secu-rity re ..."
Abstract - Add to MetaCart
-rity requirements. This paper highlights research directions currently pursued for privacy protection in e-health and evaluates common pseudonymization approaches against legal criteria taken from Directive 95/46/EC and HIPAA. Thereby, it supports decision makers in deciding on privacy systems and researchers

eTELEMED 2011: The Third International Conference on eHealth, Telemedicine, and Social Medicine Protecting Patient Privacy when Sharing Medical Data

by Stefan Benzschawel, Marcos Da Silveira
"... Abstract — This paper describes a national eHealth platform concept with a multi-level privacy protection in order to improve the security and privacy of medical information on their storage locations as well as during the exchanging/sharing processes. The key idea is to classify and split-up data i ..."
Abstract - Add to MetaCart
Abstract — This paper describes a national eHealth platform concept with a multi-level privacy protection in order to improve the security and privacy of medical information on their storage locations as well as during the exchanging/sharing processes. The key idea is to classify and split-up data

An Evaluation of Technologies for the Pseudonymization of Medical Data

by Thomas Neubauer, Mathias Kolb
"... Abstract. Privacy is one of the fundamental issues in health care today. Although, it is a fundamental right of every individual to demand privacy and a variety of laws were enacted that demand the protection of patients ’ privacy, approaches for protecting privacy often do not comply with legal req ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
requirements or basic security requirements. This paper highlights research directions currently pursued for privacy protection in e-health and evaluates common pseudonymization approaches against legal and technical criteria. Thereby, it supports decision makers in deciding on privacy systems and researchers

Mechanism for eHealth Systems

by Milica Milutinovic, Vincent Naessens, Bart De Decker, Milica Milutinovic, Vincent Naessens, Bart De Decker, Milica Milutinovic, Vincent Naessens, Bart De Decker , 2012
"... In this paper, we describe privacy-preserving protocols for a scheduling service in eHealth applications. We are integrating our proposal into a pervasive home assistance system that allows patients or elderly people to stay longer at home. This pervasive eHealth system offers a multitude of service ..."
Abstract - Add to MetaCart
In this paper, we describe privacy-preserving protocols for a scheduling service in eHealth applications. We are integrating our proposal into a pervasive home assistance system that allows patients or elderly people to stay longer at home. This pervasive eHealth system offers a multitude

Privacy-Preserving Indexing for eHealth Information Networks

by Yuzhe Tang, Ting Wang, Ling Liu, Shicong Meng, Balaji Palanisamy
"... The past few years have witnessed an increasing demand for the next generation health information networks (e.g., NHIN[1]), which hold the promise of supporting large-scale information sharing across a network formed by autonomous healthcare providers. One fundamental capability of such information ..."
Abstract - Add to MetaCart
The past few years have witnessed an increasing demand for the next generation health information networks (e.g., NHIN[1]), which hold the promise of supporting large-scale information sharing across a network formed by autonomous healthcare providers. One fundamental capability of such information
Next 10 →
Results 1 - 10 of 1,408
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University