These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

188 related articles for article (PubMed ID: 8591296)

  • 1. Security management in the healthcare environment.
    Furnell SM; Sanders PW
    Medinfo; 1995; 8 Pt 1():675-8. PubMed ID: 8591296
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Issues of security and network security in Health Care Information Systems.
    Patel A; Kantzavelou I
    Stud Health Technol Inform; 1996; 27():216-23. PubMed ID: 10163736
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Implementing network security guidelines in health care information systems.
    Patel A; Kantzavelou I
    Medinfo; 1995; 8 Pt 1():671-4. PubMed ID: 8591295
    [TBL] [Abstract][Full Text] [Related]  

  • 4. High level security policies for Healthcare Information Systems.
    Katsikas S; Kokolakis S
    Stud Health Technol Inform; 2003; 96():98-104. PubMed ID: 15061530
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A linkable identity privacy algorithm for HealthGrid.
    Zhang N; Rector A; Buchan I; Shi Q; Kalra D; Rogers J; Goble C; Walker S; Ingram D; Singleton P
    Stud Health Technol Inform; 2005; 112():234-45. PubMed ID: 15923732
    [TBL] [Abstract][Full Text] [Related]  

  • 6. How to achieve secure environments for information systems in medicine.
    Barber B; Bleumer G; Davey J; Louwerse K
    Medinfo; 1995; 8 Pt 1():635-9. PubMed ID: 8591286
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Information systems in an integrated delivery systems environment.
    Gallitano DJ
    Healthc Inf Manage; 1995; 9(4):17-22. PubMed ID: 10155796
    [No Abstract]   [Full Text] [Related]  

  • 8. Draft standard for high level security policies for Healthcare establishments.
    Kokolakis S; Gritzalis D; Katsikas S
    Stud Health Technol Inform; 2002; 69():23-47; discussion 229-37. PubMed ID: 15458162
    [No Abstract]   [Full Text] [Related]  

  • 9. Information technology security.
    Elliott AT
    Nucl Med Commun; 2003 Dec; 24(12):1205. PubMed ID: 14627845
    [No Abstract]   [Full Text] [Related]  

  • 10. Overview on security standards for Healthcare information systems.
    Kokolakis S; Gritzalis D; Katsikas S; Ottes F
    Stud Health Technol Inform; 2002; 69():13-21; discussion 229-37. PubMed ID: 15458161
    [TBL] [Abstract][Full Text] [Related]  

  • 11. The SEISMED guidelines for host systems security.
    Furnell SM; Sanders PW
    Stud Health Technol Inform; 1996; 27():150-5. PubMed ID: 10163730
    [TBL] [Abstract][Full Text] [Related]  

  • 12. The EDITH approach: the management of authorisations and security in healthcare information systems.
    Ferrara FM
    Stud Health Technol Inform; 1996; 27():200-13. PubMed ID: 10163735
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Cyber resilience: a review of critical national infrastructure and cyber security protection measures applied in the UK and USA.
    Harrop W; Matteson A
    J Bus Contin Emer Plan; 2013-2014 Winter; 7(2):149-62. PubMed ID: 24457326
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Security threats and solutions in distributed, interoperable health information systems using middleware.
    Blobel B; Holena M
    Stud Health Technol Inform; 1997; 45():66-73. PubMed ID: 10175374
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Security Audit Center--a suggested model for effective audit strategies in health care informatics.
    Hayam A
    Int J Biomed Comput; 1994 Feb; 35 Suppl():115-27. PubMed ID: 8188404
    [TBL] [Abstract][Full Text] [Related]  

  • 16. High level security policies for health care establishments.
    Katsikas S; Kokolakis S
    Stud Health Technol Inform; 2004; 103():407-15. PubMed ID: 15747948
    [TBL] [Abstract][Full Text] [Related]  

  • 17. How is cyber threat evolving and what do organisations need to consider?
    Borrett M; Carter R; Wespi A
    J Bus Contin Emer Plan; 2013-2014 Winter; 7(2):163-71. PubMed ID: 24457327
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Security of healthcare information systems based on the CORBA middleware.
    Blobel B; Holena M
    Stud Health Technol Inform; 1997; 43 Pt A():10-4. PubMed ID: 10179515
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Impact of enterprisewide data.
    Frey LA; Bloomrosen M
    Top Health Inf Manage; 1995 May; 15(4):31-43. PubMed ID: 10142452
    [TBL] [Abstract][Full Text] [Related]  

  • 20. High level security policies for health: from theory to practice.
    Defteraios S; Lambrinoudakis C; Gritzalis D
    Stud Health Technol Inform; 2004; 103():416-23. PubMed ID: 15747949
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 10.