BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

116 related articles for article (PubMed ID: 27577361)

  • 1. Evaluation of Secure Computation in a Distributed Healthcare Setting.
    Kimura E; Hamada K; Kikuchi R; Chida K; Okamoto K; Manabe S; Kuroda T; Matsumura Y; Takeda T; Mihara N
    Stud Health Technol Inform; 2016; 228():152-6. PubMed ID: 27577361
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Achieving Efficient and Privacy-Preserving k-NN Query for Outsourced eHealthcare Data.
    Zheng Y; Lu R; Shao J
    J Med Syst; 2019 Mar; 43(5):123. PubMed ID: 30915578
    [TBL] [Abstract][Full Text] [Related]  

  • 3. The Effectiveness of Health Care Information Technologies: Evaluation of Trust, Security Beliefs, and Privacy as Determinants of Health Care Outcomes.
    Kisekka V; Giboney JS
    J Med Internet Res; 2018 Apr; 20(4):e107. PubMed ID: 29643052
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Security and Privacy in a DACS.
    Delgado J; Llorente S; Pàmies M; Vilalta J
    Stud Health Technol Inform; 2016; 228():122-6. PubMed ID: 27577355
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Design and implementation of an informed consent process for a standardized health information exchange solution on the example of the lower saxony bank of health.
    Schwartze J; Haarbrandt B; Rochon M; Wagner M; Haux R; Kleinschmidt T; Plischke M; Seidel C
    Stud Health Technol Inform; 2013; 192():318-22. PubMed ID: 23920568
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Medical Data Management on Blockchain with Privacy.
    Tian H; He J; Ding Y
    J Med Syst; 2019 Jan; 43(2):26. PubMed ID: 30603816
    [TBL] [Abstract][Full Text] [Related]  

  • 7. The Effects of Public Concern for Information Privacy on the Adoption of Health Information Exchanges (HIEs) by Healthcare Entities.
    Esmaeilzadeh P
    Health Commun; 2019 Sep; 34(10):1202-1211. PubMed ID: 29737872
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Advanced Techniques for Deploying Reliable and Efficient Access Control: Application to E-healthcare.
    Jaïdi F; Labbene-Ayachi F; Bouhoula A
    J Med Syst; 2016 Dec; 40(12):262. PubMed ID: 27722980
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Some methods for blindfolded record linkage.
    Churches T; Christen P
    BMC Med Inform Decis Mak; 2004 Jun; 4():9. PubMed ID: 15222890
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Providing secure mAccess to medical information.
    Belsis MA; Dwivedi AN; Gritzalis S; Bali RK;
    Int J Electron Healthc; 2007; 3(1):51-71. PubMed ID: 18048261
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Data breach locations, types, and associated characteristics among US hospitals.
    Gabriel MH; Noblin A; Rutherford A; Walden A; Cortelyou-Ward K
    Am J Manag Care; 2018 Feb; 24(2):78-84. PubMed ID: 29461854
    [TBL] [Abstract][Full Text] [Related]  

  • 12. The challenge for security and privacy services in distributed health settings.
    Katsikas S; Lopez J; Pernul G
    Stud Health Technol Inform; 2008; 134():113-25. PubMed ID: 18376039
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Guide to good practices to ensure privacy protection in secondary use of medical records.
    Riou C; Fresson J; Serre JL; Avillach P; Leneveut L; Quantin C;
    Rev Epidemiol Sante Publique; 2014 Jun; 62(3):207-14. PubMed ID: 24889912
    [No Abstract]   [Full Text] [Related]  

  • 14. Meeting the security requirements of electronic medical records in the ERA of high-speed computing.
    Alanazi HO; Zaidan AA; Zaidan BB; Kiah ML; Al-Bakri SH
    J Med Syst; 2015 Jan; 39(1):165. PubMed ID: 25481568
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Secure and scalable deduplication of horizontally partitioned health data for privacy-preserving distributed statistical computation.
    Yigzaw KY; Michalas A; Bellika JG
    BMC Med Inform Decis Mak; 2017 Jan; 17(1):1. PubMed ID: 28049465
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Privacy in confidential administrative micro data: implementing statistical disclosure control in a secure computing environment.
    Hochfellner D; Müller D; Schmucker A
    J Empir Res Hum Res Ethics; 2014 Dec; 9(5):8-15. PubMed ID: 25747686
    [TBL] [Abstract][Full Text] [Related]  

  • 17. How secure is the Internet for healthcare applications?
    Campbell LA
    Radiol Manage; 1996; 18(1):28-32. PubMed ID: 10154332
    [TBL] [Abstract][Full Text] [Related]  

  • 18. [Application of password manager software in health care].
    Ködmön J
    Orv Hetil; 2016 Dec; 157(52):2066-2073. PubMed ID: 28019111
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Distributed clinical data sharing via dynamic access-control policy transformation.
    Rezaeibagha F; Mu Y
    Int J Med Inform; 2016 May; 89():25-31. PubMed ID: 26980356
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A Secure Multi-Party Computation Protocol for Time-To-Event Analyses.
    Vogelsang L; Lehne M; Schoppmann P; Prasser F; Thun S; Scheuermann B; Schepers J
    Stud Health Technol Inform; 2020 Jun; 270():8-12. PubMed ID: 32570336
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.