Constraint graphs as security filters for privacy assurance in medical transactions

  • Authors:
  • George Mathew;Zoran Obradovic

  • Affiliations:
  • Temple University, Philadelphia, PA;Temple University, Philadelphia, PA

  • Venue:
  • Proceedings of the 2nd ACM Conference on Bioinformatics, Computational Biology and Biomedicine
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

We model transactions as exchange of graphs and propose constraint graphs as transaction filters for attribute-based transformations in clinical settings. An informal representation and working of constraint graphs is presented. A workbench was developed using a real world EMR system to demonstrate the concept. Results of our experiments using constraint graphs are consistent with published benchmark results.