A secure architecture for the pseudonymization of medical data

@article{Riedl2007ASA,
  title={A secure architecture for the pseudonymization of medical data},
  author={Bernhard Riedl and Thomas Neubauer and Gernot Goluch and Oswald Boehm and Gert Reinauer and Alexander Krumboeck},
  journal={The Second International Conference on Availability, Reliability and Security (ARES'07)},
  year={2007},
  pages={318-324}
}
As aging and very expensive programs put more pressure on health and social care systems, an increase in the need for electronic healthcare records can be observed, because they promise massive savings and better clinical quality. However, patients and commissioners for data protection have legitimate concerns about the privacy and confidentiality of the stored data. Although the concept of pseudonymization allows an association with a patient only under specified and controlled circumstances… CONTINUE READING
Highly Cited
This paper has 38 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.
20 Citations
18 References
Similar Papers

Citations

Publications citing this paper.
Showing 1-10 of 20 extracted citations

References

Publications referenced by this paper.
Showing 1-10 of 18 references

Central Questions of Anonymization: A Case Study of Secondary Use of Qualitative Data

  • D. Thomson, L. Bzdel, K. Golden-Biddle, T. Reay, C. A. Estabrooks
  • Forum Qualitative Social Research,
  • 2005
2 Excerpts

Koehntopp. Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management A Consolidated Proposal for Terminology

  • M. A. Pfitzmann
  • In Lecture Notes in Computer Science
  • 2005
2 Excerpts

Patent: Data processing system for patent

  • C. Thielscher, M. Gottfried, S. Umbreit, F. Boegner, J. Haack, N. Schroeders
  • 2005
3 Excerpts

Similar Papers

Loading similar papers…