These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

110 related articles for article (PubMed ID: 24563626)

  • 1. A cooperative model for IS security risk management in distributed environment.
    Feng N; Zheng C
    ScientificWorldJournal; 2014; 2014():167497. PubMed ID: 24563626
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Security Audit Center--a suggested model for effective audit strategies in health care informatics.
    Hayam A
    Int J Biomed Comput; 1994 Feb; 35 Suppl():115-27. PubMed ID: 8188404
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Security threats and solutions in distributed, interoperable health information systems using middleware.
    Blobel B; Holena M
    Stud Health Technol Inform; 1997; 45():66-73. PubMed ID: 10175374
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Security measures required for HIPAA privacy.
    Amatayakul M
    J Healthc Inf Manag; 2000; 14(4):5-12. PubMed ID: 11190262
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Common object request broker architecture (CORBA)-based security services for the virtual radiology environment.
    Martinez R; Cole C; Rozenblit J; Cook JF; Chacko AK
    J Digit Imaging; 2000 May; 13(2 Suppl 1):59-70. PubMed ID: 10847365
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Implementing network security guidelines in health care information systems.
    Patel A; Kantzavelou I
    Medinfo; 1995; 8 Pt 1():671-4. PubMed ID: 8591295
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A real-world information security performance assessment using a multidimensional socio-technical approach.
    Prislan K; Mihelič A; Bernik I
    PLoS One; 2020; 15(9):e0238739. PubMed ID: 32898183
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Issues of security and network security in Health Care Information Systems.
    Patel A; Kantzavelou I
    Stud Health Technol Inform; 1996; 27():216-23. PubMed ID: 10163736
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Design and implementation of secure medical database systems.
    Pangalos GJ
    Med Inform (Lond); 1995; 20(3):265-77. PubMed ID: 8882564
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Development of security guidelines for existing healthcare systems.
    Furnell SM; Sanders PW; Warren MJ
    Med Inform (Lond); 1995; 20(2):139-48. PubMed ID: 8569307
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Practice brief. Securing wireless technology for healthcare.
    Retterer J; Casto BW;
    J AHIMA; 2004 May; 75(5):56A-56D. PubMed ID: 15141589
    [TBL] [Abstract][Full Text] [Related]  

  • 12. A distributed trust evaluation model and its application scenarios for medical sensor networks.
    He D; Chen C; Chan S; Bu J; Vasilakos AV
    IEEE Trans Inf Technol Biomed; 2012 Nov; 16(6):1164-75. PubMed ID: 22623434
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Risk assessment: where security meets compliance.
    Hamilton CR; Ochinko P
    J Healthc Prot Manage; 2008; 24(2):39-48. PubMed ID: 18800658
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Application of a multilevel access model in the development of a security infrastructure for a clinical information system.
    Henkind SJ; Orlowski JM; Skarulis PC
    Proc Annu Symp Comput Appl Med Care; 1993; ():64-8. PubMed ID: 8130553
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Access control administration in healthcare applications.
    Andreas MK; Ioannis MK; George PI
    Stud Health Technol Inform; 2002; 90():346-50. PubMed ID: 15460715
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Challenges of information security incident learning: An industrial case study in a Chinese healthcare organization.
    He Y; Johnson C
    Inform Health Soc Care; 2017 Dec; 42(4):393-408. PubMed ID: 28068150
    [TBL] [Abstract][Full Text] [Related]  

  • 17. [Information security management for remote maintenance service of medical information systems].
    Nozu T
    Nihon Hoshasen Gijutsu Gakkai Zasshi; 2011; 67(3):302-6. PubMed ID: 21471689
    [No Abstract]   [Full Text] [Related]  

  • 18. Modeling risk in distributed healthcare information systems.
    Maglogiannis I; Zafiropoulos E
    Conf Proc IEEE Eng Med Biol Soc; 2006; 2006():5447-50. PubMed ID: 17945902
    [TBL] [Abstract][Full Text] [Related]  

  • 19. How is cyber threat evolving and what do organisations need to consider?
    Borrett M; Carter R; Wespi A
    J Bus Contin Emer Plan; 2013-2014 Winter; 7(2):163-71. PubMed ID: 24457327
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Risk management-based security evaluation model for telemedicine systems.
    Kim DW; Choi JY; Han KH
    BMC Med Inform Decis Mak; 2020 Jun; 20(1):106. PubMed ID: 32522216
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.