These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

226 related articles for article (PubMed ID: 8591295)

  • 1. Implementing network security guidelines in health care information systems.
    Patel A; Kantzavelou I
    Medinfo; 1995; 8 Pt 1():671-4. PubMed ID: 8591295
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Issues of security and network security in Health Care Information Systems.
    Patel A; Kantzavelou I
    Stud Health Technol Inform; 1996; 27():216-23. PubMed ID: 10163736
    [TBL] [Abstract][Full Text] [Related]  

  • 3. The SEISMED guidelines for host systems security.
    Furnell SM; Sanders PW
    Stud Health Technol Inform; 1996; 27():150-5. PubMed ID: 10163730
    [TBL] [Abstract][Full Text] [Related]  

  • 4. High level security policies for Healthcare Information Systems.
    Katsikas S; Kokolakis S
    Stud Health Technol Inform; 2003; 96():98-104. PubMed ID: 15061530
    [TBL] [Abstract][Full Text] [Related]  

  • 5. How to achieve secure environments for information systems in medicine.
    Barber B; Bleumer G; Davey J; Louwerse K
    Medinfo; 1995; 8 Pt 1():635-9. PubMed ID: 8591286
    [TBL] [Abstract][Full Text] [Related]  

  • 6. The implementation of security in health care information systems: closing the gap between theory and practice.
    Flikkenschild E; Louwerse K
    Medinfo; 1995; 8 Pt 1():648-51. PubMed ID: 8591289
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Information technology security.
    Elliott AT
    Nucl Med Commun; 2003 Dec; 24(12):1205. PubMed ID: 14627845
    [No Abstract]   [Full Text] [Related]  

  • 8. Information systems in an integrated delivery systems environment.
    Gallitano DJ
    Healthc Inf Manage; 1995; 9(4):17-22. PubMed ID: 10155796
    [No Abstract]   [Full Text] [Related]  

  • 9. The AIM SEISMED guidelines for system development and design.
    van Dorp HD; Dubbeldam JF
    Int J Biomed Comput; 1994 Feb; 35 Suppl():179-86. PubMed ID: 8188412
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Security management in the healthcare environment.
    Furnell SM; Sanders PW
    Medinfo; 1995; 8 Pt 1():675-8. PubMed ID: 8591296
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Security threats and solutions in distributed, interoperable health information systems using middleware.
    Blobel B; Holena M
    Stud Health Technol Inform; 1997; 45():66-73. PubMed ID: 10175374
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Development of security guidelines for existing healthcare systems.
    Furnell SM; Sanders PW; Warren MJ
    Med Inform (Lond); 1995; 20(2):139-48. PubMed ID: 8569307
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Security Audit Center--a suggested model for effective audit strategies in health care informatics.
    Hayam A
    Int J Biomed Comput; 1994 Feb; 35 Suppl():115-27. PubMed ID: 8188404
    [TBL] [Abstract][Full Text] [Related]  

  • 14. The SEISMED High Level Security Policy for Health Care.
    Katsikas SK
    Stud Health Technol Inform; 1996; 27():125-30. PubMed ID: 10163727
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Medical network security and viruses.
    Fernandez Del Val C
    Stud Health Technol Inform; 1991; 1():271-84. PubMed ID: 10164072
    [TBL] [Abstract][Full Text] [Related]  

  • 16. High level security policies for health: from theory to practice.
    Defteraios S; Lambrinoudakis C; Gritzalis D
    Stud Health Technol Inform; 2004; 103():416-23. PubMed ID: 15747949
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Security standards for medical information systems.
    Humphreys T
    Stud Health Technol Inform; 1996; 27():131-44. PubMed ID: 10163728
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Security policy development for Healthcare Information Systems.
    Gritzalis D; Kokolakis S
    Stud Health Technol Inform; 2003; 96():105-10. PubMed ID: 15061531
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A tale of three cities--where RHIOS meet the NHIN.
    DeBor G; Diamond C; Grodecki D; Halamka J; Overhage JM; Shirky C
    J Healthc Inf Manag; 2006; 20(3):63-70. PubMed ID: 16903663
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Telemedicine and security. Confidentiality, integrity, and availability: a Canadian perspective.
    Jennett P; Watanabe M; Igras E; Premkumar K; Hall W
    Stud Health Technol Inform; 1996; 29():286-98. PubMed ID: 10163762
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 12.