These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

104 related articles for article (PubMed ID: 1482882)

  • 1. Development of a model of information security requirements for enterprise-wide medical information systems.
    Orr GA; Brantley BA
    Proc Annu Symp Comput Appl Med Care; 1992; ():287-91. PubMed ID: 1482882
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Utilizing SELinux to mandate ultra-secure access control of medical records.
    Croll PR; Henricksen M; Caelli B; Liu V
    Stud Health Technol Inform; 2007; 129(Pt 1):498-502. PubMed ID: 17911767
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Meeting EHR security requirements: SeAAS approach.
    Katt B; Trojer T; Breu R; Schabetsberger T; Wozak F
    Stud Health Technol Inform; 2010; 155():85-91. PubMed ID: 20543314
    [TBL] [Abstract][Full Text] [Related]  

  • 4. The development of a data security model for the Collaborative Social and Medical Services System.
    Dargahi R; Classen DW; Bobroff RB; Petermann CA; Moreau DR; Beck JR; Buffone GJ
    Proc Annu Symp Comput Appl Med Care; 1994; ():349-53. PubMed ID: 7949948
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Integrating the lightweight authentication protocol (LAP) with access control mechanisms in wireless health care information systems.
    Chousiadis C; Georgiadis CK; Pangalos G
    Stud Health Technol Inform; 2002; 90():697-701. PubMed ID: 15460782
    [TBL] [Abstract][Full Text] [Related]  

  • 6. The evolution of Health Information Systems, security in practice and open issues.
    Bakker AR
    Stud Health Technol Inform; 2003; 96():15-20. PubMed ID: 15061520
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Enhancing medical database security.
    Pangalos G; Khair M; Bozios L
    J Med Syst; 1994 Aug; 18(4):159-71. PubMed ID: 7829977
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Security Audit Center--a suggested model for effective audit strategies in health care informatics.
    Hayam A
    Int J Biomed Comput; 1994 Feb; 35 Suppl():115-27. PubMed ID: 8188404
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Implementing context and team based access control in healthcare intranets.
    Georgiadis CK; Mavridis IK; Nikolakopoulou G; Pangalos GI
    Med Inform Internet Med; 2002 Sep; 27(3):185-201. PubMed ID: 12507264
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Implementing security in computer based patient records clinical experiences.
    Iversen KR; Heimly V; Lundgren TI
    Medinfo; 1995; 8 Pt 1():657-60. PubMed ID: 8591292
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A security mediator for health care information.
    Wiederhold G; Bilello M; Sarathy V; Qian X
    Proc AMIA Annu Fall Symp; 1996; ():120-4. PubMed ID: 8947640
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Security requirements in EHR systems and archives.
    Ruotsalainen P
    Stud Health Technol Inform; 2004; 103():453-8. PubMed ID: 15747955
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Use of the ISO/IEC 17799 framework in healthcare information security management.
    Posthumus L
    Stud Health Technol Inform; 2004; 103():447-52. PubMed ID: 15747954
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Dealing with information accessibility and security.
    Lafrance S
    Clin Perform Qual Health Care; 1997; 5(2):86-9. PubMed ID: 10167218
    [TBL] [Abstract][Full Text] [Related]  

  • 15. The AIM SEISMED guidelines for system development and design.
    van Dorp HD; Dubbeldam JF
    Int J Biomed Comput; 1994 Feb; 35 Suppl():179-86. PubMed ID: 8188412
    [TBL] [Abstract][Full Text] [Related]  

  • 16. An integrated secure design of a medical database system.
    Pangalos G; Khair M; Bozios L
    Medinfo; 1995; 8 Pt 1():666-70. PubMed ID: 8591294
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Application of a multilevel access model in the development of a security infrastructure for a clinical information system.
    Henkind SJ; Orlowski JM; Skarulis PC
    Proc Annu Symp Comput Appl Med Care; 1993; ():64-8. PubMed ID: 8130553
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Access control based on attribute certificates for medical intranet applications.
    Mavridis I; Georgiadis C; Pangalos G; Khair M
    J Med Internet Res; 2001; 3(1):E9. PubMed ID: 11720951
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Materials management information systems.
    Health Devices; 1996; 25(2-3):48-100. PubMed ID: 8655344
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Access control administration in healthcare applications.
    Andreas MK; Ioannis MK; George PI
    Stud Health Technol Inform; 2002; 90():346-50. PubMed ID: 15460715
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.