116 related articles for article (PubMed ID: 27577361)
1. Evaluation of Secure Computation in a Distributed Healthcare Setting.
Kimura E; Hamada K; Kikuchi R; Chida K; Okamoto K; Manabe S; Kuroda T; Matsumura Y; Takeda T; Mihara N
Stud Health Technol Inform; 2016; 228():152-6. PubMed ID: 27577361
[TBL] [Abstract][Full Text] [Related]
2. Achieving Efficient and Privacy-Preserving k-NN Query for Outsourced eHealthcare Data.
Zheng Y; Lu R; Shao J
J Med Syst; 2019 Mar; 43(5):123. PubMed ID: 30915578
[TBL] [Abstract][Full Text] [Related]
3. The Effectiveness of Health Care Information Technologies: Evaluation of Trust, Security Beliefs, and Privacy as Determinants of Health Care Outcomes.
Kisekka V; Giboney JS
J Med Internet Res; 2018 Apr; 20(4):e107. PubMed ID: 29643052
[TBL] [Abstract][Full Text] [Related]
4. Security and Privacy in a DACS.
Delgado J; Llorente S; Pàmies M; Vilalta J
Stud Health Technol Inform; 2016; 228():122-6. PubMed ID: 27577355
[TBL] [Abstract][Full Text] [Related]
5. Design and implementation of an informed consent process for a standardized health information exchange solution on the example of the lower saxony bank of health.
Schwartze J; Haarbrandt B; Rochon M; Wagner M; Haux R; Kleinschmidt T; Plischke M; Seidel C
Stud Health Technol Inform; 2013; 192():318-22. PubMed ID: 23920568
[TBL] [Abstract][Full Text] [Related]
6. Medical Data Management on Blockchain with Privacy.
Tian H; He J; Ding Y
J Med Syst; 2019 Jan; 43(2):26. PubMed ID: 30603816
[TBL] [Abstract][Full Text] [Related]
7. The Effects of Public Concern for Information Privacy on the Adoption of Health Information Exchanges (HIEs) by Healthcare Entities.
Esmaeilzadeh P
Health Commun; 2019 Sep; 34(10):1202-1211. PubMed ID: 29737872
[TBL] [Abstract][Full Text] [Related]
8. Advanced Techniques for Deploying Reliable and Efficient Access Control: Application to E-healthcare.
Jaïdi F; Labbene-Ayachi F; Bouhoula A
J Med Syst; 2016 Dec; 40(12):262. PubMed ID: 27722980
[TBL] [Abstract][Full Text] [Related]
9. Some methods for blindfolded record linkage.
Churches T; Christen P
BMC Med Inform Decis Mak; 2004 Jun; 4():9. PubMed ID: 15222890
[TBL] [Abstract][Full Text] [Related]
10. Providing secure mAccess to medical information.
Belsis MA; Dwivedi AN; Gritzalis S; Bali RK;
Int J Electron Healthc; 2007; 3(1):51-71. PubMed ID: 18048261
[TBL] [Abstract][Full Text] [Related]
11. Data breach locations, types, and associated characteristics among US hospitals.
Gabriel MH; Noblin A; Rutherford A; Walden A; Cortelyou-Ward K
Am J Manag Care; 2018 Feb; 24(2):78-84. PubMed ID: 29461854
[TBL] [Abstract][Full Text] [Related]
12. The challenge for security and privacy services in distributed health settings.
Katsikas S; Lopez J; Pernul G
Stud Health Technol Inform; 2008; 134():113-25. PubMed ID: 18376039
[TBL] [Abstract][Full Text] [Related]
13. Guide to good practices to ensure privacy protection in secondary use of medical records.
Riou C; Fresson J; Serre JL; Avillach P; Leneveut L; Quantin C;
Rev Epidemiol Sante Publique; 2014 Jun; 62(3):207-14. PubMed ID: 24889912
[No Abstract] [Full Text] [Related]
14. Meeting the security requirements of electronic medical records in the ERA of high-speed computing.
Alanazi HO; Zaidan AA; Zaidan BB; Kiah ML; Al-Bakri SH
J Med Syst; 2015 Jan; 39(1):165. PubMed ID: 25481568
[TBL] [Abstract][Full Text] [Related]
15. Secure and scalable deduplication of horizontally partitioned health data for privacy-preserving distributed statistical computation.
Yigzaw KY; Michalas A; Bellika JG
BMC Med Inform Decis Mak; 2017 Jan; 17(1):1. PubMed ID: 28049465
[TBL] [Abstract][Full Text] [Related]
16. Privacy in confidential administrative micro data: implementing statistical disclosure control in a secure computing environment.
Hochfellner D; Müller D; Schmucker A
J Empir Res Hum Res Ethics; 2014 Dec; 9(5):8-15. PubMed ID: 25747686
[TBL] [Abstract][Full Text] [Related]
17. How secure is the Internet for healthcare applications?
Campbell LA
Radiol Manage; 1996; 18(1):28-32. PubMed ID: 10154332
[TBL] [Abstract][Full Text] [Related]
18. [Application of password manager software in health care].
Ködmön J
Orv Hetil; 2016 Dec; 157(52):2066-2073. PubMed ID: 28019111
[TBL] [Abstract][Full Text] [Related]
19. Distributed clinical data sharing via dynamic access-control policy transformation.
Rezaeibagha F; Mu Y
Int J Med Inform; 2016 May; 89():25-31. PubMed ID: 26980356
[TBL] [Abstract][Full Text] [Related]
20. A Secure Multi-Party Computation Protocol for Time-To-Event Analyses.
Vogelsang L; Lehne M; Schoppmann P; Prasser F; Thun S; Scheuermann B; Schepers J
Stud Health Technol Inform; 2020 Jun; 270():8-12. PubMed ID: 32570336
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]