Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 8 Multilateral Security Information flowing across boundaries.

Similar presentations


Presentation on theme: "Chapter 8 Multilateral Security Information flowing across boundaries."— Presentation transcript:

1 Chapter 8 Multilateral Security Information flowing across boundaries

2 Multilateral Models Compartmentation Chinese wall BMA (British Medical Association) Develop system to track from conception to autopsy Policy consists of nine principles listed on pages 170-171 Pilot implementations of BMA are in service

3 Inference Control If take name off of medical record is that enough? Medicare keeps 3 sets of records Complete records Beneficiary encrypted Public access Inference control first looked at in census data One record in 1000 made available Noise added Extreme values not included in averages

4 Theory of inference control Query set size control Trackers Cell suppression Which sometimes requires complementary cell suppression Limit number of attributes of query Audit based controls Randomization

5 De-identification It is hard Issues can be politically fraught How to pick out specific data in a sea of information

6 Residual problem Insurers get all the data in order to pay claim They want to know who the most expensive doctors and patients are These are politically charged issue that seldom have rational solutions

7 Medical records Easy problem setting up system of access controls to the record can only be viewed by sensible number of staff Harder problem statistical security Hardest problem managing interface between the 2 Specifically to medicine how to prevent spread of payment information

8 Discussion articles Current state of BMA Genetic database in Iceland Inference cases

9 List of Resources Multilateral security http://csrc.nist.gov/nissc/2000/proceedings/ papers/202ra.pdf http://csrc.nist.gov/nissc/2000/proceedings/ papers/202ra.pdf Chinese Wall http://www.gammassl.co.uk/topics/chinesew all.html http://www.gammassl.co.uk/topics/chinesew all.html

10 List of Resources Inference control http://www.parc.xerox.com/research/publica tions/details.php?id=5264 http://www.parc.xerox.com/research/publica tions/details.php?id=5264 http://www.parc.xerox.com/research/publica tions/files/5264.pdf http://www.parc.xerox.com/research/publica tions/files/5264.pdf http://www.informatik.uni- trier.de/~ley/db/conf/icsd/icsd2002.html http://www.informatik.uni- trier.de/~ley/db/conf/icsd/icsd2002.html http://www.iis.sinica.edu.tw/~tshsu/projects/i nf.html http://www.iis.sinica.edu.tw/~tshsu/projects/i nf.html

11 List of resources De-identification http://www.mii.ucla.edu/dataserver- documentation-features-de-identification http://www.mii.ucla.edu/dataserver- documentation-features-de-identification http://www.haifa.ibm.com/projects/software/ udip/index.html http://www.haifa.ibm.com/projects/software/ udip/index.html http://www.sunclinical.com/old%20site_back %20up/about/privacy.htm http://www.sunclinical.com/old%20site_back %20up/about/privacy.htm


Download ppt "Chapter 8 Multilateral Security Information flowing across boundaries."

Similar presentations


Ads by Google