期刊文献+

基于区块链技术的电子健康档案安全建设 被引量:72

Block chain technology-based security of electronic health records
下载PDF
导出
摘要 在"互联网+"大背景下,电子健康档案大数据建设面临着信息安全和隐私保护的双重挑战。论述了现有信息技术面对中心化、关系型数据库的大规模医疗健康记录遇到的瓶颈。指出区块链技术可使信息由数据转移向价值转移,在分析区块链技术的基础上,讨论了医疗在去中心化、隐私保护、基因测序方面的应用并构想相关场景,为电子健康档案建设带来新的研究思路。 Big data of electronic health records( EHR) are faced with the challenge of both information security and privacy protection in the " Internet +" era. The bottleneck of information technology in centralized and relational databases-covered EHR was described,application of block chain technology in decentralization,privacy protection and gene sequencing was elaborated in order to usher in new ideas for the construction of EHR.
作者 黄永刚
出处 《中华医学图书情报杂志》 CAS 2016年第10期38-40,46,共4页 Chinese Journal of Medical Library and Information Science
关键词 电子健康档案 区块链 大数据 去中心化 隐私保护 信息安全 价值转移 EHR Block chain Big data Decentralization Privacy protection Security of information Transmition of Value
  • 相关文献

参考文献10

二级参考文献70

  • 1张鹏,童云海,唐世渭,杨冬青,马秀莉.一种有效的隐私保护关联规则挖掘方法[J].软件学报,2006,17(8):1764-1774. 被引量:53
  • 2Machanavajjhala A,Gehrke J,Kifer D.l-Diversity:Privacy beyond K-anonymity.In:Liu L,Reuter A,Whang KY,Zhang J,eds.Proc.of the 22nd Int'l Conf.on Data Engineering.Atlanta:IEEE Computer Society,2006.24-35.
  • 3Wong RC,Li J,Fu AW,Wang K.(a,k)-Anonymity:An enhanced K-anonymity model for privacy-preserving data publishing.In:Eliassi-Rad T,Ungar LH,Craven M,Gunopulos D,eds.Proc.of the 12th Int'l Conf.on Knowledge Discovery and Data Mining.New York:ACM Press,2006.754-759.
  • 4Li N,Li T,Venkatasubramanian S.t-Closeness:Privacy beyond k-anonymity and l-diversity.In:Dogac A,Ozsu T,Sellis T,eds.Proc.of the 23rd Int'l Conf.on Data Engineering.Istanbul:IEEE Computer Society,2007.106-115.
  • 5Xiao X,Tao Y.Personalized privacy protecting.In:Chaudhuri S,Hristidis V,Polyzotis N,eds.Proc.of the Int'l Conf.on Management of Data.Chicago:ACM Press,2006.229-240.
  • 6Fung BCM,Wang K,Yu PS.Top-Down specialization for information and privacy preservation.In:Aberer K,Franklin M,Nishio S,eds.Proc.of the 21st Int'l Conf.on Data Engineering.Tokyo:IEEE Computer Society,2005.205-216.
  • 7LeFevre K,DeWitt DJ,Ramakrishnan R.Incognito:Efficient full-domain K-anonymity.In:Ozcan F,ed.Proc.Of the Int'l Conf.On Management of Data.Maryland:ACM Press,2005.49-60.
  • 8Aggarwal G,Feder T,Kenthapadi K,Motwani R,Panigrahy R,Thomas D,Zhu A.Anonymizing tables.In:Eiter T,Libkin L,eds.Proc.of the 10th Int'l Conf.on Database Theory.Edinburgh:Springer-Verlag,2005.246-258.
  • 9Wang K,Fung BCM.Anonymizing sequential releases.In:Eliassi-Rad T,Ungar LH,Craven M,Gunopulos D,eds.Proc.of the 12th Int'l Conf.on Knowledge Discovery and Data Mining.Philadelphia:ACM Press,2006.414-423.
  • 10Xiao X,Tao Y.Anatomy:Simple and effective privacy preservation.In:Dayal U,Whang KY,Lomet DB,Alonso G,Lohman GM,Kersten ML,Cha SK,Kim YK,eds.Proc.of the 32nd Int'l Conf.on Very Large Data Bases.Seoul:VLDB Endowment,2006.139-150.

共引文献97

同被引文献566

引证文献72

二级引证文献1166

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部