2020
Using blockchain to log genome dataset access: efficient storage and query
Gürsoy G, Bjornson R, Green ME, Gerstein M. Using blockchain to log genome dataset access: efficient storage and query. BMC Medical Genomics 2020, 13: 78. PMID: 32693796, PMCID: PMC7372787, DOI: 10.1186/s12920-020-0716-z.Peer-Reviewed Original ResearchConceptsEfficient queryData streamsMemory requirementsSecure genome analysis competitionAccess log filesSecure data storageProperties of securityMB of memoryAccess logsFast queriesSensitive informationBlockchain platformSecure storageBlockchain technologyUser activityElectronic health recordsLog filesLocal storageRapid queryEfficient storageQueriesData storageDataset accessMore memoryData frames
2011
Using statistical and machine learning to help institutions detect suspicious access to electronic health records
Boxwala A, Kim J, Grillo J, Ohno-Machado L. Using statistical and machine learning to help institutions detect suspicious access to electronic health records. Journal Of The American Medical Informatics Association 2011, 18: 498-505. PMID: 21672912, PMCID: PMC3128412, DOI: 10.1136/amiajnl-2011-000217.Peer-Reviewed Original ResearchConceptsSuspicious accessMachine-learning methodsPrivacy officersMachine learning techniquesVector machine modelAccess logsElectronic health recordsBaseline methodsAccess dataCross-validation setGold standard setSVM modelWhole data setMachine modelBaseline modelOrganizational dataHealth recordsData setsSVM
This site is protected by hCaptcha and its Privacy Policy and Terms of Service apply