BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

477 related articles for article (PubMed ID: 18376039)

  • 1. The challenge for security and privacy services in distributed health settings.
    Katsikas S; Lopez J; Pernul G
    Stud Health Technol Inform; 2008; 134():113-25. PubMed ID: 18376039
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Mobile health requires mobile security: challenges, solutions, and standardization.
    Pharow P; Blobel B
    Stud Health Technol Inform; 2008; 136():697-702. PubMed ID: 18487813
    [TBL] [Abstract][Full Text] [Related]  

  • 3. PKI-based secure mobile access to electronic health services and data.
    Kambourakis G; Maglogiannis I; Rouskas A
    Technol Health Care; 2005; 13(6):511-26. PubMed ID: 16340094
    [TBL] [Abstract][Full Text] [Related]  

  • 4. High level security policies for health: from theory to practice.
    Defteraios S; Lambrinoudakis C; Gritzalis D
    Stud Health Technol Inform; 2004; 103():416-23. PubMed ID: 15747949
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Standards for confidentiality, privacy, access, and data security.
    Hanken MA
    Top Health Inf Manage; 1996 May; 16(4):44-8. PubMed ID: 10157660
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Dialogue. Privacy protection: paper or computer records? Confidentiality of healthcare records.
    Barrows RC; Clayton PD
    Behav Healthc Tomorrow; 1996 Feb; 5(1):38, 41, 43-4. PubMed ID: 10158447
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Taiwan's perspective on electronic medical records' security and privacy protection: lessons learned from HIPAA.
    Yang CM; Lin HC; Chang P; Jian WS
    Comput Methods Programs Biomed; 2006 Jun; 82(3):277-82. PubMed ID: 16730852
    [TBL] [Abstract][Full Text] [Related]  

  • 8. How secure is the Internet for healthcare applications?
    Campbell LA
    Radiol Manage; 1996; 18(1):28-32. PubMed ID: 10154332
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Security standards for medical information systems.
    Humphreys T
    Stud Health Technol Inform; 1996; 27():131-44. PubMed ID: 10163728
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Identity-management factors in e-health and telemedicine applications.
    Savastano M; Hovsto A; Pharow P; Blobel B
    J Telemed Telecare; 2008; 14(7):386-8. PubMed ID: 18852323
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Formal policies for flexible EHR security.
    Blobel B; Pharow P
    Stud Health Technol Inform; 2006; 121():307-16. PubMed ID: 17095829
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Privacy and security requirements of distributed computer based patient records.
    Moehr JR
    Int J Biomed Comput; 1994 Feb; 35 Suppl():57-64. PubMed ID: 8188423
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Comparing approaches for advanced e-health security infrastructures.
    Blobel B
    Int J Med Inform; 2007; 76(5-6):454-9. PubMed ID: 17074532
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Some methods for blindfolded record linkage.
    Churches T; Christen P
    BMC Med Inform Decis Mak; 2004 Jun; 4():9. PubMed ID: 15222890
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Respiratory care in the computer age.
    Stewart KJ
    Respir Care; 2004 Apr; 49(4):361-4; discussion 364-6. PubMed ID: 15030609
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Access and privacy rights using web security standards to increase patient empowerment.
    Falcão-Reis F; Costa-Pereira A; Correia ME
    Stud Health Technol Inform; 2008; 137():275-85. PubMed ID: 18560089
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Privacy and security for electronic health records.
    Sharpe VA
    Hastings Cent Rep; 2005; 35(6):49. PubMed ID: 16396204
    [No Abstract]   [Full Text] [Related]  

  • 18. Issues of security and network security in Health Care Information Systems.
    Patel A; Kantzavelou I
    Stud Health Technol Inform; 1996; 27():216-23. PubMed ID: 10163736
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Privilege management and access control in Shared Care IS and EHR.
    Blobel B; Nordberg R
    Stud Health Technol Inform; 2003; 95():251-6. PubMed ID: 14663995
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Meeting EHR security requirements: SeAAS approach.
    Katt B; Trojer T; Breu R; Schabetsberger T; Wozak F
    Stud Health Technol Inform; 2010; 155():85-91. PubMed ID: 20543314
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 24.