Security Infrastructure Technology for Integrated Utilization of Big Data : : Applied to the Living Safety and Medical Fields.
Saved in:
: | |
---|---|
TeilnehmendeR: | |
Place / Publishing House: | Singapore : : Springer Singapore Pte. Limited,, 2020. Ã2020. |
Year of Publication: | 2020 |
Edition: | 1st ed. |
Language: | English |
Online Access: | |
Physical Description: | 1 online resource (171 pages) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
5006191379 |
---|---|
ctrlnum |
(MiAaPQ)5006191379 (Au-PeEL)EBL6191379 (OCoLC)1153062197 |
collection |
bib_alma |
record_format |
marc |
spelling |
Miyaji, Atsuko. Security Infrastructure Technology for Integrated Utilization of Big Data : Applied to the Living Safety and Medical Fields. 1st ed. Singapore : Springer Singapore Pte. Limited, 2020. Ã2020. 1 online resource (171 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Intro -- Foreword -- Preface -- Contents -- 1 Introduction -- 1.1 Purpose of Miyaji-CREST -- 1.2 Roles of Each Group -- 1.2.1 Security Core Group -- 1.2.2 Security Management Group -- 1.2.3 Living Safety Testbed Group -- 1.2.4 Health Testbed Group -- 2 Cryptography Core Technology -- 2.1 Analysis on ECDLP -- 2.1.1 Introduction -- 2.1.2 Previous Works -- 2.1.3 Montgomery and Hessian Curves -- 2.1.4 Experiments on PDP Solving -- 2.1.5 Analysis -- 2.1.6 Concluding Remarks -- 2.2 Analysis on Ring-LWE over Decomposition Fields -- 2.2.1 Introduction -- 2.2.2 Preliminaries -- 2.2.3 Ring-LWE over Cyclotomic and Decomposition Fields -- 2.2.4 Our Experimental Analysis -- References -- 3 Secure Primitive for Big Data Utilization -- 3.1 Privacy-Preserving Data Integration -- 3.1.1 Introduction -- 3.1.2 Preliminaries -- 3.1.3 Previous Work -- 3.1.4 Practical MPSI -- 3.1.5 Efficiency -- 3.1.6 System and Performance -- 3.2 Classification -- 3.2.1 Error-Correcting Code -- 3.2.2 Security Assumptions -- 3.2.3 Security Requirements for 2PC -- 3.2.4 HQC Encryption Scheme -- 3.2.5 Proposed Protocol -- 3.2.6 Support Vector Machine from Secure Linear Function Evaluation and Secure Comparison -- References -- 4 Secure Data Management Technology -- 4.1 Introduction -- 4.2 Anonymization Techniques and Adversary Models, Revisited -- 4.2.1 k-Anonymization -- 4.2.2 Noise Addition -- 4.2.3 K-Anonymization for Combined Datasets -- 4.2.4 Matrix Factorization for Time-Sequence Data -- 4.2.5 Anonymization Techniques for User History Graphs -- 4.2.6 Other Notions -- 4.2.7 Combination of Anonymization Techniques -- 4.3 (p, N)-Identifiability -- 4.3.1 Common Adversary Model -- 4.3.2 Success Probability Analysis Based on the Common Adversary Model -- 4.3.3 Experiment -- 4.3.4 Results -- 4.4 Extension to Time-Sequence Data -- 4.4.1 Privacy Definition -- 4.4.2 Utility Definition. 4.4.3 Matrix Factorization -- 4.4.4 Anonymization Using Matrix Factorization -- 4.4.5 Experiment -- 4.4.6 Results -- 4.5 Anonymization and Privacy Risk Evaluation Tool -- 4.6 Conclusion -- References -- 5 Living Safety Testbed Group -- 5.1 Necessity of Living Safety -- 5.2 Overview of Test Bed System for Living Safety -- 5.3 Severity Cliff Analysis of School Injury -- 5.3.1 Development of Severity Cliff Analysis System -- 5.3.2 Severity Cliff Analysis -- 5.4 Trend Analysis of School Injury -- 5.4.1 Trend Analysis for Evaluating Intervention -- 5.4.2 Analysis of Judo Accident -- 5.5 Childhood Home-Injury Simulation -- 5.5.1 Background of Simulation -- 5.5.2 Home-Injury-Situation Simulation System -- 5.5.3 Development Behavior Prediction Function -- 5.5.4 Accident Situation Search Function -- 5.5.5 Similar-Risk-Product Classification Function -- 5.5.6 Simulation Example of the Accident Situation -- 5.5.7 System Verification -- 5.6 Social Impact Engagement Based on Big Data Analysis in Cooperation with Multiple Stakeholders -- 5.6.1 Engagement for Preventing Soccer Goal Turnover -- 5.6.2 Engagement for Preventing Vaulting Box Accidents -- 5.7 Conclusion -- References -- 6 Health Test Bed Group -- 6.1 Overview of Legislation and Standardization for the Secondary Use of Electronic Medical Records -- 6.1.1 Personal Information Protection Act and Next-Generation Medical Infrastructure Act -- 6.1.2 Ethical Guidelines and Anonymization of Medical Information -- 6.1.3 Standardization of EMRs -- 6.2 Medical Test Bed Concepts and Requirements -- 6.3 Features and Implementations of Secondary Use Infrastructure Development -- 6.3.1 SS-MIX2 Standardized Storage -- 6.3.2 Secure Collection of Distributed Medical Information -- 6.3.3 Privacy Risk Assessment of Extracted Datasets -- 6.3.4 Secondary Use and Traceability -- 6.4 Integration and Prospects -- References. Description based on publisher supplied metadata and other sources. Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. Electronic books. Mimoto, Tomoaki. Print version: Miyaji, Atsuko Security Infrastructure Technology for Integrated Utilization of Big Data Singapore : Springer Singapore Pte. Limited,c2020 9789811536533 ProQuest (Firm) https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6191379 Click to View |
language |
English |
format |
eBook |
author |
Miyaji, Atsuko. |
spellingShingle |
Miyaji, Atsuko. Security Infrastructure Technology for Integrated Utilization of Big Data : Applied to the Living Safety and Medical Fields. Intro -- Foreword -- Preface -- Contents -- 1 Introduction -- 1.1 Purpose of Miyaji-CREST -- 1.2 Roles of Each Group -- 1.2.1 Security Core Group -- 1.2.2 Security Management Group -- 1.2.3 Living Safety Testbed Group -- 1.2.4 Health Testbed Group -- 2 Cryptography Core Technology -- 2.1 Analysis on ECDLP -- 2.1.1 Introduction -- 2.1.2 Previous Works -- 2.1.3 Montgomery and Hessian Curves -- 2.1.4 Experiments on PDP Solving -- 2.1.5 Analysis -- 2.1.6 Concluding Remarks -- 2.2 Analysis on Ring-LWE over Decomposition Fields -- 2.2.1 Introduction -- 2.2.2 Preliminaries -- 2.2.3 Ring-LWE over Cyclotomic and Decomposition Fields -- 2.2.4 Our Experimental Analysis -- References -- 3 Secure Primitive for Big Data Utilization -- 3.1 Privacy-Preserving Data Integration -- 3.1.1 Introduction -- 3.1.2 Preliminaries -- 3.1.3 Previous Work -- 3.1.4 Practical MPSI -- 3.1.5 Efficiency -- 3.1.6 System and Performance -- 3.2 Classification -- 3.2.1 Error-Correcting Code -- 3.2.2 Security Assumptions -- 3.2.3 Security Requirements for 2PC -- 3.2.4 HQC Encryption Scheme -- 3.2.5 Proposed Protocol -- 3.2.6 Support Vector Machine from Secure Linear Function Evaluation and Secure Comparison -- References -- 4 Secure Data Management Technology -- 4.1 Introduction -- 4.2 Anonymization Techniques and Adversary Models, Revisited -- 4.2.1 k-Anonymization -- 4.2.2 Noise Addition -- 4.2.3 K-Anonymization for Combined Datasets -- 4.2.4 Matrix Factorization for Time-Sequence Data -- 4.2.5 Anonymization Techniques for User History Graphs -- 4.2.6 Other Notions -- 4.2.7 Combination of Anonymization Techniques -- 4.3 (p, N)-Identifiability -- 4.3.1 Common Adversary Model -- 4.3.2 Success Probability Analysis Based on the Common Adversary Model -- 4.3.3 Experiment -- 4.3.4 Results -- 4.4 Extension to Time-Sequence Data -- 4.4.1 Privacy Definition -- 4.4.2 Utility Definition. 4.4.3 Matrix Factorization -- 4.4.4 Anonymization Using Matrix Factorization -- 4.4.5 Experiment -- 4.4.6 Results -- 4.5 Anonymization and Privacy Risk Evaluation Tool -- 4.6 Conclusion -- References -- 5 Living Safety Testbed Group -- 5.1 Necessity of Living Safety -- 5.2 Overview of Test Bed System for Living Safety -- 5.3 Severity Cliff Analysis of School Injury -- 5.3.1 Development of Severity Cliff Analysis System -- 5.3.2 Severity Cliff Analysis -- 5.4 Trend Analysis of School Injury -- 5.4.1 Trend Analysis for Evaluating Intervention -- 5.4.2 Analysis of Judo Accident -- 5.5 Childhood Home-Injury Simulation -- 5.5.1 Background of Simulation -- 5.5.2 Home-Injury-Situation Simulation System -- 5.5.3 Development Behavior Prediction Function -- 5.5.4 Accident Situation Search Function -- 5.5.5 Similar-Risk-Product Classification Function -- 5.5.6 Simulation Example of the Accident Situation -- 5.5.7 System Verification -- 5.6 Social Impact Engagement Based on Big Data Analysis in Cooperation with Multiple Stakeholders -- 5.6.1 Engagement for Preventing Soccer Goal Turnover -- 5.6.2 Engagement for Preventing Vaulting Box Accidents -- 5.7 Conclusion -- References -- 6 Health Test Bed Group -- 6.1 Overview of Legislation and Standardization for the Secondary Use of Electronic Medical Records -- 6.1.1 Personal Information Protection Act and Next-Generation Medical Infrastructure Act -- 6.1.2 Ethical Guidelines and Anonymization of Medical Information -- 6.1.3 Standardization of EMRs -- 6.2 Medical Test Bed Concepts and Requirements -- 6.3 Features and Implementations of Secondary Use Infrastructure Development -- 6.3.1 SS-MIX2 Standardized Storage -- 6.3.2 Secure Collection of Distributed Medical Information -- 6.3.3 Privacy Risk Assessment of Extracted Datasets -- 6.3.4 Secondary Use and Traceability -- 6.4 Integration and Prospects -- References. |
author_facet |
Miyaji, Atsuko. Mimoto, Tomoaki. |
author_variant |
a m am |
author2 |
Mimoto, Tomoaki. |
author2_variant |
t m tm |
author2_role |
TeilnehmendeR |
author_sort |
Miyaji, Atsuko. |
title |
Security Infrastructure Technology for Integrated Utilization of Big Data : Applied to the Living Safety and Medical Fields. |
title_sub |
Applied to the Living Safety and Medical Fields. |
title_full |
Security Infrastructure Technology for Integrated Utilization of Big Data : Applied to the Living Safety and Medical Fields. |
title_fullStr |
Security Infrastructure Technology for Integrated Utilization of Big Data : Applied to the Living Safety and Medical Fields. |
title_full_unstemmed |
Security Infrastructure Technology for Integrated Utilization of Big Data : Applied to the Living Safety and Medical Fields. |
title_auth |
Security Infrastructure Technology for Integrated Utilization of Big Data : Applied to the Living Safety and Medical Fields. |
title_new |
Security Infrastructure Technology for Integrated Utilization of Big Data : |
title_sort |
security infrastructure technology for integrated utilization of big data : applied to the living safety and medical fields. |
publisher |
Springer Singapore Pte. Limited, |
publishDate |
2020 |
physical |
1 online resource (171 pages) |
edition |
1st ed. |
contents |
Intro -- Foreword -- Preface -- Contents -- 1 Introduction -- 1.1 Purpose of Miyaji-CREST -- 1.2 Roles of Each Group -- 1.2.1 Security Core Group -- 1.2.2 Security Management Group -- 1.2.3 Living Safety Testbed Group -- 1.2.4 Health Testbed Group -- 2 Cryptography Core Technology -- 2.1 Analysis on ECDLP -- 2.1.1 Introduction -- 2.1.2 Previous Works -- 2.1.3 Montgomery and Hessian Curves -- 2.1.4 Experiments on PDP Solving -- 2.1.5 Analysis -- 2.1.6 Concluding Remarks -- 2.2 Analysis on Ring-LWE over Decomposition Fields -- 2.2.1 Introduction -- 2.2.2 Preliminaries -- 2.2.3 Ring-LWE over Cyclotomic and Decomposition Fields -- 2.2.4 Our Experimental Analysis -- References -- 3 Secure Primitive for Big Data Utilization -- 3.1 Privacy-Preserving Data Integration -- 3.1.1 Introduction -- 3.1.2 Preliminaries -- 3.1.3 Previous Work -- 3.1.4 Practical MPSI -- 3.1.5 Efficiency -- 3.1.6 System and Performance -- 3.2 Classification -- 3.2.1 Error-Correcting Code -- 3.2.2 Security Assumptions -- 3.2.3 Security Requirements for 2PC -- 3.2.4 HQC Encryption Scheme -- 3.2.5 Proposed Protocol -- 3.2.6 Support Vector Machine from Secure Linear Function Evaluation and Secure Comparison -- References -- 4 Secure Data Management Technology -- 4.1 Introduction -- 4.2 Anonymization Techniques and Adversary Models, Revisited -- 4.2.1 k-Anonymization -- 4.2.2 Noise Addition -- 4.2.3 K-Anonymization for Combined Datasets -- 4.2.4 Matrix Factorization for Time-Sequence Data -- 4.2.5 Anonymization Techniques for User History Graphs -- 4.2.6 Other Notions -- 4.2.7 Combination of Anonymization Techniques -- 4.3 (p, N)-Identifiability -- 4.3.1 Common Adversary Model -- 4.3.2 Success Probability Analysis Based on the Common Adversary Model -- 4.3.3 Experiment -- 4.3.4 Results -- 4.4 Extension to Time-Sequence Data -- 4.4.1 Privacy Definition -- 4.4.2 Utility Definition. 4.4.3 Matrix Factorization -- 4.4.4 Anonymization Using Matrix Factorization -- 4.4.5 Experiment -- 4.4.6 Results -- 4.5 Anonymization and Privacy Risk Evaluation Tool -- 4.6 Conclusion -- References -- 5 Living Safety Testbed Group -- 5.1 Necessity of Living Safety -- 5.2 Overview of Test Bed System for Living Safety -- 5.3 Severity Cliff Analysis of School Injury -- 5.3.1 Development of Severity Cliff Analysis System -- 5.3.2 Severity Cliff Analysis -- 5.4 Trend Analysis of School Injury -- 5.4.1 Trend Analysis for Evaluating Intervention -- 5.4.2 Analysis of Judo Accident -- 5.5 Childhood Home-Injury Simulation -- 5.5.1 Background of Simulation -- 5.5.2 Home-Injury-Situation Simulation System -- 5.5.3 Development Behavior Prediction Function -- 5.5.4 Accident Situation Search Function -- 5.5.5 Similar-Risk-Product Classification Function -- 5.5.6 Simulation Example of the Accident Situation -- 5.5.7 System Verification -- 5.6 Social Impact Engagement Based on Big Data Analysis in Cooperation with Multiple Stakeholders -- 5.6.1 Engagement for Preventing Soccer Goal Turnover -- 5.6.2 Engagement for Preventing Vaulting Box Accidents -- 5.7 Conclusion -- References -- 6 Health Test Bed Group -- 6.1 Overview of Legislation and Standardization for the Secondary Use of Electronic Medical Records -- 6.1.1 Personal Information Protection Act and Next-Generation Medical Infrastructure Act -- 6.1.2 Ethical Guidelines and Anonymization of Medical Information -- 6.1.3 Standardization of EMRs -- 6.2 Medical Test Bed Concepts and Requirements -- 6.3 Features and Implementations of Secondary Use Infrastructure Development -- 6.3.1 SS-MIX2 Standardized Storage -- 6.3.2 Secure Collection of Distributed Medical Information -- 6.3.3 Privacy Risk Assessment of Extracted Datasets -- 6.3.4 Secondary Use and Traceability -- 6.4 Integration and Prospects -- References. |
isbn |
9789811536540 9789811536533 |
callnumber-first |
Q - Science |
callnumber-subject |
QA - Mathematics |
callnumber-label |
QA76 |
callnumber-sort |
QA 276.9 A25 |
genre |
Electronic books. |
genre_facet |
Electronic books. |
url |
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6191379 |
illustrated |
Not Illustrated |
oclc_num |
1153062197 |
work_keys_str_mv |
AT miyajiatsuko securityinfrastructuretechnologyforintegratedutilizationofbigdataappliedtothelivingsafetyandmedicalfields AT mimototomoaki securityinfrastructuretechnologyforintegratedutilizationofbigdataappliedtothelivingsafetyandmedicalfields |
status_str |
n |
ids_txt_mv |
(MiAaPQ)5006191379 (Au-PeEL)EBL6191379 (OCoLC)1153062197 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Security Infrastructure Technology for Integrated Utilization of Big Data : Applied to the Living Safety and Medical Fields. |
author2_original_writing_str_mv |
noLinkedField |
marc_error |
Info : Unimarc and ISO-8859-1 translations identical, choosing ISO-8859-1. --- [ 856 : z ] |
_version_ |
1792331056074981376 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05385nam a22003973i 4500</leader><controlfield tag="001">5006191379</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20240229073834.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">240229s2020 xx o ||||0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789811536540</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9789811536533</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)5006191379</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL6191379</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1153062197</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Miyaji, Atsuko.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security Infrastructure Technology for Integrated Utilization of Big Data :</subfield><subfield code="b">Applied to the Living Safety and Medical Fields.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore :</subfield><subfield code="b">Springer Singapore Pte. Limited,</subfield><subfield code="c">2020.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">Ã2020.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (171 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Intro -- Foreword -- Preface -- Contents -- 1 Introduction -- 1.1 Purpose of Miyaji-CREST -- 1.2 Roles of Each Group -- 1.2.1 Security Core Group -- 1.2.2 Security Management Group -- 1.2.3 Living Safety Testbed Group -- 1.2.4 Health Testbed Group -- 2 Cryptography Core Technology -- 2.1 Analysis on ECDLP -- 2.1.1 Introduction -- 2.1.2 Previous Works -- 2.1.3 Montgomery and Hessian Curves -- 2.1.4 Experiments on PDP Solving -- 2.1.5 Analysis -- 2.1.6 Concluding Remarks -- 2.2 Analysis on Ring-LWE over Decomposition Fields -- 2.2.1 Introduction -- 2.2.2 Preliminaries -- 2.2.3 Ring-LWE over Cyclotomic and Decomposition Fields -- 2.2.4 Our Experimental Analysis -- References -- 3 Secure Primitive for Big Data Utilization -- 3.1 Privacy-Preserving Data Integration -- 3.1.1 Introduction -- 3.1.2 Preliminaries -- 3.1.3 Previous Work -- 3.1.4 Practical MPSI -- 3.1.5 Efficiency -- 3.1.6 System and Performance -- 3.2 Classification -- 3.2.1 Error-Correcting Code -- 3.2.2 Security Assumptions -- 3.2.3 Security Requirements for 2PC -- 3.2.4 HQC Encryption Scheme -- 3.2.5 Proposed Protocol -- 3.2.6 Support Vector Machine from Secure Linear Function Evaluation and Secure Comparison -- References -- 4 Secure Data Management Technology -- 4.1 Introduction -- 4.2 Anonymization Techniques and Adversary Models, Revisited -- 4.2.1 k-Anonymization -- 4.2.2 Noise Addition -- 4.2.3 K-Anonymization for Combined Datasets -- 4.2.4 Matrix Factorization for Time-Sequence Data -- 4.2.5 Anonymization Techniques for User History Graphs -- 4.2.6 Other Notions -- 4.2.7 Combination of Anonymization Techniques -- 4.3 (p, N)-Identifiability -- 4.3.1 Common Adversary Model -- 4.3.2 Success Probability Analysis Based on the Common Adversary Model -- 4.3.3 Experiment -- 4.3.4 Results -- 4.4 Extension to Time-Sequence Data -- 4.4.1 Privacy Definition -- 4.4.2 Utility Definition.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">4.4.3 Matrix Factorization -- 4.4.4 Anonymization Using Matrix Factorization -- 4.4.5 Experiment -- 4.4.6 Results -- 4.5 Anonymization and Privacy Risk Evaluation Tool -- 4.6 Conclusion -- References -- 5 Living Safety Testbed Group -- 5.1 Necessity of Living Safety -- 5.2 Overview of Test Bed System for Living Safety -- 5.3 Severity Cliff Analysis of School Injury -- 5.3.1 Development of Severity Cliff Analysis System -- 5.3.2 Severity Cliff Analysis -- 5.4 Trend Analysis of School Injury -- 5.4.1 Trend Analysis for Evaluating Intervention -- 5.4.2 Analysis of Judo Accident -- 5.5 Childhood Home-Injury Simulation -- 5.5.1 Background of Simulation -- 5.5.2 Home-Injury-Situation Simulation System -- 5.5.3 Development Behavior Prediction Function -- 5.5.4 Accident Situation Search Function -- 5.5.5 Similar-Risk-Product Classification Function -- 5.5.6 Simulation Example of the Accident Situation -- 5.5.7 System Verification -- 5.6 Social Impact Engagement Based on Big Data Analysis in Cooperation with Multiple Stakeholders -- 5.6.1 Engagement for Preventing Soccer Goal Turnover -- 5.6.2 Engagement for Preventing Vaulting Box Accidents -- 5.7 Conclusion -- References -- 6 Health Test Bed Group -- 6.1 Overview of Legislation and Standardization for the Secondary Use of Electronic Medical Records -- 6.1.1 Personal Information Protection Act and Next-Generation Medical Infrastructure Act -- 6.1.2 Ethical Guidelines and Anonymization of Medical Information -- 6.1.3 Standardization of EMRs -- 6.2 Medical Test Bed Concepts and Requirements -- 6.3 Features and Implementations of Secondary Use Infrastructure Development -- 6.3.1 SS-MIX2 Standardized Storage -- 6.3.2 Secure Collection of Distributed Medical Information -- 6.3.3 Privacy Risk Assessment of Extracted Datasets -- 6.3.4 Secondary Use and Traceability -- 6.4 Integration and Prospects -- References.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="590" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. </subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mimoto, Tomoaki.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Miyaji, Atsuko</subfield><subfield code="t">Security Infrastructure Technology for Integrated Utilization of Big Data</subfield><subfield code="d">Singapore : Springer Singapore Pte. Limited,c2020</subfield><subfield code="z">9789811536533</subfield></datafield><datafield tag="797" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6191379</subfield><subfield code="z">Click to View</subfield></datafield></record></collection> |