These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

211 related articles for article (PubMed ID: 9611868)

  • 1. Securing the transmission and storage of medical information.
    Sardinas JL; Muldoon JD
    Comput Nurs; 1998; 16(3):162-8; quiz 169-70. PubMed ID: 9611868
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Business process design. Securing computerized health information files.
    Barthel CW; Kalina CM; Fitko J
    AAOHN J; 1998 Dec; 46(12):581-6; quiz 587-8. PubMed ID: 10025251
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Smart cards--a security tool for health information systems.
    Klein GO
    Int J Biomed Comput; 1994 Feb; 35 Suppl():147-51. PubMed ID: 8188408
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Design and implementation of a smart card based healthcare information system.
    Kardas G; Tunali ET
    Comput Methods Programs Biomed; 2006 Jan; 81(1):66-78. PubMed ID: 16356586
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Securing the air waves.
    Kelly B
    Health Data Manag; 2002 May; 10(5):70-2, 74. PubMed ID: 12017106
    [No Abstract]   [Full Text] [Related]  

  • 6. The need to know versus the right to know: privacy of patient medical data in an information-based society.
    Harris RE
    Suffolk Univ Law Rev; 1997; 30(4):1183-218. PubMed ID: 16086487
    [TBL] [Abstract][Full Text] [Related]  

  • 7. The need for security--a clinical view.
    France FH; Gaunt PN
    Int J Biomed Comput; 1994 Feb; 35 Suppl():189-94. PubMed ID: 8188413
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Telemedicine and security. Confidentiality, integrity, and availability: a Canadian perspective.
    Jennett P; Watanabe M; Igras E; Premkumar K; Hall W
    Stud Health Technol Inform; 1996; 29():286-98. PubMed ID: 10163762
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Medical records, 2: security and confidentiality.
    Last J
    Ann R Coll Physicians Surg Can; 1994 Feb; 27(1):8-9. PubMed ID: 15362241
    [No Abstract]   [Full Text] [Related]  

  • 10. A computational model to protect patient data from location-based re-identification.
    Malin B
    Artif Intell Med; 2007 Jul; 40(3):223-39. PubMed ID: 17544262
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Purposes of health identification cards and role of a secure access platform (Be-Health) in Belgium.
    France FH; Bangels M; De Clercq E
    Int J Med Inform; 2007; 76(2-3):84-8. PubMed ID: 17126596
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Analysis of security problems in a medical image encryption system.
    Alvarez G; Li S; Hernandez L
    Comput Biol Med; 2007 Mar; 37(3):424-7. PubMed ID: 16872592
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Enhancing privacy and authorization control scalability in the grid through ontologies.
    Blanquer I; Hernández V; Segrelles D; Torres E
    IEEE Trans Inf Technol Biomed; 2009 Jan; 13(1):16-24. PubMed ID: 19129020
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Securing electronic health records without impeding the flow of information.
    Agrawal R; Johnson C
    Int J Med Inform; 2007; 76(5-6):471-9. PubMed ID: 17204451
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A model driven approach for the German health telematics architectural framework and security infrastructure.
    Blobel B; Pharow P
    Int J Med Inform; 2007; 76(2-3):169-75. PubMed ID: 16844404
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Web-based applications offer portability and disaster protection.
    Bollinger B
    Mich Med; 2006; 105(1):18. PubMed ID: 16555745
    [No Abstract]   [Full Text] [Related]  

  • 17. Knowledge management for the protection of information in electronic medical records.
    Lea N; Hailes S; Austin T; Kalra D
    Stud Health Technol Inform; 2008; 136():685-90. PubMed ID: 18487811
    [TBL] [Abstract][Full Text] [Related]  

  • 18. The threat from within. Implementing secure access controls helps organizations protect sensitive patient information from insider threat.
    Libenson E
    Healthc Inform; 2007 Jul; 24(7):54. PubMed ID: 17695828
    [No Abstract]   [Full Text] [Related]  

  • 19. Preserving confidentiality and security of patient health care information.
    Williamson JB
    Top Health Inf Manage; 1996 May; 16(4):56-60. PubMed ID: 10157662
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A security architecture for interconnecting health information systems.
    Gritzalis D; Lambrinoudakis C
    Int J Med Inform; 2004 Mar; 73(3):305-9. PubMed ID: 15066563
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 11.