These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

220 related articles for article (PubMed ID: 14663982)

  • 1. Secure communication and management of clinical and genomic data: the use of pseudonymisation as privacy enhancing technique.
    Claerhout B; De Moor GJ; De Meyer F
    Stud Health Technol Inform; 2003; 95():170-5. PubMed ID: 14663982
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Privacy protection for clinical and genomic data. The use of privacy-enhancing techniques in medicine.
    Claerhout B; DeMoor GJ
    Int J Med Inform; 2005 Mar; 74(2-4):257-65. PubMed ID: 15694632
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Privacy enhancing techniques - the key to secure communication and management of clinical and genomic data.
    De Moor GJ; Claerhout B; De Meyer F
    Methods Inf Med; 2003; 42(2):148-53. PubMed ID: 12743651
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Public key infrastructures for health.
    Pharow P; Blobel B
    Stud Health Technol Inform; 2003; 96():111-7. PubMed ID: 15061532
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Privacy enhancing techniques in E-health: an overview.
    De Moor GJ; Claerhoutb B
    Stud Health Technol Inform; 2004; 106():75-81. PubMed ID: 15853238
    [TBL] [Abstract][Full Text] [Related]  

  • 6. The PRIDEH project: taking up privacy protection services in e-health.
    De Meyer F; Claerhout B; De Moor GJ
    Stud Health Technol Inform; 2002; 93():171-7. PubMed ID: 15058428
    [TBL] [Abstract][Full Text] [Related]  

  • 7. The PRIDEH project: taking up privacy protection services in eHealth.
    De Meyer F; De Moor GJ; Claerhout B
    Stud Health Technol Inform; 2003; 96():173-9. PubMed ID: 15061541
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Enhancing privacy and authorization control scalability in the grid through ontologies.
    Blanquer I; Hernández V; Segrelles D; Torres E
    IEEE Trans Inf Technol Biomed; 2009 Jan; 13(1):16-24. PubMed ID: 19129020
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Strategies for health data exchange for secondary, cross-institutional clinical research.
    Elger BS; Iavindrasana J; Lo Iacono L; Müller H; Roduit N; Summers P; Wright J
    Comput Methods Programs Biomed; 2010 Sep; 99(3):230-51. PubMed ID: 20089327
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Privacy and security in teleradiology.
    Ruotsalainen P
    Eur J Radiol; 2010 Jan; 73(1):31-5. PubMed ID: 19914020
    [TBL] [Abstract][Full Text] [Related]  

  • 11. How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems.
    Malin B; Sweeney L
    J Biomed Inform; 2004 Jun; 37(3):179-92. PubMed ID: 15196482
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Privacy: report on the privacy policies and practices of health web sites.
    Goldman J; Hudson Z; Smith R
    Prof Ethics Rep; 2000; 13(1):1, 7-8. PubMed ID: 11817415
    [No Abstract]   [Full Text] [Related]  

  • 13. Knowledge management for the protection of information in electronic medical records.
    Lea N; Hailes S; Austin T; Kalra D
    Stud Health Technol Inform; 2008; 136():685-90. PubMed ID: 18487811
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Privacy aware access controls for medical data disclosure on European healthgrids.
    Rahmouni HB; Solomonides T; Mont MC; Shiu S
    Stud Health Technol Inform; 2010; 159():14-27. PubMed ID: 20543423
    [TBL] [Abstract][Full Text] [Related]  

  • 15. The governance of human genetic research databases in mental health research.
    Mc Fleming J
    Int J Law Psychiatry; 2007; 30(3):182-90. PubMed ID: 17449098
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Privacy Protection through pseudonymisation in eHealth.
    De Meyer F; De Moor G; Reed-Fourquet L
    Stud Health Technol Inform; 2008; 141():111-8. PubMed ID: 18953131
    [TBL] [Abstract][Full Text] [Related]  

  • 17. [A security protocol for the exchange of personal medical data via Internet: monitoring treatment and drug effects].
    Viviani R; Fischer J; Spitzer M; Freudenmann RW
    Gesundheitswesen; 2004 Apr; 66(4):232-9. PubMed ID: 15100939
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Secure exchange of medical data: requirements and solutions.
    Spahni S; Weber P
    Stud Health Technol Inform; 2002; 90():112-7. PubMed ID: 15460671
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A standardised graphic method for describing data privacy frameworks in primary care research using a flexible zone model.
    Kuchinke W; Ohmann C; Verheij RA; van Veen EB; Arvanitis TN; Taweel A; Delaney BC
    Int J Med Inform; 2014 Dec; 83(12):941-57. PubMed ID: 25241154
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Access and privacy rights using web security standards to increase patient empowerment.
    Falcão-Reis F; Costa-Pereira A; Correia ME
    Stud Health Technol Inform; 2008; 137():275-85. PubMed ID: 18560089
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 11.