BS-4-23 Privacy Issues Related to Smart Health Card Systems(BS-4. System, control and design technologies for emerging network)
スポンサーリンク
概要
- 論文の詳細を見る
Smart health cards, containing identification information as well as sensitive health information, are used in many countries. They offer convenience, reduce administrative cost and time, and improve quality of service. However, existing systems fail to ensure privacy protection of card owners. Here we present a smart health card-based system model that has strong privacy protection capability. Should the card fall into wrong hands, it is very unlikely that the sensitive information will be disclosed. Also, our anonymous database system can protect patients' privacy from potential attackers.
- 社団法人電子情報通信学会の論文
- 2009-03-04
著者
-
Yamada Shigeki
National Institute of Informatics
-
SONEHARA Noboru
National Institute of Informatics
-
Huda Md.
National Institute Of Informatics(nii)
-
Huda Md.
National Institute Of Informatics
-
Huda Md.
National Institute Of Advanced Industrial Science And Technology (aist)
-
Sonehara Noboru
National Institute Of Informatics Tokyo
-
Yamada Shigeki
National Inst. Informatics(nii) Tokyo
-
Sonehara Noboru
National Inst. Informatics
-
Yamada Shigeki
National Institute Of Informatics (nii)
-
Yamada Shigeki
National Inst. Informatics (nii) Tokyo Jpn
関連論文
- BS-4-16 Distributing Akaroa2 on PlanetLab(BS-4. System, control and design technologies for emerging network)
- Breakthroughs in Socio-Informatics through Data-centric Science
- Privacy in business processes: on enforcement of privacy policies regarding usage of personal data
- A Privacy Aspect on the Disclosure of Personal Data to Third Parties
- 地上デジタル放送の移行に向けた支援政策に関する考察(サービス管理,情報通信マネジメント,一般)
- A privacy aspect on the disclosure of personal data to third parties (インターネットアーキテクチャ)
- Self-Aligned Planar Double-Gate Field-Effect Transistors Fabricated by a Source/Drain First Process
- Pricing to Stimulate Node Cooperation in Wireless Ad Hoc Networks(Network)
- Design, Analysis, and Evaluation of Mobile Agent based Privacy Protection Scheme for Multi-party Computation Problems(Selected Papers from ICMU 2006(Third International Conference on Mobile Computing and Ubiquitous Networking))
- An Efficient and Privacy-Aware Meeting Scheduling Scheme Using Common Computational Space(Distributed Cooperation and Agents)
- CoMoRoHo: Cooperative Mobile Router-Based Handover Scheme for Long-Vehicular Multihomed Networks(Mobile Multimedia Communications)
- BS-15-23 Solving Multi-party Collaborative Problems with Privacy Protection(BS-15.Network Planning, Control, and Management,ENGLISH SESSION)
- BS-15-20 Schemes for Network Mobility Management(BS-15.Network Planning, Control, and Management,ENGLISH SESSION)
- Pricing to Improve Cooperation in Wireless Ad Hoc Networks
- Privacy Protection with Customized Java Sandbox Architecture
- Pricing to Improve Cooperation in Wireless Ad Hoc Networks
- Privacy Protection with Customized Java Sandbox Architecture
- BS-8-15 iCOP Model for Personal Privacy Protection(BS-8. Technology and Architecture for Ubiquitous Network Systems,ENGLISH SESSION)
- BS-8-7 Local Route Optimization for Network Mobility (NEMO) Support(BS-8. Technology and Architecture for Ubiquitous Network Systems,ENGLISH SESSION)
- MoRaRo : Mobile Router-Assisted Route Optimization for Network Mobility (NEMO) Support(Mobile Technologies, New Technologies and their Applications of the Internet III)
- Architectural Design of Next-Generation Science Information Network(Advanced Transfer Technologies for the Next Generation Network)
- BS-10-7 An Effect of Dynamic Class Assignment Using Bandwidth Request Declaration(BS-10. Network Planning, Control, and Management)
- Exploring factors effecting the continuance of purchasing behavior in internet shopping: extrinsic benefits and intrinsic benefits (特集:社会的課題に挑む情報システム)
- Critical success factors of electronic commerce: issue of trust (技術と社会・倫理)
- BS-15-8 QoS of the digital terrestrial broadcasting in Japan and provision for the fusion of telecommunication and broadcasting(BS-15.Network Planning, Control, and Management,ENGLISH SESSION)
- BS-7-14 On the Risk Measurement for Shared Personal Data(BS-7. Network Planning, Control and Management)
- BS-10-18 On Secondary Uses of Personal Health Records
- BS-4-23 Privacy Issues Related to Smart Health Card Systems(BS-4. System, control and design technologies for emerging network)
- A handover scheme for long-vehicular-multihomed mobile networks (モバイルNWとインターネット/家電NWはどう融合するか?--標準化(DLNA等),モバイルNW,家電NW,情報家電,及び一般)
- BS-10-18 Modelling Incentive for Cooperation in Wireless Ad Hoc Networks(BS-10. Network Planning, Control, and Management)
- BS-10-17 A Framework of Graceful Vertical Handover(BS-10. Network Planning, Control, and Management)
- Maximizing User Satisfaction Based on Mobility in Heterogeneous Mobile Multimedia Communication Networks(Mobile Multimedia Communications)
- Efficient Packet forwarding Strategies via Pricing in Wireless Ad Hoc Networks (日韓合同ワークショップ 1st Korea-Japan Joint Workshop on Ubiquitous Computing and Networking Systems (ubiCNS 2005))
- Evaluation of User-centric Performances to Select an Optimal Access Network in Heterogeneous Systems
- Evaluation of User-centric Performances to Select an Optimal Access Network in Heterogeneous Systems
- Securing Data in Mobile Computing Environment
- Performance Evaluation of Network Mobility (NEMO) Basic Support Protocol and Route Optimization
- Securing Data in Mobile Computing Environment
- Performance Evaluation of Network Mobility (NEMO) Basic Support Protocol and Route Optimization
- Proposal for Context-Aware Information Delivery and Personal Communication Network Architectures with Preliminary Evaluations of Their Performance(Network)
- Effect of Mobility on User Satisfaction in Heterogeneous Wireless Networks
- A Game Theorem-Based Approach to Avoid Malicious Nodes in Mobile Ad hoc Networks
- A Proposal of Context-Aware Information Delivery System in Mobile Environments
- BS-12-38 Effect of Retransmission Timers in Custody-enabled Delay and Disruption-Tolerant Networks(BS-12. Network Planning, Control, and Management)
- BS-10-24 Privacy loss in Multi-agent Negotiation(BS-10. Network Planning, Control, and Management)
- Ubiquitous Computing; Networks and Applications(The IEICE Transactions (publishedin Japanese) Vol. J 86-B, No.6(Communications))
- Access Control for Security and Privacy in Ubiquitous Computing Environments(Ubiquitous Networks)
- BS-4-26 Managing Intermittent Connectivity(IC) in Delay Tolerant Network(DTN)(BS-4. System, control and design technologies for emerging network)
- Sequence Set with Three Zero Correlation Zones and Its Application in MC-CDMA System(Sequence Design and its Application in Communications)
- General Method to Construct LS Codes by Complete Complementary Sequences(Wireless Communication Technologies)
- BS-12-7 DTN: A preferred networking technology for Sparsely-connected Mobile Ad Hoc network(BS-12. Network Planning, Control, and Management)
- A sender/receiver-coupled Fuzzy Logic System for transmission power control in Wireless Sensor Networks (インターネットアーキテクチャ)
- BS-6-46 Providing Basic Communication Services in a Disaster Stricken Region(BS-6. Planning, Control and Management on Networks and Services)
- BS-6-23 A Clean Slate-based Thin Layer Approach in Delay and Disruption Tolerant Networks(BS-6. Planning, Control and Management on Networks and Services)
- BS-10-34 A Probabilistic Location-based Routing Scheme for Delay-Tolerant Networks
- BS-3-7 Coping with congestion in opportunistic networks using weighted queuing(BS-3. Management and Control Technologies for Innovative Networks)
- BS-3-42 Comparison of Inter-region Routing Protocols in Delay-Tolerant Networks(BS-3. Management and Control Technologies for Innovative Networks)
- Self-Aligned Planar Double-Gate Field-Effect Transistors Fabricated by a Source/Drain First Process
- Managing Disconnected Mobile Nodes in a Delay Tolerant Network with HALF Routing Protocol
- BS-5-12 Sticky Transfers for Opportunistic Networks(BS-5. Network and Service Design, Control and Management)
- BS-1-32 On the Software Defined WAN Propagation Latency
- BS-1-10 Utilizing social phenomena and movement pattern in DTN
- A Recommendation System for Anonymous Fingerprinting of Text Posted on Social Networks
- An Evaluation of Link Aggregation on OpenFlow Platforms
- GICS : Group-based Internet Connection Spreading Architecture for Disaster Recovery