메뉴 건너뛰기




Volumn , Issue , 2008, Pages 935-942

An initial model and a discussion of access control in patient controlled health records

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY SYSTEMS;

EID: 49049099663     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2008.185     Document Type: Conference Paper
Times cited : (28)

References (16)
  • 1
    • 27644565865 scopus 로고    scopus 로고
    • Can electronic medical record systems transform health care? potential health benefits, savings, and costs
    • R. Hillestad, J. Bigelow, A. Bower, F. Girosi, R. Meili, R. Scoville, and R. Taylor. Can electronic medical record systems transform health care? potential health benefits, savings, and costs. Health Affairs, 24(5):1103-1117, 2005.
    • (2005) Health Affairs , vol.24 , Issue.5 , pp. 1103-1117
    • Hillestad, R.1    Bigelow, J.2    Bower, A.3    Girosi, F.4    Meili, R.5    Scoville, R.6    Taylor, R.7
  • 2
    • 0037164043 scopus 로고    scopus 로고
    • Medical informatics: Improving health care through information
    • W. R. Hersh. Medical informatics: Improving health care through information. The Journal of the American Medical Association (JAMA), 288(16):1955-1958, 2002.
    • (2002) The Journal of the American Medical Association (JAMA) , vol.288 , Issue.16 , pp. 1955-1958
    • Hersh, W.R.1
  • 3
    • 49049119562 scopus 로고    scopus 로고
    • Connecting for health
    • Technical report, Markle Foundation, July 1
    • Connecting for health: The personal health working group final report. Technical report, Markle Foundation, July 1 2003.
    • (2003) The personal health working group final report
  • 5
    • 0036491265 scopus 로고    scopus 로고
    • Personal health records: Evaluation of functionality and utility
    • M. I. Kim and K. B. Johnson. Personal health records: Evaluation of functionality and utility. J Am Med Inform Assoc, 9(2):171-180, 2002.
    • (2002) J Am Med Inform Assoc , vol.9 , Issue.2 , pp. 171-180
    • Kim, M.I.1    Johnson, K.B.2
  • 6
    • 0035798841 scopus 로고    scopus 로고
    • K. D. Mandl, P. Szolovits, and I. S. Kohane. Public standards and patients' control: how to keep electronic medical records accessible but private commentary: Open approaches to electronic patient records commentary: A patient's viewpoint. BMJ, 322(7281):283-287, 2001.
    • K. D. Mandl, P. Szolovits, and I. S. Kohane. Public standards and patients' control: how to keep electronic medical records accessible but private commentary: Open approaches to electronic patient records commentary: A patient's viewpoint. BMJ, 322(7281):283-287, 2001.
  • 8
    • 1842474926 scopus 로고    scopus 로고
    • Authorisation and access control for electronic health record systems
    • B. Blobel. Authorisation and access control for electronic health record systems. International Journal of Medical Informatics, 73(3):251-257, 2004.
    • (2004) International Journal of Medical Informatics , vol.73 , Issue.3 , pp. 251-257
    • Blobel, B.1
  • 12
    • 49049118957 scopus 로고    scopus 로고
    • A. N. S. Institute. American national standard for information technology: Role based access control. Technical Report ANSI INCITS 359-2004, 2004.
    • A. N. S. Institute. American national standard for information technology: Role based access control. Technical Report ANSI INCITS 359-2004, 2004.
  • 13
    • 11144322222 scopus 로고    scopus 로고
    • The ping personally controlled electronic medical record system: Technical architecture
    • W. W. Simons, K. D. Mandl, and I. S. Kohane. The ping personally controlled electronic medical record system: Technical architecture. J Am Med Inform Assoc, 12(1):47-54, 2004.
    • (2004) J Am Med Inform Assoc , vol.12 , Issue.1 , pp. 47-54
    • Simons, W.W.1    Mandl, K.D.2    Kohane, I.S.3
  • 16
    • 39049126192 scopus 로고    scopus 로고
    • A study of access control requirements for healthcare systems based on audit trails from access logs
    • Miami, Florida, IEEE
    • L. Røstad and O. Edsberg. A study of access control requirements for healthcare systems based on audit trails from access logs. In 22nd Annual Computer Security Applications Conference (ACSAC'06), pages 175-186, Miami, Florida, 2006. IEEE.
    • (2006) 22nd Annual Computer Security Applications Conference (ACSAC'06) , pp. 175-186
    • Røstad, L.1    Edsberg, O.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.