The Z notation: a reference manual
The Z notation: a reference manual
Relevance feedback and other query modification techniques
Information retrieval
A modified random perturbation method for database security
ACM Transactions on Database Systems (TODS)
On automated query modification techniques for databases
On automated query modification techniques for databases
An introduction to database systems (7th ed.)
An introduction to database systems (7th ed.)
The tracker: a threat to statistical database security
ACM Transactions on Database Systems (TODS)
ACM Computing Surveys (CSUR)
A lattice model of secure information flow
Communications of the ACM
Implementation of integrity constraints and views by query modification
SIGMOD '75 Proceedings of the 1975 ACM SIGMOD international conference on Management of data
Generalization and a Framework for Query Modification
Proceedings of the Sixth International Conference on Data Engineering
BNCOD 10 Proceedings of the 10th British National Conference on Databases: Advanced Database Systems
Access control in a relational data base management system by query modification
ACM '74 Proceedings of the 1974 annual conference - Volume 1
A relational approach to the capture of DICOM files for Grid-enabled medical imaging databases
Proceedings of the 2004 ACM symposium on Applied computing
Protecting sensitive patient data via query modification
Proceedings of the 2005 ACM symposium on Applied computing
GIMI: Generic Infrastructure for Medical Informatics
CBMS '05 Proceedings of the 18th IEEE Symposium on Computer-Based Medical Systems
Securing web services for deployment in health grids
Future Generation Computer Systems - Parallel input/output management techniques (PIOMT) in cluster and grid computing
On tracker attacks in health grids
Proceedings of the 2006 ACM symposium on Applied computing
Securing web services for deployment in health grids
Future Generation Computer Systems - Parallel input/output management techniques (PIOMT) in cluster and grid computing
Hi-index | 0.00 |
The utilisation of real medical data in research projects is becoming evermore widespread, and a clear duty of care towards such data is mandatory. To this end, anonymisation is essential. It is well understood that a conflict between functionality and confidentiality exists within this context: while patients’ confidentiality must be preserved, restricting access can reduce the value of the data that is available to researchers. As such, limiting access so that confidentiality is preserved while still ensuring a high degree of functionality should be a key aim of every designer of medical research databases. In this paper, we outline an approach developed within the e-DiaMoND project that combines anonymisation and query modification to manage this conflict.