TITLE

Implementation of a Chain Ontology Based Approach in the Health Care Sector

AUTHOR(S)
Omran, Esraa; Bokma, Albert; Al-Maati, Shereef Abu; Nelson, David
PUB. DATE
October 2009
SOURCE
Journal of Digital Information Management;Oct2009, Vol. 7 Issue 5, p270
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Preserving privacy and managing data access have become crucial requirements for enterprises who deal with personal data. Hippocratic databases (Agrawal et al,2002) and the Chain method (Fedaghi,2007) have been proposed to support this through candid database design that includes responsibility for the privacy of data as a founding tenet. We identify, study, and implement several privacy- preserving features that extend the previous work on Limiting Disclosure in the Chain method. These features include the support of Ontology in the database design, Ontology design in OWL and applying a hybrid approach of Chains and Ontologies to a Health-care use case. The proposed approach tries to bring the Chain method one step closer to fitting real-world scenarios. We present the design and implementation guidelines of each of the proposed features. The evaluation of the design shows how the ontology has simplified the complicated work of designing the traditional Hippocratic and chain methods for real databases.
ACCESSION #
46794104

 

Related Articles

  • EXPERT'S CORNER. ICU Data Mart: A Non-IT Approach. HERASEVICH, VITALY; KOR, DARYL J.; LI, MAN; PICKERING, BRIAN W. // Healthcare Informatics;Nov2011, Vol. 28 Issue 11, p42 

    The article describes the development of an intensive care unit (ICU) data mart by a team of clinicians, researchers and informatics personnel at the Mayo Clinic that will serve as an integrated database storing all pertinent data regarding critically ill patients. The starting point of the...

  • A Comparative Study of Fine Grained Security Techniques Based on Data Accessibility and Inference. Rauf, Azhar; Badshah, Sareer; Khusro, Shah // World Academy of Science, Engineering & Technology;Jul2009, Issue 31, p302 

    This paper analyzes different techniques of the fine grained security of relational databases for the two variables-data accessibility and inference. Data accessibility measures the amount of data available to the users after applying a security technique on a table. Inference is the proportion...

  • Research Shows Manufacturers Emphasize Data Security.  // Industry Week/IW;Oct2013, Vol. 262 Issue 10, pS7 

    The article presents research results indicating the focus of manufacturers to their data security. Survey shows that majority of the manufacturers do not have or have minimal connectivity between their enterprise or network systems and plant floor systems. It notes that only few of them...

  • What If Your Business Is Hacked. GAO, KEVIN // Information Today;Mar2013, Vol. 30 Issue 3, p13 

    The article presents the author's opinion that companies need both the software and human elements to manage the threat of computer hacking and to mitigate the damage from a hacking intrusion. Topics include the management of customer data, distributed denial of service (DDos) attacks, and...

  • Information security strategies: towards an organizational multi-strategy perspective. Ahmad, Atif; Maynard, Sean; Park, Sangseo // Journal of Intelligent Manufacturing;Apr2014, Vol. 25 Issue 2, p357 

    There considerable advice in both research and practice oriented literature on the topic of information security. Most of the discussion in literature focuses on how to prevent security attacks using technical countermeasures even though there are a number of other viable strategies such as...

  • Data Custodian.  // Network Dictionary;2007, p132 

    A definition of the term "Data Custodian" is presented. It refers to the entity currently using or manipulating the data, and therefore, temporarily taking responsibility for the data.

  • NASTF releases Secure Data Release Model.  // Automotive Body Repair News;Mar2008, Vol. 47 Issue 3, p44 

    The article reports on the release of Secure Data Release Model (SDRM) by the National Automotive Service Task Force (NASTF) in the collision repair industry in the U.S. SDRM enables technicians and security professionals to access key codes, immobilizer personal identification numbers and other...

  • REPRESENTATION FOR ALPHANUMERIC DATA TYPE BASED ON SPACE AND SPEED CASE STUDY: STUDENT ID OF X UNIVERSITY. Pratondo, Agus // International Journal of Database Management Systems;Aug2011, Vol. 3 Issue 3, p34 

    ID is derived from the word identity, derived from the first two characters in the word. ID is used to distinguish between an entity to another entity. Student ID (SID) is the key differentiator between a student with other students. On the concept of database, the differentiator is unique. SID...

  • Focus on threats, not just ROI of virtualization.  // Same-Day Surgery;Dec2011, Vol. 35 Issue 12, p134 

    The article reports on a high number of healthcare facilities that focus on return on investment when evaluating the virtualization of patient health information instead of focusing on the the threats that virtualization protects patient information from.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics