These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
136 related articles for article (PubMed ID: 11365692)
1. Major email security flaws discovered: how to protect your data. James JS AIDS Treat News; 1998 Aug; (No 301):8. PubMed ID: 11365692 [TBL] [Abstract][Full Text] [Related]
2. Three computational systems for disclosing medical data in the year 1999. Sweeney L Stud Health Technol Inform; 1998; 52 Pt 2():1124-9. PubMed ID: 10384634 [TBL] [Abstract][Full Text] [Related]
3. Security on the Internet: is your system vulnerable? Neray P Nurs Manage; 1997 Jul; 28(7):64. PubMed ID: 9325940 [TBL] [Abstract][Full Text] [Related]
4. Ensuring confidentiality on computer networks. Smith JP Diagn Imaging (San Franc); 1995 Jul; 17(7):43-4, 47. PubMed ID: 10150605 [No Abstract] [Full Text] [Related]
5. Protect your net. Good policy + good technology = dependable security. Schneider P Healthc Inform; 1998 May; 15(5):33-4. PubMed ID: 10179843 [No Abstract] [Full Text] [Related]
6. The adoption of IT security standards in a healthcare environment. Gomes R; LapĆ£o LV Stud Health Technol Inform; 2008; 136():765-70. PubMed ID: 18487824 [TBL] [Abstract][Full Text] [Related]
7. Secured medical imaging over the Internet. Aslan P; Lee B; Kuo R; Babayan RK; Kavoussi LR; Pavlin KA; Preminger GM Stud Health Technol Inform; 1998; 50():74-8. PubMed ID: 10180590 [TBL] [Abstract][Full Text] [Related]
8. Data security. Raising the drawbridge. Balaban D Health Data Manag; 1998 Aug; 6(8):81-2. PubMed ID: 10181954 [No Abstract] [Full Text] [Related]
9. Addressing the new network security challenges. Siwicki B Health Data Manag; 1997 Dec; 5(12):45-6, 48. PubMed ID: 10175525 [No Abstract] [Full Text] [Related]
10. Design and implementation of a smart card based healthcare information system. Kardas G; Tunali ET Comput Methods Programs Biomed; 2006 Jan; 81(1):66-78. PubMed ID: 16356586 [TBL] [Abstract][Full Text] [Related]
11. Formal policies for flexible EHR security. Blobel B; Pharow P Stud Health Technol Inform; 2006; 121():307-16. PubMed ID: 17095829 [TBL] [Abstract][Full Text] [Related]
12. Some methods for blindfolded record linkage. Churches T; Christen P BMC Med Inform Decis Mak; 2004 Jun; 4():9. PubMed ID: 15222890 [TBL] [Abstract][Full Text] [Related]
13. Security enhancements made to the Joint Commission Extranet site. Jt Comm Perspect; 2004 Sep; 24(9):11, 13. PubMed ID: 15484656 [No Abstract] [Full Text] [Related]
14. Improving service to patients. Chin TL Health Data Manag; 1997 Apr; 5(4):26, 28. PubMed ID: 10166635 [TBL] [Abstract][Full Text] [Related]
16. Using software agents to preserve individual health data confidentiality in micro-scale geographical analyses. Kamel Boulos MN; Cai Q; Padget JA; Rushton G J Biomed Inform; 2006 Apr; 39(2):160-70. PubMed ID: 16098819 [TBL] [Abstract][Full Text] [Related]
17. Data protection and confidentiality. Bakker A Stud Health Technol Inform; 2002; 65():450-64. PubMed ID: 15460243 [No Abstract] [Full Text] [Related]
18. Data privacy considerations in Intensive Care Grids. Luna J; Dikaiakos MD; Kyprianou T; Bilas A; Marazakis M Stud Health Technol Inform; 2008; 138():178-87. PubMed ID: 18560120 [TBL] [Abstract][Full Text] [Related]
19. Anti-malware software and medical devices. Health Devices; 2010 Oct; 39(10):360-5. PubMed ID: 21306047 [TBL] [Abstract][Full Text] [Related]
20. RESHEN, a best practice approach for secure healthcare networks in Europe. Georgoulas A; Bourka A; Kaliontzoglou A; Polemi N; Koutsouris D Stud Health Technol Inform; 2003; 96():51-9. PubMed ID: 15061524 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]