Protecting statistical databases against retrieval of private information
Computers and Security
Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
Statistical and scientific databases
Statistical and scientific databases
A modified random perturbation method for database security
ACM Transactions on Database Systems (TODS)
Database security
The grid: blueprint for a new computing infrastructure
The grid: blueprint for a new computing infrastructure
Answering queries without revealing secrets
ACM Transactions on Database Systems (TODS)
Secure databases: protection against user influence
ACM Transactions on Database Systems (TODS)
The tracker: a threat to statistical database security
ACM Transactions on Database Systems (TODS)
Security of statistical databases: multidimensional transformation
ACM Transactions on Database Systems (TODS)
ACM Computing Surveys (CSUR)
Implementation of integrity constraints and views by query modification
SIGMOD '75 Proceedings of the 1975 ACM SIGMOD international conference on Management of data
Cryptography and data security
Cryptography and data security
The inference problem: a survey
ACM SIGKDD Explorations Newsletter
Access control in a relational data base management system by query modification
ACM '74 Proceedings of the 1974 annual conference - Volume 1
Grid Computing: Making the Global Infrastructure a Reality
Grid Computing: Making the Global Infrastructure a Reality
Disclosure risk measures for the sampling disclosure control method
Proceedings of the 2004 ACM symposium on Applied computing
Protecting sensitive patient data via query modification
Proceedings of the 2005 ACM symposium on Applied computing
Towards secure Grid-enabled healthcare: Research Articles
Software—Practice & Experience - Grid Security
Dynamic disclosure monitor (D2Mon): an improved query processing solution
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
On deducibility and anonymisation in medical databases
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
On the Facilitation of Fine-Grained Access to Distributed Healthcare Data
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
Trustworthy Log Reconciliation for Distributed Virtual Organisations
Trust '09 Proceedings of the 2nd International Conference on Trusted Computing
Monitoring information leakage during query aggregation
ICDCIT'07 Proceedings of the 4th international conference on Distributed computing and internet technology
Web-services-based resource discovery model and service deployment on healthgrids
IEEE Transactions on Information Technology in Biomedicine - Special section on new and emerging technologies in bioinformatics and bioengineering
Hi-index | 0.00 |
The utilisation of grid computing to support healthcare research is becoming increasingly widespread, as is the use of IT to support healthcare delivery. Furthermore, it seems that the two areas are on an inevitable convergence path as clinical communities in several countries start to investigate how real data stored in electronic patient records can be utilised to facilitate research. The use of IT within healthcare gives rise to unique social and ethical challenges; the area of grid computing has given rise to significant novel security challenges; and the anticipated convergence of these two fields will inevitably give a new lease of life to established challenges. In this paper we consider the phenomenon of tracker attacks in this emerging context, and outline a potential approach to addressing the problem.