These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


PUBMED FOR HANDHELDS

Journal Abstract Search


485 related items for PubMed ID: 8188404

  • 1. Security Audit Center--a suggested model for effective audit strategies in health care informatics.
    Hayam A.
    Int J Biomed Comput; 1994 Feb; 35 Suppl():115-27. PubMed ID: 8188404
    [Abstract] [Full Text] [Related]

  • 2. An accountability server for health care information systems.
    Kowalski S.
    Int J Biomed Comput; 1994 Feb; 35 Suppl():129-38. PubMed ID: 8188405
    [Abstract] [Full Text] [Related]

  • 3. Security for decentralized health information systems.
    Bleumer G.
    Int J Biomed Comput; 1994 Feb; 35 Suppl():139-45. PubMed ID: 8188407
    [Abstract] [Full Text] [Related]

  • 4. The AIM SEISMED guidelines for system development and design.
    van Dorp HD, Dubbeldam JF.
    Int J Biomed Comput; 1994 Feb; 35 Suppl():179-86. PubMed ID: 8188412
    [Abstract] [Full Text] [Related]

  • 5. The organisation and management of information security issues in health care.
    Louwerse CP.
    Int J Biomed Comput; 1994 Feb; 35 Suppl():195-200. PubMed ID: 8188414
    [Abstract] [Full Text] [Related]

  • 6. Security threats and solutions in distributed, interoperable health information systems using middleware.
    Blobel B, Holena M.
    Stud Health Technol Inform; 1997 Feb; 45():66-73. PubMed ID: 10175374
    [Abstract] [Full Text] [Related]

  • 7. Security standards for medical information systems.
    Humphreys T.
    Stud Health Technol Inform; 1996 Feb; 27():131-44. PubMed ID: 10163728
    [Abstract] [Full Text] [Related]

  • 8. The technical conditions for an open architecture.
    de Roulet D, Le HS, Scherrer JR.
    Int J Biomed Comput; 1994 Feb; 35 Suppl():107-14. PubMed ID: 8188403
    [Abstract] [Full Text] [Related]

  • 9.
    ; . PubMed ID:
    [No Abstract] [Full Text] [Related]

  • 10.
    ; . PubMed ID:
    [No Abstract] [Full Text] [Related]

  • 11.
    ; . PubMed ID:
    [No Abstract] [Full Text] [Related]

  • 12. Security requirements for electronic patients records: the Norwegian view.
    Iversen KR.
    Int J Biomed Comput; 1994 Feb; 35 Suppl():51-6. PubMed ID: 8188422
    [Abstract] [Full Text] [Related]

  • 13.
    ; . PubMed ID:
    [No Abstract] [Full Text] [Related]

  • 14.
    ; . PubMed ID:
    [No Abstract] [Full Text] [Related]

  • 15.
    ; . PubMed ID:
    [No Abstract] [Full Text] [Related]

  • 16. The need for a security policy in health care institutions.
    Katsikas SK, Gritzalis DA.
    Int J Biomed Comput; 1994 Feb; 35 Suppl():73-80. PubMed ID: 8188425
    [Abstract] [Full Text] [Related]

  • 17.
    ; . PubMed ID:
    [No Abstract] [Full Text] [Related]

  • 18.
    ; . PubMed ID:
    [No Abstract] [Full Text] [Related]

  • 19. EMR confidentiality and information security.
    Kurtz G.
    J Healthc Inf Manag; 2003 Feb; 17(3):41-8. PubMed ID: 12858596
    [Abstract] [Full Text] [Related]

  • 20. Issues of security and network security in Health Care Information Systems.
    Patel A, Kantzavelou I.
    Stud Health Technol Inform; 1996 Feb; 27():216-23. PubMed ID: 10163736
    [Abstract] [Full Text] [Related]


    Page: [Next] [New Search]
    of 25.