Incomplete COVID-19 data: The curation of medical health data by the Virus Outbreak Data Network-Africa

M Van Reisen, FO Oladipo, M Mpezamihigo… - Data …, 2022 - direct.mit.edu
The incompleteness of patient health data is a threat to the management of COVID-19 in
Africa and globally. This has become particularly clear with the recent emergence of new …

Do as the Romans Do: Location Imitation-Based Edge Task Offloading for Privacy Protection

J Zhu, L Zhao, J Zhou, H Cai… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In edge computing, a user prefers offloading his/her task to nearby edge servers to maximize
the offloading utility. However, this inevitably exposes the user's location privacy information …

[PDF][PDF] FAIR and GDPR Compliant Population Health Data Generation, Processing and Analytics.

R Plug, Y Liang, M Basajja, A Aktau, PHP Jati… - SWAT4HCLS, 2022 - academia.edu
Generating and analysing patient data in clinical settings is an inherently sensitive process,
requiring collaborative effort between clinicians and informaticians to generate value from …

Face recognition technology and privacy protection methods based on deep learning

J Ma - International Conference on Computer Application and …, 2024 - spiedigitallibrary.org
Face recognition technology is developing rapidly, and the issue of personal privacy
protection has become increasingly prominent. How to protect personal privacy while …

Construction and Management of Doctor-Patient Privacy Protection System under Big Data Computing Environment

Z Guan - 2023 3rd International Conference on Mobile …, 2023 - ieeexplore.ieee.org
In the era of digital healthcare, protecting the privacy of doctors and patients has become an
important challenge. The construction and management of privacy protection systems …

[PDF][PDF] Privacy Protection Data Aggregation Scheme Based on Horner Rule and Lightweight Convolutional Neural for Intelligent Education

J Zhang - International Journal of Network Security, 2023 - ijns.jalaxy.com.tw
In the context of digitized education, campuses have been the worst hit areas of cyber
attacks, ransomware, and information leakage. Therefore, we propose a novel privacy …

Modelos de control de acceso más utilizados en la seguridad de datos médicos

B Campos-Montero, C Rodríguez-Sandoval… - Revista Tecnología en …, 2024 - scielo.sa.cr
El acceso no autorizado a datos sensibles de pacientes es un problema que atenta contra
ellos mismos y la seguridad de las organizaciones dedicadas al servicio de salud, para lo …

Exploring the Design of Low-End Technology to Increase Patient Connectivity to Electronic Health Records

R Kievit, A Abubakar Kawu, M van Reisen, D O'Sullivan… - 2024 - arrow.tudublin.ie
The tracking of the vitals of patients with long term health problems is essential for clinicians
to determine proper care. Using Patient Generated Health Data (PGHD) communicated …

[HTML][HTML] Modelos de control de acceso más utilizados en la seguridad de datos médicos Access control models most used in medical data security

B Campos-Montero, C Rodríguez-Sandoval… - revistas.tec.ac.cr
El acceso no autorizado a datos sensibles de pacientes es un problema que atenta contra
ellos mismos y la seguridad de las organizaciones dedicadas al servicio de salud, para lo …

[PDF][PDF] Data Availability & Interoperability for Chronic Brain Disease Care in The Netherlands

L Schrijver - theses.liacs.nl
The thesis addresses the pressing issue of inefficient health information exchange within the
healthcare landscape, particularly concerning patients with chronic brain diseases. This …