k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
\ell -Diversity: Privacy Beyond \kappa -Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
M-invariance: towards privacy preserving re-publication of dynamic datasets
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Privacy and Utility in Business Processes
CSF '07 Proceedings of the 20th IEEE Computer Security Foundations Symposium
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Limiting disclosure in hippocratic databases
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
On the correctness criteria of fine-grained access control in relational databases
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Regulating Exceptions in Healthcare Using Policy Spaces
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Consent-Based Workflows for Healthcare Management
POLICY '08 Proceedings of the 2008 IEEE Workshop on Policies for Distributed Systems and Networks
A Digital Rights Management Model for Healthcare
POLICY '09 Proceedings of the 2009 IEEE International Symposium on Policies for Distributed Systems and Networks
A Formalization of HIPAA for a Medical Messaging System
TrustBus '09 Proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business
Risk-based access control systems built on fuzzy inferences
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Principled Electronic Consent Management: A Preliminary Research Framework
EST '10 Proceedings of the 2010 International Conference on Emerging Security Technologies
Quantified risk-adaptive access control for patient privacy protection in health information systems
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Decision Support for Patient Consent Management
HISB '11 Proceedings of the 2011 IEEE First International Conference on Healthcare Informatics, Imaging and Systems Biology
Hi-index | 0.00 |
With the growing awareness and enforcement of patient rights, patients are empowered with increasing control on their medical information. In many situations, laws and regulation rules require the acquisition of patients' consent before one can access the patients' health data. However, in practice, patients oftentimes have difficulties determining whether they should permit or deny a certain access request. In this article, we propose an analytical approach to assist patients in the consent management of their medical information. Our consent management system employs a statistical learning method that evaluates the benefits and risks associated with access requests, so as to make personalized recommendation on consent decisions. Multiple factors are considered in the assessment process, including the importance of the request, the sensitivity of the requested information, and correlation information. We have implemented a prototype of our solution and performed evaluation with large-scale medical records.