Page 231 - Big Data Analytics for Intelligent Healthcare Management
P. 231

224     CHAPTER 8 BLOCKCHAIN IN HEALTHCARE: CHALLENGES AND SOLUTIONS




             [34] M.H. Miraz, M. Ali, Applications of Blockchain Technology Beyond Cryptocurrency, 2018. arXiv preprint
                 arXiv:1801.03528.
             [35] M.M.H. Onik, M.H. Miraz, C.S. Kim, A recruitment and human resource management technique using
                 blockchain technology for industry 4.0, in: Smart Cities Symposium 2018 (SCS’18), 22–23rd April, Univer-
                 sity of Bahrain, IET, Bahrain, 2018, pp. 11–16.
             [36] M.M.H. Onik, N. Al-Zaben, H.P. Hoo, C.S. Kim, A Novel Approach for Network Attack Classification Based
                 on Sequential Questions, 2018. arXiv preprint arXiv:1804.00263.
             [37] M.M.H. Onik, N. Al-Zaben, J. Yang, C.S. Kim, Privacy of Things (PoT): personally identifiable information
                 monitoring system for smart homes, in: 국통신회 술대회논문집 Proceedings of the Korean Institute of
                 Communication Sciences Conference, KICS, Jeju, Korea, 2018, pp. 256–257.
             [38] M.M.H. Onik, N. Al-Zaben, J. Yang, N.Y. Lee, C.S. Kim, Risk identification of personally identifiable in-
                 formation from collective mobile app data, in: Proceeding of International Conference on Computing, Elec-
                 tronics & Communications Engineering 2018 (iCCECE ’18), University of Essex, Southend, 2018,
                 pp. 71–76.
             [39] N. Al-Zaben, M.M.H. Onik, J. Yang, N.Y. Lee, C.S. Kim, General data protection regulation complied block-
                 chain architecture for personally identifiable information management, in: Proceeding of International Con-
                 ference on Computing, Electronics & Communications Engineering 2018 (iCCECE ’18), University of
                 Essex, Southend, 2018, pp. 77–82.
             [40] PwC, Global FinTech Report 2017, Available from:https://www.pwc.com/gx/en/industries/financial-
                 services/assets/pwc-global-fintech-report-2017.pdf, 2017. Accessed 24 January 2018.
             [41] C. Cachin, Architecture of the Hyperledger blockchain fabric, in: Workshop on Distributed Cryptocurrencies
                 and Consensus Ledgers, July, 2016.
             [42] NISTIR, Blockchain Technology Overview, National Institute of Standards and Technology, 2018. Avail-
                 able from:https://csrc.nist.gov/CSRC/media/Publications/nistir/8202/draft/documents/nistir8202-draft.pdf.
                 Accessed 27 January 2018.
             [43] D. Johnson, A. Menezes, S. Vanstone, The elliptic curve digital signature algorithm (ECDSA), Int. J. Inf.
                 Secur. 1 (1) (2001) 36–63.
             [44] A. Castor, A (Short) Guide to Blockchain Consensus Protocols, CoinDesk, 2017.
             [45] L.A. Linn, M.B. Koo, Blockchain for health data and its potential use in health it and health care related
                 research, in: ONC/NIST Use of Blockchain for Healthcare and Research Workshop, ONC/NIST,
                 Gaithersburg, MD, 2016.
             [46] A. Pfitzmann, M. Hansen, A Terminology for Talking about Privacy by Data Minimization: Anonymity,
                 Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management, 2010.
             [47] E. McCallister, T. Grance, K.A. Scarfone, Guide to Protecting the Confidentiality of Personally Identifiable
                 Information (PII), 2010. No. Special Publication (NIST SP)-800-122.
             [48] M. Kayaalp, Patient privacy in the era of big data, Balkan Med. J. 35 (1) (2018) 8–17.
             [49] S. Berinato, There’s No Such Thing as Anonymous Data, Retrieved from:https://hbr.org/2015/02/theres-no-
                 such-thing-as-anonymous-data, 2015. Accessed 10 June 2018.
             [50] A. Abdalaal, M.E. Nergiz, Y. Saygin, Privacy-preserving publishing of opinion polls, Comput. Secur.
                 37 (2013) 143–154.
             [51] L. Sweeney, k-anonymity: a model for protecting privacy, Int. J. Uncertainty Fuzziness Knowledge Based
                 Syst. 10 (05) (2002) 557–570.
             [52] C.C. Aggarwal, On k-anonymity and the curse of dimensionality, in: Proceedings of the 31st International
                 Conference on Very Large Data Bases, VLDB Endowment, 2005, pp. 901–909.
             [53] J. Ali, Mechanism for the prevention of password reuse through Anonymized Hashes. PeerJ Prepr. 5 (2017)
                 e3322v1https://doi.org/10.7287/peerj.preprints.3322v1.
             [54] T.S. Gal, T.C. Tucker, A. Gangopadhyay, Z. Chen, A data recipient centered de-identification method to
                 retain statistical attributes, J. Biomed. Inform. 50 (2014) 32–45.
   226   227   228   229   230   231   232   233   234   235   236