期刊文献+

匿名化服务在区域卫生信息平台中的应用研究

Research on the Application of Anonymous Service in Regional Health Information Platform
下载PDF
导出
摘要 为了解决患者数据越来越多地应用到临床诊疗服务、教学、临床科研和公共卫生等领域遭到隐私泄露的问题,采用基于HIPAA法案的Safe Harbor方法,设计研究一种灵活可配置的以CDA文档为输入输出的匿名化服务为解决匿名化的解决方案,达到区域卫生信息平台信息的隐私保护的结果。最终结论研究实现以匿名化服务,结合数据共享协议的使用,实现区域卫生信息平台上患者信息的隐私保护。 In order to solve more and more patient data to the clinical application of medical services,education,clinical research and public health and other fields have been the purpose of privacy.Safe Harbor method based HIPAA-designed study with a flexible configurable input and output CDA document to resolve anonymous service-oriented solutions to achieve regional health information platform information privacy results.The study concluded that in order to achieve the ultimate anonymity service,combined with the use of data-sharing agreements,to achieve privacy protection on regional health information platform for patient information.
出处 《中国数字医学》 2015年第11期80-82,107,共4页 China Digital Medicine
基金 广州市医药卫生科技项目(编号:20131A031002) 国家卫生信息共享技术及应用工程技术研究中心(编号:2013FU125Q03)~~
关键词 区域卫生信息平台 匿名化 web服务 HIPAA SAFE HARBOR CDA regional health information platform anonymization web service HIPAA Safe Harbor CDA
  • 相关文献

参考文献11

  • 1ISO/TS 25237:2008 Health Informatics- Pseudonymization,ISO/TS Std. [EB/OL][2014-05-12].http://www.iso.org/iso/ catalogue_detail?csnumber=42807.
  • 2IHE-Healthcare-Data-De-Identification- Handbook- InternalDraft-v039 [EB/ OL].[2014-05-12]. http://ftp.ihe.net/IT_ Inffastructure/iheitiyrl 1-2013-2014/Technical Cmte/Workltems/PseudonymizationWhitePaper/ IHE- Healthcare-Data-De-Identification- Handbook-IntemalDrati-v039.docx.
  • 3Charles Safran, Meryl Bloomrosen.Toward a National Framework for the Secondary Use of Health Data: An American Medical Informatics Association White Paper[J].J Am Med Inform Assoc,2007,14(1): 1-9.
  • 4赵霞,李小华.医疗数据二次应用探析[J].医疗卫生装备,2010,31(5):101-103. 被引量:3
  • 5Health Insurance Portability and Accountability Act of 1996[EB/OL]. http:// www.gpo.gov/fdsys/pkg/PLAW-104pub1191/ pdf/PLAW- 104pub1191.pd.
  • 6Sweeney L, k-anonymity.A model for protecting privacy[J].International Journal onUncertainty, Fuzziness and Knowledge-based Systems,2002,10(5): 557-70.
  • 7Machanavajjhala A,Kifer D,Gehrke J,et al. L-diversitv:Privacy beyond k-anonymity[J]. ACM Transactions on Knowledge Discovery from Data(TKDD),2007,1(1):24-35,.
  • 8Ninghui L,Tiancheng L,Venkatasubmmanian S.T-Closeness:Privacy Beyond k-Anonymity and 1-Diversity[J] Vata Ereefing,2:106-115.
  • 9李杨,温雯,谢光强.差分隐私保护研究综述[J].计算机应用研究,2012,29(9):3201-3205. 被引量:39
  • 10Lanky D.The Safe Harbor method of de- identification: an empirical test.Fourth National HIPAA Summit West.2010.[EB/OL].http:// www.ehcca.com/presentations/HIPAAWest4/ laflcy_2.pd.

二级参考文献47

  • 1Jiawei Han,Micheline Kamber.数据挖掘-概念与技术[M].范明,孟小峰,译.2版.北京:机械工业出版社,2007:2-4.
  • 2Ian H Witten,Eibe Frank.数据挖掘-实用机器学习技术[M].董琳,邱泉,于晓峰,等译.2版.北京:机械工业出版,2007:127-180.
  • 3TomMMitchell.机器学习[M].北京:机械工业出版社,2003..
  • 4SWEENEY L. ^-anonymity: a model for protecting privacy[ J ]. Inter-national Journal on Uncertainty, Fuzziness and Knowledge-based Systems,2002,10(5) :557-570.
  • 5SWEENEY L. Achieving A>anonymity privacy protection using gener-alization and suppression[ J]. International Journal on Uncertainty,Fuzziness and Knowledge-based Systems, 2002,10(5) : 571-588.
  • 6Li Ning-hui, LI Tian-cheng, VENKATASUBRAMANIAN S. (-closeness :privacy beyond A:-anonymity and /-diversity [ C ] //Proc of the 23rd International Conference on Data Engineering. Washington DC: IEEE Computer Society ,2007 :106-115.
  • 7MACHANAVAJJHALA A,KIFER D, GEHRKE J, et al. /-diversity; privacy beyond A:-anonymity [ C ] //Proc of the 22nd International Conference on Data Engineering. Washington DC:IEEE Computer Society,2006 :24-35.
  • 8CORMODE G,PROCOPIUC M,SRIVASTAVA D. et aL Differentially private publication of sparse data [ J ]. ArxiV Preprint arXiv : 1103. 0825,2011.
  • 9SARATHY R,MURALIDHAR K. Some additional insights on applying differential privacy for numeric data [ C ]//Proc of International Conference on Privacy in Statistical Databases. Berlin : Springer-Ver-lag,2010:210-219.
  • 10DWORK C, NAOR M,PITASSI T,et al. Pan-private streaming algorithms [C ] //Proc of the 1st Symposium on Innovations in Computer Science. Beijing:Tsinghua University Press, 2010.

共引文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部