New JBI policy emphasizes substantive, practical methodological innovations for biomedical privacy and security papers
نویسندگان
چکیده
منابع مشابه
Practical privacy and security for opportunistic networks
When in physical proximity, data can be directly exchanged between the mobile devices people carry — for example over Bluetooth. If people cooperate to store, carry and forward messages on one another’s behalf, then an opportunistic network may be formed, independent of any fixed infrastructure. To enable performant routing within opportunistic networks, use of social network information has be...
متن کاملNew priorities for future biomedical innovations.
n engl j med 363;8 nejm.org august 19, 2010 704 Who will consider these costs? The diffusion of robotic technology depends on fragmented, not centralized, decision making. Decisions to purchase robots are made not by payers but by hospitals, which compete with one another to attract surgeons and their patients. Hospitals, seeking surgical volume, find it difficult to resist surgeons’ preference...
متن کاملPractical Schemes For Privacy & Security Enhanced RFID
Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical. Some use hash functions instead of the more hardware efficient symmetric encryption schemes as a cryptographic primitive. Others incur a rather large time penalty at the reader side, because the reader has to perform a key search over large tag key space. Moreover, they do not allow for d...
متن کاملTowards Practical Privacy Policy Enforcement
Organizations that use private information typically must provide assurances to regulators that their practices ensure that regulations are met. However, to the extent that they rely on electronic information systems for the management of private information, they really have no basis for providing those assurances. This paper proposes a framework for the design and implementation of informatio...
متن کاملPractical and Privacy-Preserving Policy Compliance for Outsourced Data
A recently considered scenario for data outsourcing allows performing database queries in the following three-party model: a client interested in making database queries, a data owner providing its database for client access, and a server (e.g., a cloud server) holding the (encrypted) outsourced data and helping both other parties. In this scenario, a natural problem is that of designing effici...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Biomedical Informatics
سال: 2018
ISSN: 1532-0464
DOI: 10.1016/j.jbi.2018.05.009