477 related articles for article (PubMed ID: 18376039)
1. The challenge for security and privacy services in distributed health settings.
Katsikas S; Lopez J; Pernul G
Stud Health Technol Inform; 2008; 134():113-25. PubMed ID: 18376039
[TBL] [Abstract][Full Text] [Related]
2. Mobile health requires mobile security: challenges, solutions, and standardization.
Pharow P; Blobel B
Stud Health Technol Inform; 2008; 136():697-702. PubMed ID: 18487813
[TBL] [Abstract][Full Text] [Related]
3. PKI-based secure mobile access to electronic health services and data.
Kambourakis G; Maglogiannis I; Rouskas A
Technol Health Care; 2005; 13(6):511-26. PubMed ID: 16340094
[TBL] [Abstract][Full Text] [Related]
4. High level security policies for health: from theory to practice.
Defteraios S; Lambrinoudakis C; Gritzalis D
Stud Health Technol Inform; 2004; 103():416-23. PubMed ID: 15747949
[TBL] [Abstract][Full Text] [Related]
5. Standards for confidentiality, privacy, access, and data security.
Hanken MA
Top Health Inf Manage; 1996 May; 16(4):44-8. PubMed ID: 10157660
[TBL] [Abstract][Full Text] [Related]
6. Dialogue. Privacy protection: paper or computer records? Confidentiality of healthcare records.
Barrows RC; Clayton PD
Behav Healthc Tomorrow; 1996 Feb; 5(1):38, 41, 43-4. PubMed ID: 10158447
[TBL] [Abstract][Full Text] [Related]
7. Taiwan's perspective on electronic medical records' security and privacy protection: lessons learned from HIPAA.
Yang CM; Lin HC; Chang P; Jian WS
Comput Methods Programs Biomed; 2006 Jun; 82(3):277-82. PubMed ID: 16730852
[TBL] [Abstract][Full Text] [Related]
8. How secure is the Internet for healthcare applications?
Campbell LA
Radiol Manage; 1996; 18(1):28-32. PubMed ID: 10154332
[TBL] [Abstract][Full Text] [Related]
9. Security standards for medical information systems.
Humphreys T
Stud Health Technol Inform; 1996; 27():131-44. PubMed ID: 10163728
[TBL] [Abstract][Full Text] [Related]
10. Identity-management factors in e-health and telemedicine applications.
Savastano M; Hovsto A; Pharow P; Blobel B
J Telemed Telecare; 2008; 14(7):386-8. PubMed ID: 18852323
[TBL] [Abstract][Full Text] [Related]
11. Formal policies for flexible EHR security.
Blobel B; Pharow P
Stud Health Technol Inform; 2006; 121():307-16. PubMed ID: 17095829
[TBL] [Abstract][Full Text] [Related]
12. Privacy and security requirements of distributed computer based patient records.
Moehr JR
Int J Biomed Comput; 1994 Feb; 35 Suppl():57-64. PubMed ID: 8188423
[TBL] [Abstract][Full Text] [Related]
13. Comparing approaches for advanced e-health security infrastructures.
Blobel B
Int J Med Inform; 2007; 76(5-6):454-9. PubMed ID: 17074532
[TBL] [Abstract][Full Text] [Related]
14. Some methods for blindfolded record linkage.
Churches T; Christen P
BMC Med Inform Decis Mak; 2004 Jun; 4():9. PubMed ID: 15222890
[TBL] [Abstract][Full Text] [Related]
15. Respiratory care in the computer age.
Stewart KJ
Respir Care; 2004 Apr; 49(4):361-4; discussion 364-6. PubMed ID: 15030609
[TBL] [Abstract][Full Text] [Related]
16. Access and privacy rights using web security standards to increase patient empowerment.
Falcão-Reis F; Costa-Pereira A; Correia ME
Stud Health Technol Inform; 2008; 137():275-85. PubMed ID: 18560089
[TBL] [Abstract][Full Text] [Related]
17. Privacy and security for electronic health records.
Sharpe VA
Hastings Cent Rep; 2005; 35(6):49. PubMed ID: 16396204
[No Abstract] [Full Text] [Related]
18. Issues of security and network security in Health Care Information Systems.
Patel A; Kantzavelou I
Stud Health Technol Inform; 1996; 27():216-23. PubMed ID: 10163736
[TBL] [Abstract][Full Text] [Related]
19. Privilege management and access control in Shared Care IS and EHR.
Blobel B; Nordberg R
Stud Health Technol Inform; 2003; 95():251-6. PubMed ID: 14663995
[TBL] [Abstract][Full Text] [Related]
20. Meeting EHR security requirements: SeAAS approach.
Katt B; Trojer T; Breu R; Schabetsberger T; Wozak F
Stud Health Technol Inform; 2010; 155():85-91. PubMed ID: 20543314
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]