[1] | A function to hide person-identifiable information. Computing for Health Intelligence, Bulletin 1 (version 3) 15 July 2002 |
[2] | ANSI X9.52-1998, Triple Data Encryption Algorithm Modes of Operation |
[3] | Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER). RFC-2313 PKCS #1: RSA Encryption, Version 1.5, March 1998 |
[4] | BERMAN, J.J., Confidentiality for Medical Data Miners, Artificial Intelligence in Medicine, November 2002 |
[5] | DE MOOR, G. and CLAERHOUT, B., PPeP Privacy Protection in e-Pharma: Leading the Way for Privacy Protection in e-Pharma, White Paper, 2003 |
[6] | DE MOOR, G., CLAERHOUT, B. and DE MEYER, F., Privacy Enhancing Techniques: the Key to Secure Communication and Management of Clinical and Genomic Data, Methods of Information in Medicine, 42, pp.79-88, 2003 |
[7] | Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data |
[8] | EL KALAM, A.A., DESWARTE, Y., TROUESSIN, G. and CORDONNIE, E., A new method to generate and manage anonymized healthcare information |
[9] | HARA, K., OHE, K., KADOWAKI, T., KATO, N., IMAI, Y., TOKUNAGA, K., NAGAI, R. and OMATA, M., Establishment of a method of anonymisation of DNA samples in genetic research, J. Hum. Genet., 48(6), pp.327-30, 2003 |
[10] | HES, R. and BORKING, J., Privacy-Enhancing Technologies: The path to anonymity, Revised Edition, Registratiekamer, The Hague, August 2000 |
[11] | ROBERTS, I., Pseudonymization in CLEF, PT001 (draft) |
[12] | IHLE, P., KRAPPWEIS, J. and SCHUBERT, I. Confidentiality within the scope of secondary data research - approaches to a solution of the problem of data concentration, Gesundheitswesen, 63 Suppl. 1: pp.S6-12, 2001 |
[13] | INFOSEC/TTP Project, Code of Practice and Management Guidelines for Trusted Third Party Services, CASTELL, S., (Ed.), Ver. 1.0, Castell, Spain, October 1993 |
[14] | INFOSEC/TTP Project, Trusted Third Party Services: Functional Model, MULLER, P. (Ed.), Ver. 1.1, Bull. Ingenierie, France, December 1993 |
[15] | INFOSEC/TTP Project, Trusted Third Party Services: Requirements for TTP Services |
[16] | ISO 7498-2 Information processing systems - Open Systems Interconnection - Basic Reference Model - Part 2: Security Architecture |
[17] | ISO/IEC 8825-1 Information technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) - Part 1 |
[18] | LANGHEINRICH, M., Privacy by Design - Principles of Privacy-Aware |
[19] | Latanya Sweeney, Phd, http://privacy.cs.cmu.edu/people/sweeney/ |
[20] | LOWRANCE, W., Learning from experience: privacy and the secondary use of data in health research, J. Health Serv. Res. Policy, Suppl 1: pp.S1:2-7, July 8, 2003 |
[21] | PRIDEH Privacy Enhancement in Data Managemtn in E-Health. Final Report, Deliverable D4.4 Report Version 2.0. Technical Recommendations, Guidelines and Business Scenarios, July 2003 |
[22] | NIH Publication Number 003-5388. Protecting Personal Health Information in Research: Understanding the HIPAA Privacy Rule, http://privacyruleandresearch.nih.gov |
[23] | RFC-2630 Cryptographic Message Syntax, June 1999 |
[24] | SCHNEIER, B., Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edition, John Wiley, 1996 |
[25] | Ubiquitous Systems, http://www.vs.inf.ethz.ch/publ/papers/privacy-principles.pdf |
[26] | WESTIN, A., Privacy and freedom, 1967 |
[27] | ISO/IEC 2382-8 Information technology - Vocabulary - Part 8: Security |
[28] | ISO/IEC 15408-2 Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional components |
[29] | ISO/TS 22220 Health Informatics - Identification of subjects of health care |
[30] | ENV 13608-1 Health informatics - Security for healthcare communication - Part 1: Concepts and terminology |
[31] | RFC 3881, Security Audit and Access Accountability Message XML Data Definitions for Healthcare Applications |
Электронный текст документа
подготовлен АО "Кодекс" и сверен по:
официальное издание
М.: Стандартинформ, 2013