-
1
-
-
33646456203
-
The PREPaRe system - Patient Oriented Access to the Personal Electronic Medical Record
-
Netherlands
-
S. Maerkle, K. Koechy, R. Tschirley, and H. U. Lemke, "The PREPaRe system - Patient Oriented Access to the Personal Electronic Medical Record," in Proceedings of Computer Assisted Radiology and Surgery, Netherlands, 2001, pp. 849-854.
-
(2001)
Proceedings of Computer Assisted Radiology and Surgery
, pp. 849-854
-
-
Maerkle, S.1
Koechy, K.2
Tschirley, R.3
Lemke, H.U.4
-
4
-
-
33746483446
-
Implementing EHRs requires a shift in thinking. PHRs - the building blocks of EHRs - may be the quickest path to the fulfillment of disease management
-
J. Pope, "Implementing EHRs requires a shift in thinking. PHRs - the building blocks of EHRs - may be the quickest path to the fulfillment of disease management." Health Management Technology, vol. 27(6), p. 24, 2006.
-
(2006)
Health Management Technology
, vol.27
, Issue.6
, pp. 24
-
-
Pope, J.1
-
5
-
-
33644855528
-
Hipaa administrative simplification: Enforcement; final rule
-
United States Department of Health & Human Service
-
United States Department of Health & Human Service, "Hipaa administrative simplification: Enforcement; final rule," Federal Register / Rules and Regulations, vol. Vol. 71, No. 32, 2006.
-
(2006)
Federal Register / Rules and Regulations, vol
, vol.71
, Issue.32
-
-
-
6
-
-
0003187764
-
Directive 95/46/ec of the european parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
-
European Union, "Directive 95/46/ec of the european parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data." Official Journal of the European Communities, vol. L 281, pp. 31-50, 1995, http://europa.eu/scadplus/leg/en/lvb/l14012.htm.
-
(1995)
Official Journal of the European Communities
, vol.L 281
, pp. 31-50
-
-
-
7
-
-
51449099498
-
-
Council of Europe, Martinus Nijhoff Publishers
-
Council of Europe, European Convention on Human Rights. Martinus Nijhoff Publishers, 1987.
-
(1987)
European Convention on Human Rights
-
-
-
8
-
-
51449088297
-
Datenschutzgesetz 2000 (DSG 2000), BGBl. I Nr. 165/1999
-
Republic of Austria
-
Republic of Austria, "Datenschutzgesetz 2000 (DSG 2000), BGBl. I Nr. 165/1999," 1999.
-
(1999)
-
-
-
9
-
-
0036512212
-
Telemedicine technology
-
M. Ackerman, R. Craft, F. Ferrante, M. Kratz, S. Mandil, and H. Sapci, "Telemedicine technology," Telemedicine Journal and e-Health, vol. 8, No. 1, pp. 71-78, 2002.
-
(2002)
Telemedicine Journal and e-Health
, vol.8
, Issue.1
, pp. 71-78
-
-
Ackerman, M.1
Craft, R.2
Ferrante, F.3
Kratz, M.4
Mandil, S.5
Sapci, H.6
-
10
-
-
84867162459
-
Medical images simulation, storage, and processing on the european datagrid testbed
-
J. Montagnat, F. Bellet, H. Benoit-Cattin, V. Breton, L. Brunie, H. Duque, Y. Legr, I. E. Magnin, L. Maigne, S. Miguet, J. M. Pierson, L. Seitz, and T. Tweed, "Medical images simulation, storage, and processing on the european datagrid testbed," Journal of Grid Computing, vol. 2, Number 4, pp. 387-400, 2004.
-
(2004)
Journal of Grid Computing
, vol.2
, Issue.4
, pp. 387-400
-
-
Montagnat, J.1
Bellet, F.2
Benoit-Cattin, H.3
Breton, V.4
Brunie, L.5
Duque, H.6
Legr, Y.7
Magnin, I.E.8
Maigne, L.9
Miguet, S.10
Pierson, J.M.11
Seitz, L.12
Tweed, T.13
-
11
-
-
33745883087
-
Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management A Consolidated Proposal for Terminology
-
Springer Berlin, Heidelberg
-
A. Pfitzmann and M. Koehntopp., "Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management A Consolidated Proposal for Terminology," in Lecture Notes in Computer Science. Springer Berlin / Heidelberg, 2005.
-
(2005)
Lecture Notes in Computer Science
-
-
Pfitzmann, A.1
Koehntopp, M.2
-
12
-
-
34548172730
-
Technology, Security and Privacy: The Fear of Frankenstein, the Mythology of Privacy and the Lessons of King Ludd
-
K. Taipale, "Technology, Security and Privacy: The Fear of Frankenstein, the Mythology of Privacy and the Lessons of King Ludd," International Journal of Communications Law & Policy, vol. 9, 2004.
-
(2004)
International Journal of Communications Law & Policy
, vol.9
-
-
Taipale, K.1
-
13
-
-
51449120817
-
-
Patent: Encryption system for allowing immediate universal access to medical records while maintaining complete patient control over privacy, US Patent US 2003/0074564 A1, 2003
-
R. L. Peterson, "Patent: Encryption system for allowing immediate universal access to medical records while maintaining complete patient control over privacy," US Patent US 2003/0074564 A1, 2003.
-
-
-
Peterson, R.L.1
-
14
-
-
51449112243
-
-
Patent: Data processing system for patient data, Int. Patent, WO 03/034294 A2, 2005
-
C. Thielscher, M. Gottfried, S. Umbreit, F. Boegner, J. Haack, and N. Schroeders, "Patent: Data processing system for patient data," Int. Patent, WO 03/034294 A2, 2005.
-
-
-
Thielscher, C.1
Gottfried, M.2
Umbreit, S.3
Boegner, F.4
Haack, J.5
Schroeders, N.6
-
15
-
-
0037768626
-
Privacy enhancing technologies: The key to secure communication and management of clinical and genomic data
-
G. de Moor, B. Claerhout, and F. de Meyer, "Privacy enhancing technologies: the key to secure communication and management of clinical and genomic data," Methods of information in medicine, vol. 42, pp. 148-153, 2003.
-
(2003)
Methods of information in medicine
, vol.42
, pp. 148-153
-
-
de Moor, G.1
Claerhout, B.2
de Meyer, F.3
-
16
-
-
0033772930
-
-
J. Gulcher, K. Kristjansson, H. Gudbjartsson, K., and Stefanson, Protection of privacy by third-party encryption in genetic research, European journal of human genetics, 8, pp. 739-742, 2000.
-
J. Gulcher, K. Kristjansson, H. Gudbjartsson, K., and Stefanson, "Protection of privacy by third-party encryption in genetic research," European journal of human genetics, vol. 8, pp. 739-742, 2000.
-
-
-
-
17
-
-
0028561148
-
Medical Requirements for Data Protection
-
Online, Available
-
K. Pommerening, "Medical Requirements for Data Protection," in Proceedings of IFIP Congress, Vol. 2, 1994, pp. 533-540. [Online]. Available: citeseer.ist.psu.edu/330589.html
-
(1994)
Proceedings of IFIP Congress
, vol.2
, pp. 533-540
-
-
Pommerening, K.1
-
19
-
-
34247363980
-
Research challenges for electronic health records
-
D. Lobach and D. Detmer, "Research challenges for electronic health records," American Journal of Preventive Medicine, vol. 32, Issue 5, pp. 104-111, 2007.
-
(2007)
American Journal of Preventive Medicine
, vol.32
, Issue.5
, pp. 104-111
-
-
Lobach, D.1
Detmer, D.2
-
20
-
-
34548159019
-
A secure architecture for the pseudonymization of medical data
-
B. Riedl, T. Neubauer, G. Goluch, O. Boehm, G. Reinauer, and A. Krumboeck, "A secure architecture for the pseudonymization of medical data," in Proceedings of the Second International Conference on Availability, Reliability and Security, 2007, pp. 318-324.
-
(2007)
Proceedings of the Second International Conference on Availability, Reliability and Security
, pp. 318-324
-
-
Riedl, B.1
Neubauer, T.2
Goluch, G.3
Boehm, O.4
Reinauer, G.5
Krumboeck, A.6
-
21
-
-
44349126437
-
Clef - joining up healthcare with clinical and post-genomic research
-
Online, Available
-
A. Rector, J. Rogers, A. Taweel, D. Ingram, D. Kalra, J. Milan, P. Singleton, R. Gaizauskas, M. Hepple, D. Scott, and R. Power, "Clef - joining up healthcare with clinical and post-genomic research," in Proceedings of UK e-Science All Hands Meeting, 2003, pp. 203-211. [Online]. Available: citeseer.ist.psu.edu/rector03clef.html
-
(2003)
Proceedings of UK e-Science All Hands Meeting
, pp. 203-211
-
-
Rector, A.1
Rogers, J.2
Taweel, A.3
Ingram, D.4
Kalra, D.5
Milan, J.6
Singleton, P.7
Gaizauskas, R.8
Hepple, M.9
Scott, D.10
Power, R.11
-
22
-
-
0038650644
-
Pseudonym systems
-
Online, Available
-
A. Lysyanskaya, R. L. Rivest, A. Sahai, and S. Wolf, "Pseudonym systems," in Proceedings of the Sixth Annual Workshop on Selected Areas in Cryptography (SAC '99). [Online]. Available: citeseer.ist.psu.edu/ lysyanskaya99pseudonym.html
-
Proceedings of the Sixth Annual Workshop on Selected Areas in Cryptography (SAC '99)
-
-
Lysyanskaya, A.1
Rivest, R.L.2
Sahai, A.3
Wolf, S.4
-
25
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
26
-
-
85015402934
-
Use of elliptic curves in cryptography, Lecture notes in computer sciences, vol. 218 on Advances in cryptology
-
V. S. Miller, "Use of elliptic curves in cryptography," Lecture notes in computer sciences, vol. 218 on Advances in cryptology - CRYPTO 85, pp. 417-426, 1986.
-
(1986)
CRYPTO
, vol.85
, pp. 417-426
-
-
Miller, V.S.1
-
28
-
-
0003724870
-
-
Second Edition. Norwood, MA, USA: Artech House, Inc
-
M. Hendry, Smart Card Security and Applications, Second Edition. Norwood, MA, USA: Artech House, Inc., 2001.
-
(2001)
Smart Card Security and Applications
-
-
Hendry, M.1
-
29
-
-
0004093038
-
-
New York, NY, USA: John Wiley & Sons, Inc
-
W. Rankl and W. Effing, Smart Card Handbook. New York, NY, USA: John Wiley & Sons, Inc., 1997.
-
(1997)
Smart Card Handbook
-
-
Rankl, W.1
Effing, W.2
-
30
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr, "Basic concepts and taxonomy of dependable and secure computing," IEEE Transactions on Dependable and Secure Computing, vol. 1, no. 1, pp. 11-33, 2004.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.-C.2
Randell, B.3
Landwehr, C.4
-
31
-
-
17444367785
-
-
Second Edition, Syngress Publishing
-
R. Russell, D. Kaminsky, R. F. Puppy, J. Grand, D. Ahmad, H. Flynn, I. Dubrawsky, S. W. Manzuik, and R. Permeh, Hack Proofing Your Network (Second Edition). Syngress Publishing, 2002.
-
(2002)
Hack Proofing Your Network
-
-
Russell, R.1
Kaminsky, D.2
Puppy, R.F.3
Grand, J.4
Ahmad, D.5
Flynn, H.6
Dubrawsky, I.7
Manzuik, S.W.8
Permeh, R.9
-
32
-
-
34548162149
-
The last line of defense: A host-based, real-time, kernel-level intrusion detection system
-
T. Westran, M. Mack, and R. Enbody, "The last line of defense: a host-based, real-time, kernel-level intrusion detection system," in submitted to IEEE Symposium on Security and Privacy, 2003.
-
(2003)
submitted to IEEE Symposium on Security and Privacy
-
-
Westran, T.1
Mack, M.2
Enbody, R.3
-
33
-
-
84926390184
-
Social engineering: The "Dark Art
-
New York, NY, USA: ACM Press
-
T. Thornburgh, "Social engineering: the "Dark Art"," in Proceedings of the 1st annual conference on Information security curriculum development. New York, NY, USA: ACM Press, 2004, pp. 133-135.
-
(2004)
Proceedings of the 1st annual conference on Information security curriculum development
, pp. 133-135
-
-
Thornburgh, T.1
-
34
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
37
-
-
51449093829
-
-
Patent: Verfahren zum be- oder verarbeiten von daten, German Patent, DE 199 25 910 A1, 2001
-
V. Schmidt, W. Striebel, H. Prihoda, M. Becker, and G. D. Lijzer, "Patent: Verfahren zum be- oder verarbeiten von daten," German Patent, DE 199 25 910 A1, 2001.
-
-
-
Schmidt, V.1
Striebel, W.2
Prihoda, H.3
Becker, M.4
Lijzer, G.D.5
|