BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

164 related articles for article (PubMed ID: 27722980)

  • 1. Advanced Techniques for Deploying Reliable and Efficient Access Control: Application to E-healthcare.
    Jaïdi F; Labbene-Ayachi F; Bouhoula A
    J Med Syst; 2016 Dec; 40(12):262. PubMed ID: 27722980
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A privacy preserving secure and efficient authentication scheme for telecare medical information systems.
    Mishra R; Barnwal AK
    J Med Syst; 2015 May; 39(5):54. PubMed ID: 25750176
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A security framework for nationwide health information exchange based on telehealth strategy.
    Zaidan BB; Haiqi A; Zaidan AA; Abdulnabi M; Kiah ML; Muzamel H
    J Med Syst; 2015 May; 39(5):51. PubMed ID: 25732083
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Distributed clinical data sharing via dynamic access-control policy transformation.
    Rezaeibagha F; Mu Y
    Int J Med Inform; 2016 May; 89():25-31. PubMed ID: 26980356
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Security Attacks and Solutions in Electronic Health (E-health) Systems.
    Zeadally S; Isaac JT; Baig Z
    J Med Syst; 2016 Dec; 40(12):263. PubMed ID: 27730389
    [TBL] [Abstract][Full Text] [Related]  

  • 6. High level security policies for health: from theory to practice.
    Defteraios S; Lambrinoudakis C; Gritzalis D
    Stud Health Technol Inform; 2004; 103():416-23. PubMed ID: 15747949
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Access and privacy rights using web security standards to increase patient empowerment.
    Falcão-Reis F; Costa-Pereira A; Correia ME
    Stud Health Technol Inform; 2008; 137():275-85. PubMed ID: 18560089
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Safeguarding the confidentiality of automated medical information.
    Lawrence LM
    Jt Comm J Qual Improv; 1994 Nov; 20(11):639-46. PubMed ID: 7866496
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Privilege management and access control in Shared Care IS and EHR.
    Blobel B; Nordberg R
    Stud Health Technol Inform; 2003; 95():251-6. PubMed ID: 14663995
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Investigating risk exposure in e-health systems.
    Croll PR; Croll J
    Int J Med Inform; 2007; 76(5-6):460-5. PubMed ID: 17126069
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A Survey of Authentication Schemes in Telecare Medicine Information Systems.
    Aslam MU; Derhab A; Saleem K; Abbas H; Orgun M; Iqbal W; Aslam B
    J Med Syst; 2017 Jan; 41(1):14. PubMed ID: 27900653
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Advanced and secure architectural EHR approaches.
    Blobel B
    Int J Med Inform; 2006; 75(3-4):185-90. PubMed ID: 16112891
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Comparing approaches for advanced e-health security infrastructures.
    Blobel B
    Int J Med Inform; 2007; 76(5-6):454-9. PubMed ID: 17074532
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Security of medical multimedia.
    Tzelepi S; Pangalos G; Nikolacopoulou G
    Med Inform Internet Med; 2002 Sep; 27(3):169-84. PubMed ID: 12507263
    [TBL] [Abstract][Full Text] [Related]  

  • 15. The PRIDEH project: taking up privacy protection services in e-health.
    De Meyer F; Claerhout B; De Moor GJ
    Stud Health Technol Inform; 2002; 93():171-7. PubMed ID: 15058428
    [TBL] [Abstract][Full Text] [Related]  

  • 16. The help of formal models for healthcare security policies.
    Trouessin G; Barber B
    Stud Health Technol Inform; 1997; 43 Pt B():786-90. PubMed ID: 10179775
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Identity-management factors in e-health and telemedicine applications.
    Savastano M; Hovsto A; Pharow P; Blobel B
    J Telemed Telecare; 2008; 14(7):386-8. PubMed ID: 18852323
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Telemedicine and security. Confidentiality, integrity, and availability: a Canadian perspective.
    Jennett P; Watanabe M; Igras E; Premkumar K; Hall W
    Stud Health Technol Inform; 1996; 29():286-98. PubMed ID: 10163762
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data.
    Gope P; Amin R
    J Med Syst; 2016 Nov; 40(11):242. PubMed ID: 27686221
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Privacy, security and access with sensitive health information.
    Croll P
    Stud Health Technol Inform; 2010; 151():167-75. PubMed ID: 20407159
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 9.