BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

218 related articles for article (PubMed ID: 9611868)

  • 1. Securing the transmission and storage of medical information.
    Sardinas JL; Muldoon JD
    Comput Nurs; 1998; 16(3):162-8; quiz 169-70. PubMed ID: 9611868
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Business process design. Securing computerized health information files.
    Barthel CW; Kalina CM; Fitko J
    AAOHN J; 1998 Dec; 46(12):581-6; quiz 587-8. PubMed ID: 10025251
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Smart cards--a security tool for health information systems.
    Klein GO
    Int J Biomed Comput; 1994 Feb; 35 Suppl():147-51. PubMed ID: 8188408
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Design and implementation of a smart card based healthcare information system.
    Kardas G; Tunali ET
    Comput Methods Programs Biomed; 2006 Jan; 81(1):66-78. PubMed ID: 16356586
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Securing the air waves.
    Kelly B
    Health Data Manag; 2002 May; 10(5):70-2, 74. PubMed ID: 12017106
    [No Abstract]   [Full Text] [Related]  

  • 6. The need to know versus the right to know: privacy of patient medical data in an information-based society.
    Harris RE
    Suffolk Univ Law Rev; 1997; 30(4):1183-218. PubMed ID: 16086487
    [TBL] [Abstract][Full Text] [Related]  

  • 7. The need for security--a clinical view.
    France FH; Gaunt PN
    Int J Biomed Comput; 1994 Feb; 35 Suppl():189-94. PubMed ID: 8188413
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Telemedicine and security. Confidentiality, integrity, and availability: a Canadian perspective.
    Jennett P; Watanabe M; Igras E; Premkumar K; Hall W
    Stud Health Technol Inform; 1996; 29():286-98. PubMed ID: 10163762
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Medical records, 2: security and confidentiality.
    Last J
    Ann R Coll Physicians Surg Can; 1994 Feb; 27(1):8-9. PubMed ID: 15362241
    [No Abstract]   [Full Text] [Related]  

  • 10. A computational model to protect patient data from location-based re-identification.
    Malin B
    Artif Intell Med; 2007 Jul; 40(3):223-39. PubMed ID: 17544262
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Purposes of health identification cards and role of a secure access platform (Be-Health) in Belgium.
    France FH; Bangels M; De Clercq E
    Int J Med Inform; 2007; 76(2-3):84-8. PubMed ID: 17126596
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Analysis of security problems in a medical image encryption system.
    Alvarez G; Li S; Hernandez L
    Comput Biol Med; 2007 Mar; 37(3):424-7. PubMed ID: 16872592
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Enhancing privacy and authorization control scalability in the grid through ontologies.
    Blanquer I; Hernández V; Segrelles D; Torres E
    IEEE Trans Inf Technol Biomed; 2009 Jan; 13(1):16-24. PubMed ID: 19129020
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Securing electronic health records without impeding the flow of information.
    Agrawal R; Johnson C
    Int J Med Inform; 2007; 76(5-6):471-9. PubMed ID: 17204451
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A model driven approach for the German health telematics architectural framework and security infrastructure.
    Blobel B; Pharow P
    Int J Med Inform; 2007; 76(2-3):169-75. PubMed ID: 16844404
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Web-based applications offer portability and disaster protection.
    Bollinger B
    Mich Med; 2006; 105(1):18. PubMed ID: 16555745
    [No Abstract]   [Full Text] [Related]  

  • 17. Knowledge management for the protection of information in electronic medical records.
    Lea N; Hailes S; Austin T; Kalra D
    Stud Health Technol Inform; 2008; 136():685-90. PubMed ID: 18487811
    [TBL] [Abstract][Full Text] [Related]  

  • 18. The threat from within. Implementing secure access controls helps organizations protect sensitive patient information from insider threat.
    Libenson E
    Healthc Inform; 2007 Jul; 24(7):54. PubMed ID: 17695828
    [No Abstract]   [Full Text] [Related]  

  • 19. Preserving confidentiality and security of patient health care information.
    Williamson JB
    Top Health Inf Manage; 1996 May; 16(4):56-60. PubMed ID: 10157662
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A security architecture for interconnecting health information systems.
    Gritzalis D; Lambrinoudakis C
    Int J Med Inform; 2004 Mar; 73(3):305-9. PubMed ID: 15066563
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 11.