Methods Inf Med 1997; 36(03): 221-232
DOI: 10.1055/s-0038-1636827
Original Article
Schattauer GmbH

Automation of Contagion Vigilance

D. S. Stodolsky
1   Euromath Center, University of Copenhagen, Denmark
› Author Affiliations
Further Information

Publication History

Publication Date:
17 February 2018 (online)

The very long latency between HIV infection and the appearance of AIDS imposes extensive information processing requirements on partner notification efforts. The apparently contradictory needs of maintaining the right to privacy of infected persons, while simultaneously providing information to persons at risk of infection, impose severe security requirements. These requirements can be satisfied by a Contagion Management System based upon networked personal computers of a kind now becoming available. Security of information is based upon cryptographic protocols that implement anonymous partner notification (contact tracing) and Privacy-Preserving Negotiation. The proposed scheme has the properties that contact tracing is automated, contacts remain anonymous, sensitive information is kept private, and risk-conscious users act as if sensitive information was public. Optimal health protection can thus be obtained while securing informational rights.

 
  • REFERENCES

  • 1 Carballo M. Partner notification for preventing HIV transmission. J Sex Res 1989; 26: 393-9.
  • 2 Osborn JE. Public health and the politics of AIDS prevention. Daedalus 1989; 118: 123-44.
  • 3 Stodolsky D. Data security and the control of infectious agents. In: Abstracts of the Cross Disciplinary Symposium at the University of Linköping. Sweden: Dept Communication Studies; 1986
  • 4 Stodolsky D. Decision processes in a democracy. Self-management 1979; 06: 26-34.
  • 5 Bayer R. AIDS, privacy, and responsibility. Daedalus 1989; 118: 79-99.
  • 6 Stodolsky D. Toward Personal Risk Management: Information Technology Policy for the AIDS Pandemic. Comp.groupware [Usenet]. 1990 March 11.
  • 7 Vermont Member. HSV+. The Helper 1989; 11: 4.
  • 8 Stodolsky D. Personal Computers for Supporting Health Behaviors. Stanford CA: Department of Psychology, Stanford University; 1979. (Preliminary proposal).
  • 9 Burk H, Pfitzmann A. Value Transfer Systems Enabling Security and Unobservability. University of Karlsruhe, Faculty of Informatics, Institute for Computation and Failure Tolerance; 1988. (Working paper 2/87, available from the Informatics Library at the Faculty).
  • 10 Chaum D. Security without identification: Transaction systems to make Big Brother obsolete. Com ACM 1985; 28: 1030-44.
  • 11 Chaum D. Showing credentials without identification: Transferring signatures between unconditionally unlinkable pseudonyms. In: Auscrypt ‘90. Sydney, Australia: University of New South Wales; 1990
  • 12 Chaum T, Evertse J-H. A secure and privacy-protecting protocol for transmitting personal information between organizations. In: Proceedings of Crypto ‘86. New York: Springer-Verlag; 1987
  • 13 Stodolsky D. Net hormones: Part 1 -Infection control assuming cooperation among computers. 1989 (Available via anonymous ftp: “-ftp/virus-1/docs/net.hor-mones”, and by E-mail from LISTSERV@LEHIIBM1.BITNET: File name “HORMONES NET” at Lehigh University).
  • 14 Stodolsky D. Protecting expression in teleconferencing: Pseudonym-based peer review journals. Canad J Educ Com 1990; 19: 41-51.
  • 15 Stodolsky D. Personal Integrity and the Safety of Donated Blood (Personlig integritet och blodkvalitet). Proposal submitted to the Committee for Social Research (Delegationen för social forskning). Social Department; Stockholm, Sweden: 1987
  • 16 Kephart JO. How Topology Affects Population Dynamics. In: Proceedings of Artificial Life 3. Santa Fe; NM: 1992
  • 17 Kephart JO, White SR. Measuring and modeling computer virus prevalence. In: Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy. Oakland, CA: 1993
  • 18 Kephart JO, White SR, Chess DM. Epidemiology of computer viruses. IEEE Spectrum 1993; 30: 20-6.
  • 19 Rochlis JA, Eichin MW. With microscope and tweezers: The worm from MIT’s perspective. Com ACM 1989; 32: 689-98.
  • 20 Evans AS, Brachman PS. Emerging issues in infectious disease epidemiology. J Chronic Dis 1986; 39: 1105-24.
  • 21 Seale J. Crossing the species - viruses and the origins of AIDS in perspective. J R Soc Med 1989; 182: 519-23.
  • 22 Mann J. The global lesson of AIDS. New Scientist June 30, 1990; 30.
  • 23 Yoon CK. What might cause parasites to become more virulent. Science 1993; 259: 1402.
  • 24 Herre EA. Population structure and the evolution of virulence in nematode parasites of fig wasps. Science 1993; 259: 1442-5.
  • 25 Garrett L. The next epidemic. In: Mann JM, Tarantola DJM, Netter TW. eds. AIDS in the World. Cambridge MA: Harvard University Press; 1992: 825-39.