EFTA01612882
EFTA01612888 DataSet-10
EFTA01612898

EFTA01612888.pdf

DataSet-10 10 pages 5,153 words document
V11 P17 P22 V9 P24
Open PDF directly ↗ View extracted text
👁 1 💬 0
📄 Extracted Text (5,153 words)
A Blockchain-Based Approach to Health Information Exchange Networks Kevin Peterson, Bammohan Deeduvanu, Pradip Kanjamala, and Kelly Boles Mayo Clinic Abstract Sharing healthcare data between institutions is challenging. Heterogeneous data structures may preclude compatibility, while disparate use of healthcare terminology limits data comprehension. Even if structure and semantics could be agreed upon, both security and data consistency concerns abound. Centralized data stores and authority providers are attractive targets for cyber attack, and establishing a consistent view of the patient record across a data sharing network is problematic. In this work we present a Blockchain-based approach to sharing patient data. This approach trades a single centralized source of trust in favor of network consensus, and predicates consensus on proof of structural and semantic interoperability. 1 Problem Statement Cross-institutional sharing of healthcare data is a complex undertaking with the potential to significantly increase research and clinical effectivenessin. First and foremost, institutions often are reluctant to share data because of privacy concerms[2], and may fear that sending information will give others a competitive advantageN. Next, even if privacy concerns could be addressed, there is no broad consensus around the specific technical infrastructure needed to support such a task[4). Finally, healthcare data itself is complex, and sending information across institutional boundaries requires a shared understanding of both data struc- tures and meaning. Even assuming data can be shared efficiently and securely, these interoperability issues left unchecked will limit the utility of the data. Despite evidence that the value of healthcare data exchange is large[5], these issues, described below, remain significant barriers. 1.1 Security Failing to secure the patient record has financial and legal consequences, as well as the potential to impact patient care. Securing the electronic medical record is a challenging task[6], and the ramifications of a breach are a strong disincentive to sharing data. For this work, we focus on both privacy and anonymity and how they apply to data sharing. Data privacy involves ensuring only authorized parties may access the medical record. This impacts any healthcare system, as patient privacy is not only an ethical responsibility, but a legal mandato[7]. Patient data is also an asset to the institution, and unauthorized access could compromise competitive advantages or reveal proprietary practices. Data anonymity may also be used to secure the record. In this way, identifiable information is left out, and only summary/partial data is shared. This can be acceptable, but is challenging, as it requires a large number of attributes with potential resource or patient care value to be removed from the record in order for it to be considered de-identifled[8]. 1.2 Infrastructure A significant hurdle to sharing data is the agreement of the supporting technical architecture and infrastruc- ture. Many attempts at data sharing require either (I) a centralized data source, or (2) the transmission 1 EFTA01612888 of bulk data to other institutions. Both options introduce unique problems. Centralization increases the security risk footprint, and requires centralized trust in a single authority, while bulk data transmission forces institutions to yield operational control of their data. 1.3 Interoperability Interoperability of healthcare records is the extent to which the clinical intent can be conveyed across institutional boundaries. Given the complexities of data in the healthcare domain, this is inherently difficult to achieve[9]. We examine interoperability within the context of two facets: Structure and Semantics, each necessary for the successful exchange of healthcare data[10]. Data structure, or the attributes and data elements use to convey information, is an important part of interoperability. Healthcare data is complex, and heterogeneous structures decrease the effectiveness of anal- ysis and reduce understandability. To combat this, several industry-wide standards have been advanced[11]. While effective, there is no one authoritative standard, and aligning data encoded with disparate standards is a non-trivial task. Semantics refers to the use of terminologies and vocabularies to describe data meaning, or to codify the data. This codification of healthcare data is important to its interpretation, but is only effective if all parties agree upon the same codification schemes, or controlled terminologiesilq. Often, subsets of vocabularies are used to scope a particular domain of interest. These subsets, called Value Sets, may be used in conjunction with structural models to constrain the allowable codifications for attributes or attribute types. 2 Goals The main goal of this work is to describe an approach to effectively and securely share healthcare information within a data sharing network. We believe that a patient's record should be consistent and available across institutional boundaries, and the terms of its access strictly dictated by the patient. As a secondary goal, this data should not only be shared, but shared in such a way that all interested parties can understand the structure and meaning, ultimately leading to improved data utility and patient care. 3 Proposal 3.1 Assumptions Below are general assumptions about healthcare stakeholders (or nodes) participating in a data sharing network. These assumptions exclude any regulation/incentives that the network itself defines. 1. There is value in receiving external data from other nodes, but only if you can understand the data structure and semantics. 2. Without guarantees of security and auditability, nodes will neither share nor receive data. 3. The patient ultimately controls their record, and authorizes who may access it and when. 3.2 Background 3.2.1 Blockchain A blockchain is a distributed transaction ledger[13]. The blockchain itself is composed of blocks, with each block representing a set of transactions. As a data structure, a blockchain has several interesting properties. First, blocks are provably immutable. This is possible because each block contains a hash, or numeric digest of its content, that can be used to verify the integrity of the containing transactions. Next, the hash of a block is dependent on the hash of the block before it. This effectively makes the entire blockchain history immutable, as changing the hash of any block a — i would also change the hash of block n. The blockchain itself does not depend on a central, trusted authority. Rather, it is distributed to all nodes participating in the network. Because no centralized authority may verify the validity of the blockchain, 2 EFTA01612889 a mechanism for reaching network consensus mast be employed. In Bitcoin, a Proof of Work function is used to ensure network consensus[13]. This strategy requires that any node wishing to add a block to the blockchain must complete a computationally expensive (but easily verifiable) puzzle first. At a high level, this ensures consensus of the network because there is an opportunity cost (the computation time) to building a block. There are several other techniques used, such Proof of Stake[14] and Proof of Activity[15], but all are designed to drive the network to consensus on blockchain validity. Miners are nodes that assemble the blocks and add them to the blockchain. It is through the miners that the consensus strategy is enacted, usually via seine incentivisation protocol. In Bitcoin, for example, miners are incentivized by collecting transaction fees and also by a reward for adding the block to the blockchain. In general, however, there should exist an incentive for them to only build on top of valid blocks, which in turn drives the entire network to consensus. 3.2.2 Fast Healthcare Interoperability Resources Fast Healthcare Interoperability Resources (FHIR)[16, 17, 18, 19] is an emerging standard that depicts data formats and elements, along with providing publicly accessible Application Programming Interfaces (APIs) for the purpose of exchanging Electronic Health Records. The standard was created and is managed by the Health Level Seven International (HL7) healthcare standards organization. FHIR is licensed without restriction or royalty requirements, which should serve to further facilitate its broader adoption. FHIR offers the potential for increased utilization of mobile and cloud-based applications, medical device integration, and flexible/customized healthcare workflows. FHIR enables the separation of EHR data elements into defined structured data types known as resources. Two of the resource types pertain to identification (providers and patients) and common clinical activities. The segmented resource constructs of FHIR facilitate the transfer of portions of EHR data where appropriate or desired. FHIR resources follow Representational State Transfer (ReST)(20] principles, and can be validated for structural conformance to the standard as well as further refined by additional conformance statements called Profiles. 3.3 A Healthcare Blockchain Because a blockchain is a general-purpose data structure, it is possible to apply it to domains other than digital currency. Healthcare, we believe, is one such domain. The challenges of a patient record are not unlike those of a distributed ledger. For example, a patient may receive care at multiple institutions. From the patient's point of view, their record is a single series of sequential care events, regardless of where these events were performed. This notion of shared state across entities, inherent to the blockchain model, is congruent with patient expectations. Also, it is reasonable to assume that each patient care event was influenced by one or more events before it. For example, a prescription may be issued only after a positive lab test was received. The notion of historical care influencing present decisions fits well into the blockchain model, where the identity of a present event is dependent on all past events. Figure 1 describes the structure of a block of healthcare data. Much like the Bitcoin approach, our block is a Merkle Tree-based structure[21]. The leaf nodes of this tree represent patient record transactions, and describe the addition of a resource to the official patient record. Transactions, however, do not include the actual record document. Instead, they reference FHIR Resources via Uniform Resource Locators (URLs). This allows institutions to retain operational control of their data, but more importantly, keeps sensitive patient data out of the blockchain. FHIR was chosen as a exchange format not only because it is an emerging standard, but also because it contains inherent support for provenance and audit trails, making it a suitable symbiotic foundation for blockchain ledger entries. FHIR in conjunction with the blockchain can serve to preserve the integrity and associated context of data transactions. A transaction has the following characteristics: - Hash: The SHA256 hash of the resource payload. Although the actual resource itself is not entered into the blockchain, its content can be verified using the transaction hash upon retrieval. - Contributor Signature: The digital signature of the originating node. - FHIR URL: A reference to the actual FHIR resource location. 3 EFTA01612890 - FHIR Profile: The URI of the FHIR Profile to which this resource conforms. - Secure Index: An encrypted index allowing for data discovery without leaking information about the record. See Section 3.6 for more information. The hashes of all transactions in a block contribute to the hash of the Merkle Root, or Block Header. The Block Header contains the following metadata used to validate the new block: - Hash: The SHA256 hash of the block. Assume the NIerkle Root has two children co and c1, with a previous block b„_ i. Let the hash of b„ equal the hash of the hashed concatenation of the of the bn_ i, co, and c1 hashes. - Previous Block Hash: The hash of the previous block, for validation purposes. - Contributor Signatures: For each node that contributed to the block, a digital signature is required. This is to ensure that the block remains valid after it was assembled by the miner. - Miner Elections: Each node that contributed to the block is required to provide a random number encrypted with the node's private key. This will be used to seed the election of the next miner, which is discussed in section 3.5. Block Meader Hash Plovious Block Hash Contnbulor Signatures Miner Elections Hash •— Hash(Taltlash • Tx2.Huh) Nash Hash(Tx3.Hash • Mail*** TfellSOCt10111 Rash COntrobulOg Signature FHIR URL FHIR Probe Secure Index Figure 1: A healthcare blockchain block containing entries into the patient record. 3.4 Adding Data to the Blockchain Figure 2 outlines the basic activities involved in adding data to the blockchain. In our system, much like Bitcoin, a block is added to the blockchain at regular intervals of time. For Bitcoin, this interval is determined by the difficulty of the Proof of Work function. For our network, we specify a constant interval of time for creating a block, or a block period. Within this block period, the network undergoes four phases of activity. First, during the Transaction Distribution phase starting at time T0, transactions are sent to the coordinating, or miner node. This phase continues until T6, when the miner node may stop accepting new transactions for the block. The miner then assembles the new block and sends it to the nodes for review in the Block Verification Request phase. This allows all nodes that have contributed at least one transaction to digitally sign the block, indicating that they endorse its correctness. The block is then returned to the miner in the Signed Block Return phase. The miner node then adds the block to its local blockchain, and finally distributes the new blockchain in the last phase, New Blockchain Distribution. Algorithm 1 describes this process in more detail. Transactions are collected starting at line 3. Note that the miner cannot mine its own transactions, as shown in line 4 where it is excluded from the set of nodes N. When signing the block, only nodes with at least one transaction in the block are required to sign. This computation is shown in line 7. At the end of this algorithm, the blockchain is distributed to all nodes. 4 EFTA01612891 Transaction Block Verification Signed Stock New Biockchain Distribution Request Return Distribution Time T, To Figure 2: The four phases of adding a block to the healthcare blockchain. Algorithm 1: Creating a new block and adding it to the blockchain. input : A set N of Nodes participating in the network. input : A blockchain, B representing a sequence of {60...64 where b„ is the current (last) block on the chain. input : T6, the end of the Message Distribution phase. 1 a 4- ElectMinerNode(bn ,N); 2 P 4— {}; //Begin with an empty set of pending transactions. s while CurrentTime() < T6 do 4 foreach n E N— {a} do 5 [ LP<- PUCetTransactionsFromNode(n); • AssembleBlock(P); 7 N' E Arl(Bort E P A IsOriginator(n,t)1}; //NI. is an nodes with >= 1 transaction. • foreach n E N' do e L SignBlock(bp,n); ro B' AddBlock(B, bp) rr foreach n E N do 12 L Dist ribut eliaockchain(fr, n) ; 3.5 Mining We use the term Mining to refer to adding blocks to the blockchain. The general intent is similar to that of Bitcoin, but our use case demands a substantially different approach. An overarching goal of the network is to avoid a Proof of Work model, where network computational power is expended without providing something intrinsically valuable. Rather, we aim to arrive at network consensus by forcing nodes to provide proof that the data a transaction references can be meaningfully interpreted, while at the same time requiring nodes to verify these validity proofs. This mechanism, described below, not only ensures blockchain consistency, but incentivizes interoperability among the nodes. 3.5.1 Proof of Interoperability Proof of Interoperability is an alternative method for network consensus that avoids some of the of disadvan- tages of Proof of Work. Specifically, it is designed to leverage the effort required to reach network consensus to do something intrinsically valuable: to verify that incoming messages are interoperable with regard to a known set of structural and semantic constraints. For our use case, the mechanism for designating these interoperability constraints is the FHIR Profile. Profiles in FHIR are a mechanism to further constrain a 5 EFTA01612892 FHIR resource by introducing a model for computable conformance statements. This conformance is both structural and semantic, allowing not only structural constraints on attributes such as cardinality and type, but semantic constraints using value sets. Algorithm 2 describes the process in greater detail. Given a transaction, the specified FHIR Profile is compared to the known set of allowable Profiles. If the Profile is recognized, conformance to the Profile is checked via the CheckProfileConformance function. This operation will ase the FHIR URL to make a validate' request to the FHIR server. The result of this request is a FHIR OperationOutcome response, which can then be inspected for conformance by the Conforms function. Algorithm 2: Proof of Interoperability. input : A set P of pending transactions. input : A set F of network agreed-upon FHIR Profile URIs. input : b0, the current block being assembled. output : A set V of valid transactions. 1 V 4- 0; //Begin with an empty set of valid transactions. 2 foreach t E P do s u <— CetFhirURL(t); 4 p F CetFhirProfile(t); 5 if p E F then cs result <- CheckProfileConformance(u,p); //Using the FHIR `validate' operation. 7 if Conforms(resuit) then v<_vv{t}; Proof of Interoperability does require the network to reach consensus on the set of allowed FHIR Profiles, including the content of the attendant value sets. This consensus cannot, however, be reached programtnat- ically. Network agreement is most likely a human-based process, where network participants negotiate and collaborate with the help of both terminology specialists and clinicians. This type of collaboration necessi- tates a centralized, well known repository. For the value sets, we propose the use of the Value Set Authority Center (VSAC)[22J as a value set repository. 3.5.2 Miner Election In a Proof of Work scenario, miners compete for the right to add a block to the blockchain. We instead employ a system of guaranteed mining share, similar to the system employed by MultiaminI23). This system has several advantages. First, nodes know at the start of the block period who the next miner will be, so transactions may he sent directly instead of distributed to the entire network. Next, it ensures that the mining work required to keep the network consistent is distributed evenly. Finally, by eliminating the competition of Proof of Work, we eliminate wasted computational effort.2 The Miner Election process is described in Algorithm 3. Recall that the last step of adding a block to the blockchain is for the participating nodes to sign it (see Algorithm 1). During this signing process, each node is required to submit a random number to be used for miner election. This set of random numbers is collected on line 1, and is hashed together with the block hash to produce a new number. The next miner then becomes the node whose Public Key is closest to this value. This process serves two purposes: (1) The probability of becoming a miner for any node in the network N should be 1/INS, and (2) the random number used for election is seeded by all participating nodes in the network. This prevents a node from generating a non-random number and electing itself or a chosen collaborator. I helps: //www.h17.org/fhir/resource-operations.html#validate 2We do not assert that Proof of Work effort is strictly wasted. The work expended by nodes in a Proof of Work system certainly has value, as it is the mechanism by which the network stays consistent. 6 EFTA01612893 Algorithm 3: Miner Election. input : A set N of Nodes participating in the network. input : The current (last) block on the blockchain, block bn. output : A randomly elected miner node a. S SetRandomSeed(b.); 2 h GetSlockliash(b.); s foreach s E S do 4 L h Hash(h+s); s a 4— where iGetPublicKey(n) — hi is minimized for node it; 3.6 Data Discovery and Access Even though the block itself does not contain the actual record data, searchability and discoverability remain requirements, as well as a mechanism to access data once the appropriate transactions are found. External entities, with the appropriate permissions, may query the blockchain using keywords in the Secure Index held of the transaction. These keywords may be encrypted to prevent data leakage while still being searehable[24, 2]. Once the transactions of interest are located, the FHIR URL can be used to retrieve the actual resource. 3.7 Security As stated above, data security (both privacy and anonymity) are fundamental priorities for the system. A multi-faceted approach to security for our proposed network includes: Blockchain Encryption. Nothing in the blockchain should be stored in plain text. Public information, or information intended for all nodes in the network, is expected to be encrypted by a network-shared key, while sensitive information should he encrypted by the originating node. Privacy Preserving Keyword Searches. To facilitate data searchability and discoverability, Privacy Preserving Keyword Searches[24] are used. In this way, an external entity may request a set of transactions from the blockchain matching some criteria, with both the query and the transactions remaining encrypted. Smart Contracts. In reality, the security landscape around the patient record is much more nuanced than simply encrypting data. Patients may authorize access to their record only under certain conditions or for a specific reason. This notion of the codification of usage agreements is called smart contracts[25]. There is precedent for their use on a blockchain (e.g., the Ethereum project[26]), and given the complexities involved with our healthcare use case, smart contracts will play an important role. The intent is to ensure that patient authorization is codified and executable - for example. a patient may want their data shared only for research of a certain type, or for a given time range. These smart contracts can be placed directly on the blockchain as transactions[27], providing not only assurances of validity but an audit mechanism as well. 3.8 Patient Identification Consistently identifying a patient between institutions is a non-trivial problem. Many approaches involve some variation of a centralized Master Patient Index (MP0[23], or a single trusted identifier source. This approach has many of the same disadvantages as centralizing patient data - mainly, it requires centralized trust and consolidates valuable information in a single, known place. While a robust MPI discussion is beyond the scope of this work, we can apply some of the design approaches used here. Borrowing from the Bitcoin model, we can think of data on the blockchain assigned to addresses, not patients, with patients controlling the keys to these addresses. The advantage to this approach is that consensus on a single identifier does not need to be reached - a patient may hold multiple blockchain addresses for different institutions. This notion requires the patient to manage and maintain keys to these addresses via an electronic wallet, and is a significant deviation from current practices where institutions assign and own patient identifiers. 7 EFTA01612894 4 Business Value Both the patient and the provider are positioned to benefit from a robust data exchange platform. Viewed from both perspectives, one may see that the quantifiable benefits gained by providers and organizations[5] are paralleled by greater convenience and better care outcomes for the patient. Patient Perspective: - Patients no longer need to coordinate the tedious and frustrating task of gathering records from various providers to send to their specialist. Instead, they would provide the specialist access to the blockchain, enabling them access to the data as they see fit. - Patients retain control of their data without having to be data stewards - meaning, they no longer have to spend time and energy keeping their data managed and up to date. They also no longer need to manually reconcile the data when they visit multiple providers, which can be a non-trivial task. - Ultimately, better and more available data leads to better care for the patient. Provider and Organization Perspective: - The true collaborative nature of creating and sharing data would eliminate many of the challenges of existing Health Information Exchange approaches. - Healthcare organizations do not have to fight for a data-driven competitive advantage, because they all have access to the same information. This approach will enable organizations to collaborate on care coordination and outcomes-based care. - Through existing trust/contracts with patients and partner hospitals/organizations, nodes can broad- cast alerts or potential threats. - Data can be shared for research activities including clinical trials, enabling larger and more diverse patient populations. 5 Summary The challenges of data sharing within the healthcare domain are significant. Simply sharing data is not enough - we've shown that effective data sharing networks require consensus on data syntax, meaning, and security. We've proposed that a blockchain can play a fundamental role in enabling data sharing within a network, and have defined the high level structures and protocols necessary to apply this new technology to healthcare. Building on techniques used successfully by other blockchain applications, we've introduced a new consensus algorithm designed to facilitate data interoperability. Finally, we have applied extra measures of security on the blockchain such as network-wide keys and smart contracts, keeping security a top priority. Ultimately, we believe that a blockchain-based data sharing network is a tenable solution for the complex problem of sharing healthcare data. 6 Future Directions 6.1 Aggregate Blockchains In this work, we've explored how nodes in a data sharing network may interact. Intuitively, we can con- ceptualize these nodes as individual institutions or providers. This mental model aligns to current Heath Information Exchanges. which tend to be (at least in the United States) groupings of regional providers[29]. But what if we reconsider our definition of a node in the network? Envision a node not as a single institution, but as an entire blockebain-based data sharing network. We can now imagine not only cross-institutional sharing, but cross-network sharing as well. This would enable the institution/provider-based networks to grow and evolve, at the same time allowing them to connect to similar networks. This notion of aggregation, or nested blockchains, may be an approach to extending the reach of collaborations and sharing beyond local networks. 8 EFTA01612895 6.2 Machine Learning With the rapid improvement in computational power and machine learning algorithms, blockchain technol- ogy can help facilitate a mechanism to compensate an Artificial Intelligence (AI) service provider for the development and execution of novel machine learning algorithms. For example, developing machine learning algorithms that can look at a radiology image or CT scan and make diagnosis predictions are time con- sinning to develop, but once developed are easy to execute. By leveraging blockchain technology, one can envision a world in which a service provider publishes FHIR DiagnosticReports of radiology images to the blockchain. An AI service provider that specializes in developing novel machine learning algorithms with which the hospital has partnerships would be allowed to rim their algorithm over the images and publish the Al diagnosis output back to the blockchain. The radiologist at the hospital could then use this result as an independent reference to compare his or her own diagnosis. The AI providers get compensated when their diagnosis matches that of the radiologist, so there is an incentive for the AI providers to refine and keep improving the accuracy of their algorithms. The blockchain also provides an irrefutable trail of what the AI provider diagnosed and the final official diagnosis. References [1] Yaorong Ge, David K Ahn, Bhagyashree Unde, H Donald Gage, and J Jeffrey Carr. Patient-controlled sharing of medical imaging data across unaffiliated healthcare organizations. Journal of the American Medical Informatics Association, 20(1):157-163, 2013. [2] Chris Clifton, Murat Kantarcioglu, AnHai Doan, Gunther Schadow, Jaideep Vaidya, Ahmed Elma- garmid, and Dan Stiehl. Privacy-preserving data integration and sharing. In Proceedings of the 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, pages 19-26. ACM, 2004. [3] Joshua R Vest and Larry D Gamin. Health Information Exchange: persistent challenges and new strategies. Journal of the American Medical Informatics Association, 17(3):288-294, 2010. [4] Paul C Tang, Joan S Ash, David \V Bates, J Marc Overhage, and Daniel Z Sands. Personal health records: definitions, benefits, and strategies for overcoming barriers to adoption. Journal of the American Medical Informatics Association, 13(2):121-126, 2006. [5] Jan Walker, Eric Pan, Douglas Johnston, Julia Adler-Milstein, et al. The value of health care information exchange and interoperability. Health Affairs, 24:W5, 2005. [6] Randolph C Barrows and Paul D Clayton. Privacy, confidentiality, and electronic medical records. Journal of the American Medical Informatics Association, 3(2):139-148, 1996. [71 Centers for Disease Control, Prevention, et al. HIPAA privacy rule and public health. Guidance from CDC and the US Department of Health and Human Services. AIAIIVR: Morbidity and Mortality Weekly Report, 52(Suppl. 1):1-17, 2003. [8] US GPO. CFR§ 164 security and privacy. 2008. http://www.access.gpo.gov/ nara/cfr/waisklx_08/45cfr164_08.html. Accessed: 2016-08-06. [9] Charles N Mead et al. Data interchange standards in healthcare it-computable semantic interoperability: Now possible but still difficult. do we really need a better mousetrap? Journal of Healthcare Information Management, 20(1):71, 2006. [10] Amit P Sheth. Changing focus on interoperability in information systems: from system, syntax, struc- ture to semantics. In Interoperating Geographic Information Systems, pages 5-29. Springer, 1999. [11] A Begoyan. An overview of interoperability standards for electronic health records. USA: Society for Design and Process Science, 2007. 9 EFTA01612896 [121 James J Cimino et al. Desiderata for controlled medical vocabularies in the twenty-first century. Methods of Information in Medicine-Methodik der Information in der Medisin, 37(4):394-403, 1998. [131 Satoshi Nakarnoto. Bitcoin: A peer-to-peer electronic cash system, 2008. [141 Sunny King and Scott Nadal. PPCoin: Peer-to-peer crypto-currency with proof-of-stake. Self-Published Paper, August, 19, 2012. [15J hide Bentov, Charles Lee, Alex Mizrahi, and Meth Rosenfeld. Proof of activity: Extending bitcoin's proof of work via proof of stake. ACM SIGMETRICS Performance Evaluation Review, 42(3):34-37, 2014. [16J HL7. HL7 Fast Healthcare Interoperability Resources (FHIR). https://www.h17.org/fhir/. Accessed: 2016-08-01. [11 Russell Leftwich. The path to deriving clinical value from FHIR - InterSystems. http://www.intersystems.com/library/library-item/path-deriving-clinical-value-fhir/. Accessed: 2016-08-06. [18] iNTERFACEWARE Inc. What is 'FHIR' and why you should care? http://wvnv.interfaceware.com/blog/what-is-fhir-and-why-should-you-care/. Accessed: 2016-08-06. [19] Tim Benson. Principles of health interoperability HL7 and SNOMED. Springer Science & Business Media, 2012. [20] Roy Thomas Fielding. Architectural styles and the design of network-based software architectures. PhD thesis, University of California, Irvine, 2000. [21J Leslie Lamport. Constructing digital signatures from a one-way function. Technical report, Technical Report CSL-98, SRI International Palo Alto, 1979. [22J Olivier Bodenreider, Duc Nguyen, Fishing Chiang, Philip Chuang, Maureen Madden, Rainer Winnen- burg, Rob McClure, Steve Emrick, and Ivor DSouza. The NLM Value Set Authority Center. Studies in Health Technology and Informatics, 192:1224, 2013. [23] Steffan D Norberhuis. MultiChain: A cybercurrency for cooperation. PhD thesis, TU Delft, Delft University of Technology, 2015. [24] Yan-Cheng Chang and Michael Mitzenmacher. Privacy preserving keyword searches on remote encrypted data. In International Conference on. Applied Cryptography and Network Security, pages 442-455. Springer, 2005. [251 Nick Szabo. Formalizing and securing relationships on public networks. First Monday, 2(9), 1997. [261 Vitalik Buterin. A next-generation smart contract and decentralized application platform. White Paper, 2014. [27] Loi Luu, Jason Teutsch, Raghav Kulkarni, and Prateek Saxena. Demystifying incentives in the consensus computer. In Proceedings of the 22nd ACM SIOSAC Conference on Computer and Communications Security, pages 706-719. ACM, 2015. [28J Peter Littlejohns, Jeremy C Wyatt, and Linda Garvican. Evaluating computerised health information systems: hard lessons still to be learnt. BhfJ, 326(7394):860-863, 2003. [29J Ashish K Jha, David Doolan, Daniel Grandt, Tim Scott, and David \V Bates. The use of health information technology in seven nations. International Journal of Medical Informatics, 77(12):848-854, 2008. 10 EFTA01612897
ℹ️ Document Details
SHA-256
36e3004b6f343213532e3c174da76dcc5e6e033d7f49d8299047ff619dfd85e9
Bates Number
EFTA01612888
Dataset
DataSet-10
Document Type
document
Pages
10

Comments 0

Loading comments…
Link copied!