18
Views
2
CrossRef citations to date
0
Altmetric
Articles

Through the Looking Glass: Towards A Formalization of Aggregation Issues in Health Data Integration (HDI)

&
Pages 120-130 | Published online: 01 Feb 2016

References

  • Anderson, J.G. “Security of the Distributed Electronic Patient Record: A Case-based Approach to Identifying Policy Issues,” International Journal of Medical Informatics, 60:2, November 2000, pp. 111–118.
  • Bakker, A. “Security in Perspective: Luxury or Must?” International Journal of Medical Informatics, 49:1, March 1998, pp. 31–37.
  • Barber, B. “Patient Data and Security: An Overview,” International Journal of Medical Informatics, 49:1, March 1998, pp. 19–30.
  • Blobel, B. “The European TrustHealth Project Experiences with Implementing a Security Infrastructure,” International Journal of Medical Informatics, 60:2, November 2000, pp. 193–201.
  • Blobel, B. and F. Roger-France. “A Systematic Approach for Analysis and Design of Secure Health Information Systems,” International Journal of Medical Informatics, 62:1, June 2001, pp. 51–78.
  • Bobis, K.G. “Implementing Right to Know Security in the Computer-based Patient Record,” Proceedings of the International Phoenix Conference on Computers and Communications, 1994, pp. 156–160.
  • Brewer, D.F.C. and M.J. Nash. “The Chinese Wall Security Policy,” Proceedings of 1990 IEEE Computer Society Symposium on Security and Privacy, 1989, pp. 206–214.
  • Chao, H.-M., C.-M. Hsu, and S.-G. Miaou. “A Data-hiding Technique with Authentication, Integration, and Confidentiality for Electronic Patient Records,” IEEE Transactions on Information Technology in Biomedicine, 6:1, March 2002, pp. 46–53.
  • Clark, D.R. and D.R. Wilson. “A Comparison of Commercial and Military Computer Security Policies,” Proceedings of 1987 IEEE Symposium on Security and Privacy, 1987, pp. 184–194.
  • Cushman, R. “Information and Medical Ethics: Protecting Patient Privacy,” IEEE Technology and Society Magazine, 15, Fall 1996, pp. 32–39.
  • France, F.H.R. “Control and Use of Health Information: A Doctor's Perspective,” International Journal of Biomedical Computing, 43:1–2, October 1996, pp. 19–25.
  • Glymour, C., D. Madigan, D. Pregibon, and P. Smyth. “Statistical Inference and Data Mining,” Communications of the ACM, 39:11, November 1996, pp. 35–41.
  • Grimson, J., G. Stephens, B. Jung, W. Grimson, D. Berry and S. Pardon. “Sharing Health-care Records Over the Internet,” IEEE Internet Computing, 5:3, May/June 2001, pp. 49–58.
  • Heinlein, E.B. “Medical Records Security,” Computers & Security, 15, 1996, pp. 100–102.
  • Hung, P.C.K. “Specifying Conflict of Interest in Web Services Endpoint Language (WSEL),” ACM SIGecom Exchanges (Online), 3:3, August 2002, pp. 1–8. Available: http://www.acm.org/sigs/sigecom/exchanges/
  • Hung, P.C.K., K. Karlapalem, and J. Gray, III. “Least Privilege Security in CapBasED-AMS,” International Journal of Cooperative Information Systems, 8:2–3, 1999, pp. 139–168.
  • International medical Informatics Association-IMIA. “A Code of Ethics for Professionals (HIPs). WG 04 Data Protection in Health Information Systems (Online). Available: http://www.imia.org/pubdocs/Code_of_ethics.pdf., March 2001.
  • Ishida, Y. and N. Sakamoto. “A Secure Model for Communication of Healthcare Information by Sub-division of Information and Multiplication of Communication Paths,” International Journal of Medical Informatics, 49:1, March 1998, pp. 75–80.
  • Ishikawa, K. “Health Data Use and Protection Policy: Based on Differences by Cultural and Social Environment,” International Journal of medical Informatics, 60:2, November 2000, pp. 119–125.
  • James, A., Y. Wilcox, and R.N.G. Naguib. “A Telematic System for Oncology Based on Electronic Health and Patient Records,” IEEE Transactions on Information Technology in Biomedicine, 5:1, March 2001, pp. 16–17.
  • Kaihara, S. “Realization of the Computerized Patient Record: Relevance and Unsolved Problems,” International Journal of Medical informatics, 49:1, March 1998, pp. 1–8.
  • Koroukian, S.M., G.S. Cooper and A.A. Rimm. “The Linked Ohio Cancer Incidence Surveillance System and Medicaid Files: An Example of Health Data Integration,” National Association of Health Data Organizations (Online). Available: http://www.nahdo.org/meetings/16meeting/meetpres/koroukianNAHDO—Dec2001.pdf, December 2001.
  • Kouri, P. and E. Kemppainen. “The Implementation of Security in Distributed Infant and Maternity Care,” International Journal of Medical Informatics, 60:2, June 2001, pp. 211–218.
  • Lacroix, Z. “Biological Data Integration: Wrapping Data and Tools,” IEEE Transactions on Information Technology in Biomedicine, 6:2, June 2002, pp. 123–138.
  • Lei, V.D.J. “Use and Abuse of Computer Stored Medical Records,” Methods of Information in Medicine, 30, 1991, pp. 79–80.
  • Lin, T.Y. “Chinese Wall Security Model and Conflict Analysis,” Proceedings of the 24th Annual International of Computer Software and Applications Conference (COMPSAC 2000), 2000, pp. 122–127.
  • Lin, T.Y. “Chinese Wall Security Policy-An Aggressive Model,” Proceedings of the Fifth Annual Computer Security Applications Conference, 1990, pp. 282–289.
  • Louwerse, K. “The Electronic Patient Record; The Management of Access-Case Study: Leiden University Hospital,” International Journal of Medical Informatics, 49:1, March 1998, pp. 39–44.
  • Lunt, T.F. “Aggregation and Inference: Facts and Fallacies,” Proceedings of the 1989 IEEE Symposium on Security and Privacy, May 1989, pp. 102–109.
  • Malamateniou, F., G. Vassilacopoulos, and P. Tsanakas. “A Workflow-based Approach to Virtual Patient Record Security,” IEEE Transactions on Information Technology in Biomedicine, 2:3, September 1998, pp. 139–145.
  • Mea, V.D. “Agents Acting and Moving in Healthcare Scenario-A Paradigm for Telemedical Collaboration,” IEEE Transactions on Information Technology in Biomedicine, 5:1, March 2001, pp. 10–13.
  • Meadows, C. “Extending the Brewer-Nash Model to a Multilevel Context,” Proceedings of 1990 IEEE Computer Society Symposium on Research in Security and Privacy, 1990, pp. 95–102.
  • Moehr, J.R. “Privacy and Security Requirements of Distributed Computer Based Patient Records,” International Journal of Bio-Medical Computing, 35:1, February 1994, pp. 57–64.
  • Moehr, J.R. and J.G. McDaniel. “Adoption of Security and Confidentiality Features in an Operational Community Health Information Network: The Comox Valley Experience-Case Example,” International Journal of Medical Informatics, 49:1, March 1998, pp. 81–87.
  • Quantin, C., F.A. Allaert, and L. Dusserre. “Anonymous Statistical Methods Versus Cryptographic Methods in Epidemiology,” International Journal of Medical Informatics, 60:2, November 2000, pp. 177–183.
  • Sadan, B. “Patient Data Confidentiality and Patient Rights,” International Journal of Medical Informatics, 62:1, June 2001, pp. 41–49.
  • Schloerer, J. “Identification and Retrieval of Personal Records from a Statistical Data Bank,” Methods of Information in Medicine 15, 1975, pp. 7–13.
  • Sheng, O.R.L. and G.H.M. Chen. “Information Management in Hospitals: An Integrating Approach,” Proceedings of Annual Phoenix Conference, 1990, pp. 296–303.
  • Smith, E. and J.H.P. Eloff. “Security in Health-care Information Systems-Current Trends,” International Journal of Medical Informatics, 54:1, April 1999, pp. 39–54.
  • Smith, G.W. “Identifying and Representing the Security Semantics of an Application,” Proceedings of Aerospace Computer Security Applications Conference, 1988, pp. 125–130.
  • Toyoda, K. “Standardization and Security for the EMR,” International Journal of Medical Informatics, 48:1–3, February 1998S, pp. 57–60.
  • Tsujii. “Revolution of Civilization and Information Security,” International Journal of Medical Informatics, 49:1, March 1998, pp. 9–18.
  • Wen, and J. Tan. “E-Health: Opportunities and Challenges,” HICSS-36 Conference Proceedings, Hawaii, 2003.
  • Williams, M.H., G. Venters, and D. Marwick. “Developing a Regional Healthcare Information Network,” IEEE Transactions on Information Technology in Biomedicine, 5:2, June 2001, pp. 177–180.
  • Tan, J., J. Wen, and T. Gyires. “M-Commerce Security: The Impact of Wireless Application Protocol (WAP) Security Services on E-business and E-health Solutions,” International Journal of Mobile Commerce (forthcoming).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.