-
1
-
-
34548181121
-
-
The Austrian Cancer Register
-
The Austrian Cancer Register.
-
-
-
-
3
-
-
34548172993
-
Drug-related morbidity and mortality: Updating the cost-of-illness model
-
Technical report
-
F. R. Ernst and A. J. Grizzle. Drug-related morbidity and mortality: Updating the cost-of-illness model. Technical report, 1995.
-
(1995)
-
-
Ernst, F.R.1
Grizzle, A.J.2
-
4
-
-
34548172993
-
Drug-related morbidity and mortality: Updating the cost-of-illness model
-
Technical report
-
F. R. Ernst and A. J. Grizzle. Drug-related morbidity and mortality: Updating the cost-of-illness model. Technical report, 2001.
-
(2001)
-
-
Ernst, F.R.1
Grizzle, A.J.2
-
6
-
-
34548179891
-
An efficient mechanism to ensure location privacy in telecom service applications
-
O. Jorns, S. Bessler, and R. Pailer. An efficient mechanism to ensure location privacy in telecom service applications. In Net-Con 2004, Mallorca, Spain, 2004.
-
(2004)
Net-Con 2004, Mallorca, Spain
-
-
Jorns, O.1
Bessler, S.2
Pailer, R.3
-
7
-
-
34548174468
-
A privacy enhancement mechanism for location based service architectures using transaction pseudonyms
-
O. Jörns, O. Jung, J. Gross, and S. Bessler. A privacy enhancement mechanism for location based service architectures using transaction pseudonyms. In 2nd International Conference on Trust, Privacy, and Security in Digital Business, Copenhagen, Denmark, 2005.
-
(2005)
2nd International Conference on Trust, Privacy, and Security in Digital Business, Copenhagen, Denmark
-
-
Jörns, O.1
Jung, O.2
Gross, J.3
Bessler, S.4
-
9
-
-
33646456203
-
The PREPaRe system - Patient Oriented Access to the Personal Electronic Medical Record
-
CARS 2001 Computer Assisted Radiology and Surgery, H.U. Lemke, et al, Eds, Elsevier, Amsterdam, Netherlands
-
S. Maerkle, K. Koechy, R. Tschirley, and H. U. Lemke. The PREPaRe system - Patient Oriented Access to the Personal Electronic Medical Record. In CARS 2001 Computer Assisted Radiology and Surgery, H.U. Lemke, et al. (Eds.), Excerpta Medica International Congress Series, Elsevier, Amsterdam, Netherlands, pages 849-854, 2001.
-
(2001)
Excerpta Medica International Congress Series
, pp. 849-854
-
-
Maerkle, S.1
Koechy, K.2
Tschirley, R.3
Lemke, H.U.4
-
11
-
-
34548184949
-
-
A. Pfitzmann and M. Koehntopp. Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management A Consolidated Proposal for Terminology. In Lecture Notes in Computer Science. Springer Berlin / Heidelberg, 2005.
-
A. Pfitzmann and M. Koehntopp. Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management A Consolidated Proposal for Terminology. In Lecture Notes in Computer Science. Springer Berlin / Heidelberg, 2005.
-
-
-
-
12
-
-
0028561148
-
Medical Requirements for Data Protection
-
K. Pommerening. Medical Requirements for Data Protection. In IFIP Congress, Vol. 2, pages 533-540, 1994.
-
(1994)
IFIP Congress
, vol.2
, pp. 533-540
-
-
Pommerening, K.1
-
13
-
-
20444375246
-
Secondary use of the Electronic Health Record via pseudonymisation
-
K. Pommerening and M. Reng. Secondary use of the Electronic Health Record via pseudonymisation. Medical Care Compunetics 1, -:441-446, 2004.
-
(2004)
Medical Care Compunetics
, vol.1
, pp. 441-446
-
-
Pommerening, K.1
Reng, M.2
-
14
-
-
33746483446
-
Implementing EHRs requires a shift in thinking. PHRs-the building blocks of EHRs-may be the quickest path to the fulfillment of disease management
-
276
-
J. Pope. Implementing EHRs requires a shift in thinking. PHRs-the building blocks of EHRs-may be the quickest path to the fulfillment of disease management. Health Management Technology, 27(6):24,26,120, 2006.
-
(2006)
Health Management Technology
, vol.24
, Issue.26
, pp. 120
-
-
Pope, J.1
-
16
-
-
44349126437
-
-
A. Rector, J. Rogers, A. Taweel, D. Ingram, D. Kalra, J. Milan, P. Singleton, R. Gaizauskas, M. Hepple, D. Scott, and R. Power. Clef -joining up healthcare with clinical and postgenomic research, 2003.
-
(2003)
Clef -joining up healthcare with clinical and postgenomic research
-
-
Rector, A.1
Rogers, J.2
Taweel, A.3
Ingram, D.4
Kalra, D.5
Milan, J.6
Singleton, P.7
Gaizauskas, R.8
Hepple, M.9
Scott, D.10
Power, R.11
-
17
-
-
17444367785
-
-
Second Edition, Syngress Publishing
-
R. Russell, D. Kaminsky, R. F. Puppy, J. Grand, D. Ahmad, H. Flynn, I. Dubrawsky, S. W. Manzuik, and R. Permeh. Hack Proofing Your Network (Second Edition). Syngress Publishing, 2002.
-
(2002)
Hack Proofing Your Network
-
-
Russell, R.1
Kaminsky, D.2
Puppy, R.F.3
Grand, J.4
Ahmad, D.5
Flynn, H.6
Dubrawsky, I.7
Manzuik, S.W.8
Permeh, R.9
-
18
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Commun. ACM, 22(11):612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
19
-
-
34548172730
-
Technology, Security and Privacy: The Fear of Frankenstein, the Mythology of Privacy and the Lessons of King Ludd
-
K. Taipale. Technology, Security and Privacy: The Fear of Frankenstein, the Mythology of Privacy and the Lessons of King Ludd. International Journal of Communications Law & Policy, 9:-, 2004.
-
(2004)
International Journal of Communications Law & Policy
, pp. 9
-
-
Taipale, K.1
-
20
-
-
34548163875
-
-
data
-
C. Thielscher, M. Gottfried, S. Umbreit, F. Boegner, J. Haack, and N. Schroeders. Patent: Data processing system for patent data, 2005.
-
(2005)
Patent: Data processing system for patent
-
-
Thielscher, C.1
Gottfried, M.2
Umbreit, S.3
Boegner, F.4
Haack, J.5
Schroeders, N.6
-
21
-
-
27544444693
-
Central Questions of Anonymization: A Case Study of Secondary Use of Qualitative Data
-
D. Thomson, L. Bzdel, K. Golden-Biddle, T. Reay, and C. A. Estabrooks. Central Questions of Anonymization: A Case Study of Secondary Use of Qualitative Data. Forum Qualitative Social Research, 6:29, 2005.
-
(2005)
Forum Qualitative Social Research
, vol.6
, pp. 29
-
-
Thomson, D.1
Bzdel, L.2
Golden-Biddle, K.3
Reay, T.4
Estabrooks, C.A.5
-
22
-
-
84926390184
-
Social engineering: The Dark Art
-
New York, NY, USA, ACM Press
-
T. Thornburgh. Social engineering: the "Dark Art". In InfoSecCD '04: Proceedings of the 1st annual conference on Information security curriculum development, pages 133-135, New York, NY, USA, 2004. ACM Press.
-
(2004)
InfoSecCD '04: Proceedings of the 1st annual conference on Information security curriculum development
, pp. 133-135
-
-
Thornburgh, T.1
-
23
-
-
34548162149
-
The last line of defense: A host-based, real-time, kernel-level intrusion detection system
-
T. Westran, M. Mack, and R. Enbody. The last line of defense: a host-based, real-time, kernel-level intrusion detection system. In submitted to IEEE Symposium on Security and Privacy, 2003.
-
(2003)
submitted to IEEE Symposium on Security and Privacy
-
-
Westran, T.1
Mack, M.2
Enbody, R.3
|