Preserving PHI in Compliance with HIPAA Privacy/Security Regulations Using Cryptographic Techniques.
Jing LiJung-San LeeChin-Chen ChangPublished in: IIH-MSP (2008)
Keyphrases
- security properties
- security issues
- encryption key
- security protocols
- smart card
- security requirements
- security concerns
- security mechanisms
- homomorphic encryption
- cryptographic protocols
- high assurance
- statistical databases
- security services
- privacy preserving
- sensitive data
- key management
- security analysis
- personal data
- security risks
- encryption scheme
- security and privacy issues
- secure multiparty computation
- preserving privacy
- data security
- data privacy
- data protection
- fuzzy vault
- privacy issues
- privacy requirements
- security measures
- information security
- access control
- rfid systems
- biometric template
- digital signature
- authentication protocol
- electronic payment
- protection mechanisms
- confidential information
- outsourced databases
- privacy concerns
- secure communication
- identity management
- personal information
- cryptographic algorithms
- privacy protection
- network security
- privacy preserving data mining
- random number generator
- security threats
- differential privacy
- private information
- privacy enhancing
- intrusion detection
- user privacy
- security policies
- data sharing
- trusted third party
- third party
- protection schemes