These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

80 related articles for article (PubMed ID: 7949948)

  • 41. Modelling privilege management and access control.
    Blobel B; Nordberg R; Davis JM; Pharow P
    Int J Med Inform; 2006 Aug; 75(8):597-623. PubMed ID: 16199198
    [TBL] [Abstract][Full Text] [Related]  

  • 42. On the support of flexible patient privacy policies in social-medical discovery.
    Roitman H; Yogev S; Tsimerman Y; Peres Y
    Stud Health Technol Inform; 2012; 180():813-7. PubMed ID: 22874305
    [TBL] [Abstract][Full Text] [Related]  

  • 43. Design and implementation of an audit trail in compliance with US regulations.
    Jiang K; Cao X
    Clin Trials; 2011 Oct; 8(5):624-33. PubMed ID: 21900341
    [TBL] [Abstract][Full Text] [Related]  

  • 44. Enhancing privacy and authorization control scalability in the grid through ontologies.
    Blanquer I; Hernández V; Segrelles D; Torres E
    IEEE Trans Inf Technol Biomed; 2009 Jan; 13(1):16-24. PubMed ID: 19129020
    [TBL] [Abstract][Full Text] [Related]  

  • 45. Implementing data privacy and security (the Slovenian experience).
    Markota M; Raic G
    Stud Health Technol Inform; 1997; 43 Pt B():879-83. PubMed ID: 10179794
    [TBL] [Abstract][Full Text] [Related]  

  • 46. Access control based on attribute certificates for medical intranet applications.
    Mavridis I; Georgiadis C; Pangalos G; Khair M
    J Med Internet Res; 2001; 3(1):E9. PubMed ID: 11720951
    [TBL] [Abstract][Full Text] [Related]  

  • 47. Privacy and security in Pennsylvania: ensuring privacy and security of health information exchange in Pennsylvania.
    Marshall GF; Gillespie W; Fox SJ
    J Healthc Inf Manag; 2009; 23(2):38-44. PubMed ID: 19382739
    [TBL] [Abstract][Full Text] [Related]  

  • 48. Implementing network security guidelines in health care information systems.
    Patel A; Kantzavelou I
    Medinfo; 1995; 8 Pt 1():671-4. PubMed ID: 8591295
    [TBL] [Abstract][Full Text] [Related]  

  • 49. Web-based GeneChip analysis system for large-scale collaborative projects.
    Dai M; Wang P; Jakupovic E; Watson SJ; Meng F
    Bioinformatics; 2007 Aug; 23(16):2185-7. PubMed ID: 17586830
    [TBL] [Abstract][Full Text] [Related]  

  • 50. Access and privacy rights using web security standards to increase patient empowerment.
    Falcão-Reis F; Costa-Pereira A; Correia ME
    Stud Health Technol Inform; 2008; 137():275-85. PubMed ID: 18560089
    [TBL] [Abstract][Full Text] [Related]  

  • 51. Issues of security and network security in Health Care Information Systems.
    Patel A; Kantzavelou I
    Stud Health Technol Inform; 1996; 27():216-23. PubMed ID: 10163736
    [TBL] [Abstract][Full Text] [Related]  

  • 52. Implementing security on a prototype hospital database.
    Khair M; Pangalos G; Andria F; Bozios L
    Stud Health Technol Inform; 1997; 43 Pt A():176-80. PubMed ID: 10179532
    [TBL] [Abstract][Full Text] [Related]  

  • 53. Data protection issues in database management and expert systems.
    Cannataci JA
    Stud Health Technol Inform; 1991; 1():161-80. PubMed ID: 10164066
    [No Abstract]   [Full Text] [Related]  

  • 54. Towards human-centric visual access control for clinical data management.
    Fahl S; Harbach M; Smith M
    Stud Health Technol Inform; 2012; 180():756-60. PubMed ID: 22874293
    [TBL] [Abstract][Full Text] [Related]  

  • 55. [A computerized system for the management of letters of authorization for access to sensitive data in a research and teaching hospital].
    Bodina A; Brizzolara A; Vadruccio G; Castaldi S
    Ig Sanita Pubbl; 2012; 68(1):19-28. PubMed ID: 22507990
    [TBL] [Abstract][Full Text] [Related]  

  • 56. [Information security management for remote maintenance service of medical information systems].
    Nozu T
    Nihon Hoshasen Gijutsu Gakkai Zasshi; 2011; 67(3):302-6. PubMed ID: 21471689
    [No Abstract]   [Full Text] [Related]  

  • 57. Utilizing SELinux to mandate ultra-secure access control of medical records.
    Croll PR; Henricksen M; Caelli B; Liu V
    Stud Health Technol Inform; 2007; 129(Pt 1):498-502. PubMed ID: 17911767
    [TBL] [Abstract][Full Text] [Related]  

  • 58. Privilege management infrastructure for virtual organizations in healthcare grids.
    Calvillo J; Román I; Rivas S; Roa LM
    IEEE Trans Inf Technol Biomed; 2011 Mar; 15(2):316-23. PubMed ID: 21216720
    [TBL] [Abstract][Full Text] [Related]  

  • 59. Data security, job security. Attendees at annual AHIMA conference turn attention to legal, staffing issues.
    Conn J
    Mod Healthc; 2007 Oct; 37(41):31. PubMed ID: 17972495
    [No Abstract]   [Full Text] [Related]  

  • 60. Implementing a Web-based clinical information system using EMR middle layer services.
    Kittredge RL; Estey G; Pappas JJ; Barnett GO
    Proc AMIA Annu Fall Symp; 1996; ():628-32. PubMed ID: 8947742
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 4.