[HTML][HTML] Healthcare data security and privacy in Data Warehouse architectures

RD Thantilage, NA Le-Khac, MT Kechadi - Informatics in Medicine …, 2023 - Elsevier
Data Warehouse (DW) is a common term used in the Data Mining process for storing
copious amounts of data ready for analysis. Organizations are starting to prioritize Data …

Swarm Differential Privacy for Purpose‐Driven Data‐Information‐Knowledge‐Wisdom Architecture

Y Li, Y Duan, Z Maamar, H Che… - Mobile Information …, 2021 - Wiley Online Library
Privacy protection has recently been in the spotlight of attention to both academia and
industry. Society protects individual data privacy through complex legal frameworks. The …

On the continuous processing of health data in edge-fog-cloud computing by using micro/nanoservice composition

DD Sánchez-Gallegos, A Galaviz-Mosqueda… - IEEE …, 2020 - ieeexplore.ieee.org
The edge, the fog, the cloud, and even the end-user's devices play a key role in the
management of the health sensitive content/data lifecycle. However, the creation and …

Verification of de-identification techniques for personal information using tree-based methods with Shapley values

J Lee, J Jeong, S Jung, J Moon, S Rho - Journal of Personalized …, 2022 - mdpi.com
With the development of big data and cloud computing technologies, the importance of
pseudonym information has grown. However, the tools for verifying whether the de …

Framework for the Assessment of Data Masking Performance Penalties in SQL Database Servers. Case Study: Oracle

M Fotache, A Munteanu, C Strîmbei, I Hrubaru - IEEE Access, 2023 - ieeexplore.ieee.org
Dynamic data masking (DDM) is a powerful data-security technique for protecting personal
and other sensitive information in databases from unauthorized access. A DDM can be used …

Protecting your online persona: a preferential selective encryption approach for enhanced privacy in tweets, images, memes, and metadata

NP Shetty, B Muniyal, A Priyanshu, D Kumar… - IEEE …, 2024 - ieeexplore.ieee.org
The proliferation of online social networking websites has resulted in the growth of online
communities and increased communication among users. However, sharing personal …

[HTML][HTML] A secure visual framework for multi-index protection evaluation in networks

X Wu, H Wang, Y Zhang, R Li - Digital Communications and Networks, 2023 - Elsevier
Mining the core value of Industrial Internet of Things (IIoT) data safely and reducing the risk
of malicious attacks are the inherent requirements of industrial data visualization …

Automatic masking of sensitive data

CW Cheng, TC Kuo, JR Lin, YC Tsai - US Patent 9,965,648, 2018 - Google Patents
A masking system and method for automatically masking sensitive user information on a
webpage is provided. The method includes the steps of identifying a location of the first user …

Key-based reversible data masking for business intelligence healthcare analytics platforms

O Ali-Ozkan, A Ouda - 2019 International Symposium on …, 2019 - ieeexplore.ieee.org
Business Intelligence (BI) is quickly becoming a very important tool for all aspects of data
analytics. An area that lacks a strong implementation for BI is the healthcare field. BI …

Explainable ai in decision support systems: A case study: Predicting hospital readmission within 30 days of discharge

A Vucenovic, O Ali-Ozkan… - 2020 ieee canadian …, 2020 - ieeexplore.ieee.org
Explainable models are a critical requirement for predictive analytics applications in the
healthcare domain. In this work we develop a hypothetical clinical decision support system …