BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

289 related articles for article (PubMed ID: 16098819)

  • 1. Using software agents to preserve individual health data confidentiality in micro-scale geographical analyses.
    Kamel Boulos MN; Cai Q; Padget JA; Rushton G
    J Biomed Inform; 2006 Apr; 39(2):160-70. PubMed ID: 16098819
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Remote access methods for exploratory data analysis and statistical modelling: Privacy-Preserving Analytics.
    Sparks R; Carter C; Donnelly JB; O'Keefe CM; Duncan J; Keighley T; McAullay D
    Comput Methods Programs Biomed; 2008 Sep; 91(3):208-22. PubMed ID: 18495290
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Enhancing privacy and authorization control scalability in the grid through ontologies.
    Blanquer I; Hernández V; Segrelles D; Torres E
    IEEE Trans Inf Technol Biomed; 2009 Jan; 13(1):16-24. PubMed ID: 19129020
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A computational model to protect patient data from location-based re-identification.
    Malin B
    Artif Intell Med; 2007 Jul; 40(3):223-39. PubMed ID: 17544262
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Telecardiology for effective healthcare services.
    Saxena SC; Kumar V; Giri VK
    J Med Eng Technol; 2003; 27(4):149-59. PubMed ID: 12851059
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Securing electronic health records without impeding the flow of information.
    Agrawal R; Johnson C
    Int J Med Inform; 2007; 76(5-6):471-9. PubMed ID: 17204451
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Security of medical image databases.
    Tzelepi S; Pangalos G; Khair M
    Stud Health Technol Inform; 1997; 43 Pt B():470-4. PubMed ID: 10179709
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Utilizing SELinux to mandate ultra-secure access control of medical records.
    Croll PR; Henricksen M; Caelli B; Liu V
    Stud Health Technol Inform; 2007; 129(Pt 1):498-502. PubMed ID: 17911767
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Comparing approaches for advanced e-health security infrastructures.
    Blobel B
    Int J Med Inform; 2007; 76(5-6):454-9. PubMed ID: 17074532
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Three computational systems for disclosing medical data in the year 1999.
    Sweeney L
    Stud Health Technol Inform; 1998; 52 Pt 2():1124-9. PubMed ID: 10384634
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Patient confidentiality in the research use of clinical medical databases.
    Krishna R; Kelleher K; Stahlberg E
    Am J Public Health; 2007 Apr; 97(4):654-8. PubMed ID: 17329644
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Security of medical multimedia.
    Tzelepi S; Pangalos G; Nikolacopoulou G
    Med Inform Internet Med; 2002 Sep; 27(3):169-84. PubMed ID: 12507263
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Phynx: an open source software solution supporting data management and web-based patient-level data review for drug safety studies in the general practice research database and other health care databases.
    Egbring M; Kullak-Ublick GA; Russmann S
    Pharmacoepidemiol Drug Saf; 2010 Jan; 19(1):38-44. PubMed ID: 19777533
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Access control mechanisms for distributed healthcare environments.
    Sergl-Pommerening M
    Stud Health Technol Inform; 2004; 105():210-21. PubMed ID: 15718610
    [TBL] [Abstract][Full Text] [Related]  

  • 15. [Routine data from general practitioner's software systems - Export, analysis and preparation for research].
    Kersting M; Gierschmann A; Hauswaldt J; H-Pradier E
    Gesundheitswesen; 2010 Jun; 72(6):323-31. PubMed ID: 20491004
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Formal policies for flexible EHR security.
    Blobel B; Pharow P
    Stud Health Technol Inform; 2006; 121():307-16. PubMed ID: 17095829
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Authentication and authorisation prototype on the mu grid for medical data management.
    Seitz L; Montagnat J; Pierson JM; Oriol D; Lingrand D
    Stud Health Technol Inform; 2005; 112():222-33. PubMed ID: 15923731
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Investigating risk exposure in e-health systems.
    Croll PR; Croll J
    Int J Med Inform; 2007; 76(5-6):460-5. PubMed ID: 17126069
    [TBL] [Abstract][Full Text] [Related]  

  • 19. The challenge for security and privacy services in distributed health settings.
    Katsikas S; Lopez J; Pernul G
    Stud Health Technol Inform; 2008; 134():113-25. PubMed ID: 18376039
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Designing web services in health information systems: from process to application level.
    Mykkänen J; Riekkinen A; Sormunen M; Karhunen H; Laitinen P
    Int J Med Inform; 2007; 76(2-3):89-95. PubMed ID: 17118700
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 15.