2015 IEEE Trustcom/BigDataSE/Ispa 2015
DOI: 10.1109/trustcom.2015.475
|View full text |Cite
|
Sign up to set email alerts
|

The Pseudonym Broker Privacy Pattern in Medical Data Collection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…We have considered in our study 24 out of the 29 as they appeared as results of our search string. The remaining 5 papers they coded [53]- [57] are not indexed by Scopus (3), or does not contain some of the terms used in our search string (2). On the other hand, our study provides 12 papers (ID221, ID384, ID577, ID1726, ID1781, ID1804, ID1808, ID1825, ID1882, ID2126, ID2272, ID2731) related to privacy patterns, useful for the design of IS that have not been considered in this related work.…”
Section: Related Workmentioning
confidence: 99%
“…We have considered in our study 24 out of the 29 as they appeared as results of our search string. The remaining 5 papers they coded [53]- [57] are not indexed by Scopus (3), or does not contain some of the terms used in our search string (2). On the other hand, our study provides 12 papers (ID221, ID384, ID577, ID1726, ID1781, ID1804, ID1808, ID1825, ID1882, ID2126, ID2272, ID2731) related to privacy patterns, useful for the design of IS that have not been considered in this related work.…”
Section: Related Workmentioning
confidence: 99%
“…Some patterns merely represent a general idea as the Pseudonymous Identity Pattern [7] whereas others focus on very special situations as e.g. the Pseudonym Broker Pattern [24].…”
Section: Discussion and Final Remarksmentioning
confidence: 99%
“…SEPARATE: In the context of the intervention study it is intended to use a distributed pseudonym table, which is stored on the therapists sides. A similar approach, the so-called Pseudoynm Broker Pattern, which also avoids the use of a central pseudonym table by separation, was proposed by Hillen [24]. ABSTRACT: In addition to data minimization also the collected data should be abstracted as much as possible by data obfuscation [2] respectively statistical disclosure control [27].…”
Section: Confidentiality Integrity Intervenabilitymentioning
confidence: 99%
“…Attribute-based Credentials also provide an Inspector Authority for identity recovery. The Pseudonym Broker Pattern was proposed by Hillen [15] and is based on a Trusted Third Party (TTP), which generates pseudonyms from the combination of a subject ID, a partner cloud ID and a time-frame. The pseudonyms are therefore relationshipbased and time-limited.…”
Section: Related Workmentioning
confidence: 99%
“…Pseudonymous Identity, Pseudonymous Messaging and few are rather complex e.g. Attributebased Credentials [6] or Pseudonym Broker Pattern proposed by Hillen [15].…”
Section: Introductionmentioning
confidence: 99%