Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium 2012
DOI: 10.1145/2110363.2110427
|View full text |Cite
|
Sign up to set email alerts
|

An analytical solution for consent management in patient privacy preservation

Abstract: With the growing awareness and enforcement of patient rights, patients are empowered with increasing control on their medical information. In many situations, laws and regulation rules require the acquisition of patients' consent before one can access the patients' health data. However, in practice, patients oftentimes have difficulties determining whether they should permit or deny a certain access request. In this article, we propose an analytical approach to assist patients in the consent management of thei… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 19 publications
(28 reference statements)
0
6
0
Order By: Relevance
“…As proposed in [29], the relevance of the meant information has been calculated and stored in the DRM. Nonetheless, one effective method of calculating relevance information between the diseases is to pedical data is found by analyzing the correlation incurred of the different records.…”
Section: S S Alaqeeli Et Almentioning
confidence: 99%
See 4 more Smart Citations
“…As proposed in [29], the relevance of the meant information has been calculated and stored in the DRM. Nonetheless, one effective method of calculating relevance information between the diseases is to pedical data is found by analyzing the correlation incurred of the different records.…”
Section: S S Alaqeeli Et Almentioning
confidence: 99%
“…If the difference is large, the risk is high and vice versa. The authors utilized the widely accepted definition of risk assessment as defined by NIST [29] of which calculates risk as the likelihood of an event multiplied by the possible impact. Similarly, [19] have utilized fuzzy inference techniques to calculate risk values for enforcing access control.…”
Section: Risk-aware Access Control Modelsmentioning
confidence: 99%
See 3 more Smart Citations