The security issue of federated data warehouses in the area of evidence-based medicine

@article{Stolba2006TheSI,
  title={The security issue of federated data warehouses in the area of evidence-based medicine},
  author={Nevena Stolba and Marko Banek and A Min Tjoa},
  journal={First International Conference on Availability, Reliability and Security (ARES'06)},
  year={2006},
  pages={11 pp.-339}
}
Healthcare organisations practicing evidence-based medicine strive to unite their data assets in order to achieve a wider knowledge base for more sophisticated research as well as to provide a matured decision support service for the care givers. The central point of such an integrated system is a data warehouse, to which all participants have access. Due to the high confidentiality of healthcare data, and the privacy policy of participating organisations, the proposed warehouse is not created… CONTINUE READING
Highly Cited
This paper has 20 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 14 extracted citations

Analysis of the Use of Privacy-Enhancing Technologies to Achieve PIPEDA Compliance in a B2C e-Business Model

Eighth World Congress on the Management of eBusiness (WCMeB 2007) • 2007
View 3 Excerpts
Highly Influenced

Towards development of health Data Warehouse: Bangladesh perspective

2015 International Conference on Electrical Engineering and Information Communication Technology (ICEEICT) • 2015

A secured agent-based framework for data warehouse management

2013 IEEE International Conference on Industrial Technology (ICIT) • 2013
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-10 of 13 references

Privacy, Information Technology, and Health Care

Commun. ACM • 1997
View 3 Excerpts
Highly Influenced

Federated Data warehouse Architecture

R. Jindal, A. Acharya
Wipro Technologies white paper, • 2004
View 1 Excerpt

Romney: “Neglect of Information Privacy Instruction-A Case of Educational Malpractise?

G.W.V.W. Romney
Proceedings of the 5th Conference on Information Technology Education (SIGITE • 2004
View 1 Excerpt

Secondary use of the EHR via pseudonymisation.

Studies in health technology and informatics • 2004
View 2 Excerpts

Data Sanitization Techniques

D. Edgar
A Net 2000 Ltd. White Paper, • 2003
View 1 Excerpt

Similar Papers

Loading similar papers…