Collaborative healthcare information systems in privacy preservation based on K-anonymization model / Asmaa Hatem Rashid
Collaboration is an important requirement in health information systems (HISs) because it produces reliable and rigorous evidence that can inform critical decisions related to healthcare services. It aids in the provision of proper and fast treatment to patients. Data privacy preservation is a cruci...
| Main Author: | Rashid, Asmaa Hatem |
|---|---|
| Format: | Thesis |
| Published: |
2014
|
| Subjects: | |
| Online Access: | http://studentsrepo.um.edu.my/4680/ http://studentsrepo.um.edu.my/4680/1/ASMAA_HATEM_RASHID.pdf |
Similar Items
Privacy-preserving fractal healthcare information system model based on K-anonymization to improve collaboration among physicians
by: Jarallah, Luma Fawaz
Published: (2017)
by: Jarallah, Luma Fawaz
Published: (2017)
Towards a Privacy Diagnosis Centre : Measuring k-anonymity
by: Mirakabad, Mohammad Reza Zare, et al.
Published: (2008)
by: Mirakabad, Mohammad Reza Zare, et al.
Published: (2008)
Balancing data utility versus information loss in data-privacy protection using k-Anonymity
by: Esmeel, Thamer Khalil, et al.
by: Esmeel, Thamer Khalil, et al.
Enhanced slicing-based anonymization approach for privacy-preserving data publishing with improved data utility
by: Mohammed Mahfoudh, Khamis Binjubeir
Published: (2024)
by: Mohammed Mahfoudh, Khamis Binjubeir
Published: (2024)
Increasing data anonymity using privacy techniques and advanced encryption standard
by: Thamer, Khalil Esmeel
Published: (2020)
by: Thamer, Khalil Esmeel
Published: (2020)
A Hybrid Method For K-Anonymization Using Clustering Technique
by: Abd.Rahim, Y, et al.
Published: (2011)
by: Abd.Rahim, Y, et al.
Published: (2011)
A conceptual anonymity model to ensure privacy for sensitive network data
by: Arafat, N.H.M., et al.
Published: (2021)
by: Arafat, N.H.M., et al.
Published: (2021)
A decision support system using Neurofuzzy algorithm methods in selecting lecturer's teaching work load for bachelor in multimedia / Asmaa Musa
by: Musa, Asmaa
Published: (2007)
by: Musa, Asmaa
Published: (2007)
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
by: Goi, , BM, et al.
Published: (2004)
by: Goi, , BM, et al.
Published: (2004)
A Framework For Privacy Diagnosis And
Preservation In Data Publishing
by: Mirakabad, Mohammad Reza Zare
Published: (2010)
by: Mirakabad, Mohammad Reza Zare
Published: (2010)
Privacy Preservation Model For Data Exposure In Android Smartphone Usage
by: Abu Bakar, Anizah
Published: (2021)
by: Abu Bakar, Anizah
Published: (2021)
Collaborative mobile instant messaging learning pedagogical model for teacher training / Khairah @ Asma’a Baharun
by: Khairah @ Asma’a , Baharun
Published: (2018)
by: Khairah @ Asma’a , Baharun
Published: (2018)
Blockchain-enabled Secure Privacy-preserving System for Public Health-center Data
by: Islam, Md. Shohidul, et al.
Published: (2023)
by: Islam, Md. Shohidul, et al.
Published: (2023)
Palestinian diaspora entrepreneurship - a driving force in the knowledge economy / Mervat Hatem N. Shahin
by: Shahin, Mervat Hatem N.
Published: (2012)
by: Shahin, Mervat Hatem N.
Published: (2012)
Utilizing hippocratic database for personal information privacy protection
by: Mohamed Sidek, Zailani, et al.
Published: (2008)
by: Mohamed Sidek, Zailani, et al.
Published: (2008)
Increasing Data Anonymity using AES and Privacy Technique
by: Thamer Khalil, Esmeel, et al.
Published: (2019)
by: Thamer Khalil, Esmeel, et al.
Published: (2019)
Privacy-preserving computer forensics framework
by: Halboob, Waleed Abduljabbar
Published: (2015)
by: Halboob, Waleed Abduljabbar
Published: (2015)
A legal study on the abandonment of animal in Malaysia with regards to the Animal Act 1953 / Siti Safiah Rosli, Nur Aqilah Zainal Abidin and Asmaa Nadhirah Zanol Rashid
by: Rosli, Siti Safiah, et al.
Published: (2014)
by: Rosli, Siti Safiah, et al.
Published: (2014)
Sistem penjanaan jadual waktu FSKTM / Emirasfa Abd Rashid
by: Emirasfa, Abd Rashid
Published: (2002)
by: Emirasfa, Abd Rashid
Published: (2002)
Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
by: Goi, , BM, et al.
Published: (2005)
by: Goi, , BM, et al.
Published: (2005)
Quality of water supply on low cost housing in Shah Alam / Nuraina Asmaa Rejemat
by: Rejemat, Nuraina Asmaa
Published: (2013)
by: Rejemat, Nuraina Asmaa
Published: (2013)
Slicing-based enhanced method for privacy-preserving in publishing big data
by: BinJubeir, Mohammed Ma., et al.
Published: (2022)
by: BinJubeir, Mohammed Ma., et al.
Published: (2022)
Avillion Village Resort Online System / Zainorhuda Zainal Rashid
by: Zainorhuda, Zainal Rashid
Published: (2001)
by: Zainorhuda, Zainal Rashid
Published: (2001)
Study of carbon black-epoxy based fat tissue phantom and its dielectric properties / Hatem Mohamed Abdelwahab Al-Gabroun
by: Hatem Mohamed, Abdelwahab Al-Gabroun
Published: (2010)
by: Hatem Mohamed, Abdelwahab Al-Gabroun
Published: (2010)
Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
by: Goi, Bok Min, et al.
Published: (2007)
by: Goi, Bok Min, et al.
Published: (2007)
Internet anonymity practices in computer crime
by: Armstrong, Helen, et al.
Published: (2003)
by: Armstrong, Helen, et al.
Published: (2003)
The worth of anonymous feedback
by: Dreher, Heinz, et al.
Published: (2006)
by: Dreher, Heinz, et al.
Published: (2006)
A hybrid protection method to enhance data utility while preserving the privacy of medical patients data publishing
by: Jeba, Shermina, et al.
Published: (2022)
by: Jeba, Shermina, et al.
Published: (2022)
An artificial neural network model for flood forecasting in Kemaman, Terengganu / Tuan Asmaa Tuan Resdi
by: Tuan Resdi, Tuan Asmaa
Published: (2016)
by: Tuan Resdi, Tuan Asmaa
Published: (2016)
UTMGO : a tool for searching a group of semantically related gene ontology terms and application to annotation of anonymous protein sequence
by: Deris, Safaai, et al.
Published: (2006)
by: Deris, Safaai, et al.
Published: (2006)
Integration of Smart Healthcare Information System / Premjit Singh Dulku
by: Premjit Singh , Dulku
Published: (2002)
by: Premjit Singh , Dulku
Published: (2002)
An information privacy taxonomy for collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Towards privacy protection in smart grid
by: Zeadally, Sherali, et al.
Published: (2012)
by: Zeadally, Sherali, et al.
Published: (2012)
Intergration of Smart Healthcare Information Systems
/ Premjit Singh Dulku
by: Premjit , Singh Dulku
Published: (2002)
by: Premjit , Singh Dulku
Published: (2002)
Information and communication privacy in wireless sensor networks
by: Salami, Abdulazeez F., et al.
Published: (2011)
by: Salami, Abdulazeez F., et al.
Published: (2011)
CIT 561 – Healthcare Information System - February 2022
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
Syariah principles in Islamic banking: with special reference to BIMB / Wan Asma’a Wan Abu Bakar
by: Wan Abu Bakar, Wan Asma’a
Published: (1993)
by: Wan Abu Bakar, Wan Asma’a
Published: (1993)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
A taxonomy for information privacy in virtual collaborations
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
Preservers of pairs of bivectors with bounded distance
by: Lim, Ming-Huat, et al.
Published: (2009)
by: Lim, Ming-Huat, et al.
Published: (2009)
Similar Items
-
Privacy-preserving fractal healthcare information system model based on K-anonymization to improve collaboration among physicians
by: Jarallah, Luma Fawaz
Published: (2017) -
Towards a Privacy Diagnosis Centre : Measuring k-anonymity
by: Mirakabad, Mohammad Reza Zare, et al.
Published: (2008) -
Balancing data utility versus information loss in data-privacy protection using k-Anonymity
by: Esmeel, Thamer Khalil, et al. -
Enhanced slicing-based anonymization approach for privacy-preserving data publishing with improved data utility
by: Mohammed Mahfoudh, Khamis Binjubeir
Published: (2024) -
Increasing data anonymity using privacy techniques and advanced encryption standard
by: Thamer, Khalil Esmeel
Published: (2020)