|
Volumn 3, Issue 2, 2008, Pages 23-32
|
A secure e-health architecture based on the appliance of pseudonymization
|
Author keywords
Authorization; E health; Electronic health record; Privacy; Pseudonymization; Security
|
Indexed keywords
ACCESS CONTROL;
ELECTRONIC DATA INTERCHANGE;
HEALTH CARE;
MEDICAL COMPUTING;
ELECTRONIC HEALTHCARE RECORDS;
PSEUDONYMIZATION;
DATA PRIVACY;
|
EID: 67650522224
PISSN: 1796217X
EISSN: None
Source Type: Journal
DOI: 10.4304/jsw.3.2.23-32 Document Type: Article |
Times cited : (28)
|
References (43)
|