Skip to main content

Research Repository

Advanced Search

All Outputs (3)

Secret shares to protect health records in Cloud-based infrastructures (2016)
Presentation / Conference Contribution
Buchanan, W. J., Ukwandu, E., van Deursen, N., Fan, L., Russell, G., Lo, O., & Thuemmler, C. (2016). Secret shares to protect health records in Cloud-based infrastructures. In 2015 17th International Conference on E-health Networking, Application & Servi

Increasingly health records are stored in cloud-based systems, and often protected by a private key. Unfortunately the loss of this key can cause large-scale data loss. This paper outlines a novel Cloud-based architecture (SECRET) which supports keyl... Read More about Secret shares to protect health records in Cloud-based infrastructures.

A comparative review of information security risk assessment methodologies for health care. (2011)
Presentation / Conference Contribution
Hazelhoff Roelfzema, N. (2011, March). A comparative review of information security risk assessment methodologies for health care. Paper presented at IADIS e-Society

Health care organizations face major compliance challenges as they need to secure patient information. An important compliance requirement is the performance of regular risk assessments and the implementation of controls to secure data. In theory, an... Read More about A comparative review of information security risk assessment methodologies for health care..

Novel security assessment for personal health data. (2010)
Presentation / Conference Contribution
Hazelhoff Roelfzema, N. (2010, November). Novel security assessment for personal health data. Paper presented at Perada workshop on Privacy, Security & Trust