Utilizing hippocratic database for personal information privacy protection
In today's digital world, privacy protection over personal information has become a major element in web based application. Both parties involved in a web based application transaction, either consumer or application provider should be ensured with this privacy. Protecting privacy are always re...
| Main Authors: | Mohamed Sidek, Zailani, Abdul Ghani, Norjihan |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Penerbit UTM Press
2008
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/10699/ http://eprints.utm.my/10699/1/ZailaniMohamedSidek2008_UtilizingHippocraticDatabaseForPersonalInformation_ori.pdf |
Similar Items
Balancing data utility versus information loss in data-privacy protection using k-Anonymity
by: Esmeel, Thamer Khalil, et al.
by: Esmeel, Thamer Khalil, et al.
Towards privacy protection in smart grid
by: Zeadally, Sherali, et al.
Published: (2012)
by: Zeadally, Sherali, et al.
Published: (2012)
Comprehensive survey on Big Data Privacy
Protection
by: BinJubeir, Mohammed, et al.
Published: (2019)
by: BinJubeir, Mohammed, et al.
Published: (2019)
A new tv-based database encryption scheme using ts block cipher
by: Mohamed Sidek, Zailani, et al.
Published: (2004)
by: Mohamed Sidek, Zailani, et al.
Published: (2004)
A hybrid protection method to enhance data utility while preserving the privacy of medical patients data publishing
by: Jeba, Shermina, et al.
Published: (2022)
by: Jeba, Shermina, et al.
Published: (2022)
Enhanced slicing-based anonymization approach for privacy-preserving data publishing with improved data utility
by: Mohammed Mahfoudh, Khamis Binjubeir
Published: (2024)
by: Mohammed Mahfoudh, Khamis Binjubeir
Published: (2024)
Effectiveness of Personal Protective Equipment (PPE) at Construction Site
by: Mohd Amir Shazwan, Hashim, et al.
Published: (2018)
by: Mohd Amir Shazwan, Hashim, et al.
Published: (2018)
Collaborative healthcare information systems in privacy preservation based on K-anonymization model / Asmaa Hatem Rashid
by: Rashid, Asmaa Hatem
Published: (2014)
by: Rashid, Asmaa Hatem
Published: (2014)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
Implementation of serious games for data privacy and protection awareness in Cybersecurity
by: Siti Normaziah, Ihsan, et al.
Published: (2023)
by: Siti Normaziah, Ihsan, et al.
Published: (2023)
The Application of Fragmentation Techniques on Distributed Database: An Overview
by: Sharifah Hafizah, Sy Ahmad Ubaidillah, et al.
Published: (2017)
by: Sharifah Hafizah, Sy Ahmad Ubaidillah, et al.
Published: (2017)
Fingerprint database
by: Nur Amira, Ariffin
Published: (2015)
by: Nur Amira, Ariffin
Published: (2015)
Binary Vote Assignment on Cloud Quorum Algorithm for Fragmented MyGRANTS Database Replication
by: Noraziah, Ahmad, et al.
Published: (2015)
by: Noraziah, Ahmad, et al.
Published: (2015)
Creating Problemata with the Hippocratic corpus
by: Thomas, Oliver
Published: (2015)
by: Thomas, Oliver
Published: (2015)
Going Native: Native XML Database vs. Relational Database
by: Lazim, Raghad Yaseen, et al.
Published: (2012)
by: Lazim, Raghad Yaseen, et al.
Published: (2012)
Pseudonmization Techniques for Clinical Data: Privacy Study in Sultan Ismail Hospital Johor Bahru
by: Abd.Rahim, Y, et al.
Published: (2011)
by: Abd.Rahim, Y, et al.
Published: (2011)
The development of semantic meta-database: an ontology based semantic integration of biological databases
by: Samsudin, Ruhaidah, et al.
Published: (2007)
by: Samsudin, Ruhaidah, et al.
Published: (2007)
Increasing data anonymity using privacy techniques and advanced encryption standard
by: Thamer, Khalil Esmeel
Published: (2020)
by: Thamer, Khalil Esmeel
Published: (2020)
MY SAY: Whither the Hippocratic oath?
by: Abd Razak, Dzulkifli
Published: (2011)
by: Abd Razak, Dzulkifli
Published: (2011)
Smart information system personal expenses advisory system
by: Lew, Wen Xiong
Published: (2018)
by: Lew, Wen Xiong
Published: (2018)
Development of Al-Mu’awwidhah computing for personal data
protection against abnormal attacks
by: Shamsudin, Ahmad Faizul, et al.
Published: (2013)
by: Shamsudin, Ahmad Faizul, et al.
Published: (2013)
Inference networks for molecular database similarity searching
by: Abdo, Ammar, et al.
Published: (2008)
by: Abdo, Ammar, et al.
Published: (2008)
BVAGQ-AR for Fragmented Database Replication Management
by: N., Ahmad, et al.
Published: (2021)
by: N., Ahmad, et al.
Published: (2021)
Mining association rule from large databases.
by: Defit, Sarjon, et al.
Published: (2001)
by: Defit, Sarjon, et al.
Published: (2001)
A sentiment-based filteration and data analysis framework for social media
by: Abd Ghani, Norjihan, et al.
Published: (2015)
by: Abd Ghani, Norjihan, et al.
Published: (2015)
Utilizing shared interacting domain patterns and gene ontology information to improve protein–protein interaction prediction
by: Roslan, Rosfuzah, et al.
Published: (2010)
by: Roslan, Rosfuzah, et al.
Published: (2010)
A secure approach for health information exchange using mobile personal health records / Mohamed Shabbir Hamza Abdulnabi
by: Mohamed Shabbir Hamza , Abdulnabi
Published: (2018)
by: Mohamed Shabbir Hamza , Abdulnabi
Published: (2018)
Rivisit grid computing security
by: Ismail, Saiful Adli, et al.
Published: (2008)
by: Ismail, Saiful Adli, et al.
Published: (2008)
Metadata model for database query on dynamic database federation in data grid environment based on ontology framework : a text similarity approach
by: Adiyarta, Krisna, et al.
Published: (2008)
by: Adiyarta, Krisna, et al.
Published: (2008)
Blockchain-enabled Secure Privacy-preserving System for Public Health-center Data
by: Islam, Md. Shohidul, et al.
Published: (2023)
by: Islam, Md. Shohidul, et al.
Published: (2023)
Development Bvag Replication Prototype In Distributed Database Environment
by: Muhammad Fathul Amin, Sulaiman
Published: (2023)
by: Muhammad Fathul Amin, Sulaiman
Published: (2023)
The Effect of Security and Privacy Perceptions on Customers’ Trust to Accept Internet Banking Services: An Extension of TAM
by: Al-Sharafi, Mohammed A., et al.
Published: (2016)
by: Al-Sharafi, Mohammed A., et al.
Published: (2016)
Economic perspective analysis of protecting big data security and privacy
by: Tao, Hai, et al.
Published: (2019)
by: Tao, Hai, et al.
Published: (2019)
Conceptualizing a framework to enhance information security culture and compliance behavior in organizations through protection motivation theory
by: Alrawhani, Ebrahim Mohammed, et al.
Published: (2024)
by: Alrawhani, Ebrahim Mohammed, et al.
Published: (2024)
Assessment of cybersecurity awareness program on personal data protection among youngsters in Malaysia / Noor Hayani Abd Rahim
by: Noor Hayani , Abd Rahim
Published: (2017)
by: Noor Hayani , Abd Rahim
Published: (2017)
VPN-data center system database / Gan Thai Hwan
by: Gan , Thai Hwan
Published: (2001)
by: Gan , Thai Hwan
Published: (2001)
Evaluation of XML documents queries based on native XML database
by: Lazim, Raghad Yaseen
Published: (2016)
by: Lazim, Raghad Yaseen
Published: (2016)
Managing Fragmented Database Using BVAGQ-AR Replication Model
by: Ainul Azila, Che Fauzi, et al.
Published: (2017)
by: Ainul Azila, Che Fauzi, et al.
Published: (2017)
Database integration approaches for heterogeneous biological data sources : an overview
by: Ishak, Iskandar, et al.
Published: (2006)
by: Ishak, Iskandar, et al.
Published: (2006)
An overview of ontology based approach to organize the metadata for grid database
by: Adiyarta, Krisna, et al.
Published: (2006)
by: Adiyarta, Krisna, et al.
Published: (2006)
Similar Items
-
Balancing data utility versus information loss in data-privacy protection using k-Anonymity
by: Esmeel, Thamer Khalil, et al. -
Towards privacy protection in smart grid
by: Zeadally, Sherali, et al.
Published: (2012) -
Comprehensive survey on Big Data Privacy
Protection
by: BinJubeir, Mohammed, et al.
Published: (2019) -
A new tv-based database encryption scheme using ts block cipher
by: Mohamed Sidek, Zailani, et al.
Published: (2004) -
A hybrid protection method to enhance data utility while preserving the privacy of medical patients data publishing
by: Jeba, Shermina, et al.
Published: (2022)