-
1
-
-
84990370617
-
An authentication architecture for healthcare information systems
-
C. Chousiadis, I. K. Mavridis, and G. I. Pangalos, "An authentication architecture for healthcare information systems," Health Informatics Journal, vol. 8, pp. 199, 2002.
-
(2002)
Health Informatics Journal
, vol.8
, pp. 199
-
-
Chousiadis, C.1
Mavridis, I.K.2
Pangalos, G.I.3
-
2
-
-
0035177398
-
Delivering the electronic healthcare record for the 21st century
-
J. Grimson, "Delivering the electronic healthcare record for the 21st century," International Journal of Medical Informatics, vol. 64, pp. 111-127, 2001.
-
(2001)
International Journal of Medical Informatics
, vol.64
, pp. 111-127
-
-
Grimson, J.1
-
3
-
-
49249087521
-
Heuristics for de-identifying health data
-
K. El Emam, "Heuristics for de-identifying health data," IEEE Security & Privacy, vol. 6, pp. 58-61, 2008.
-
(2008)
IEEE Security & Privacy
, vol.6
, pp. 58-61
-
-
El Emam, K.1
-
4
-
-
0002779304
-
Privacy, information technology, and health care
-
C. R. Thomas, "Privacy, information technology, and health care," Commun. ACM, vol. 40, pp. 92-100, 1997.
-
(1997)
Commun. ACM
, vol.40
, pp. 92-100
-
-
Thomas, C.R.1
-
5
-
-
33745183324
-
HIT and MIS: Implications of health information technology and medical information systems
-
P. G. Goldschmidt, "HIT and MIS: implications of health information technology and medical information systems," Commun. ACM, vol. 48, pp. 68-74, 2005.
-
(2005)
Commun. ACM
, vol.48
, pp. 68-74
-
-
Goldschmidt, P.G.1
-
6
-
-
0242456746
-
A role-based delegation framework for healthcare information systems
-
Monterey, California, USA: ACM
-
Z. Longhua, A. Gail-Joon, and C. Bei-Tseng, "A role-based delegation framework for healthcare information systems," in Proceedings of the seventh ACM symposium on Access control models and technologies. Monterey, California, USA: ACM, 2002.
-
(2002)
Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies
-
-
Longhua, Z.1
Gail-Joon, A.2
Bei-Tseng, C.3
-
7
-
-
67849099103
-
Privacy preservation and information security protection for patients' portable electronic health records
-
L. C. Huang, H. C. Chu, C. Y. Lien, C. H. Hsiao, and T. Kao, "Privacy preservation and information security protection for patients' portable electronic health records," Computers in Biology and Medicine, 2009.
-
(2009)
Computers in Biology and Medicine
-
-
Huang, L.C.1
Chu, H.C.2
Lien, C.Y.3
Hsiao, C.H.4
Kao, T.5
-
9
-
-
84937564790
-
Anonymity, unobservability, and pseudonymity-a proposal for terminology
-
A. Pfitzmann and M. Kohntopp, "Anonymity, unobservability, and pseudonymity-a proposal for terminology," Lecture Notes in Computer Science, pp. 1-9, 2001.
-
(2001)
Lecture Notes in Computer Science
, pp. 1-9
-
-
Pfitzmann, A.1
Kohntopp, M.2
-
10
-
-
85016682337
-
Privacy through pseudonymity in user-adaptive systems
-
J
-
K. Alfred, J, and S. rg, "Privacy through pseudonymity in user-adaptive systems," ACM Trans. Internet Technol, vol.3, pp. 149-183, 2003.
-
(2003)
ACM Trans. Internet Technol
, vol.3
, pp. 149-183
-
-
Alfred, K.1
Rg, S.2
-
13
-
-
27544444693
-
-
D. Thomson, L. Bzdel, K. Golden-Biddle, T. Reay, and C. A. Estabrooks, "Central Questions of Anonymization: A Case Study of Secondary Use of Qualitative Data," 2005.
-
(2005)
Central Questions of Anonymization: A Case Study of Secondary Use of Qualitative Data
-
-
Thomson, D.1
Bzdel, L.2
Golden-Biddle, K.3
Reay, T.4
Estabrooks, C.A.5
-
14
-
-
51449090174
-
Pseudonymization for improving the Privacy in E-Health Applications
-
B. Riedl, V. Grascher, S. Fenz, and T. Neubauer, "Pseudonymization for improving the Privacy in E-Health Applications," in Proceedings of the Proceedings of the 41st Annual Hawaii International Conference on System Sciences: IEEE Computer Society, 2008.
-
(2008)
Proceedings of the Proceedings of the 41st Annual Hawaii International Conference on System Sciences: IEEE Computer Society
-
-
Riedl, B.1
Grascher, V.2
Fenz, S.3
Neubauer, T.4
-
16
-
-
33745183962
-
Usable privacy and security for personal information management
-
K. Clare-Marie, B. Carolyn, and K. John, "Usable privacy and security for personal information management," Commun. ACM, vol.49, pp. 56-57, 2006.
-
(2006)
Commun. ACM
, vol.49
, pp. 56-57
-
-
Clare-Marie, K.1
Carolyn, B.2
John, K.3
-
18
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
D. Chaum, "Security without identification: transaction systems to make big brother obsolete," Commun. ACM, vol.28, pp. 1030-1044,1985.
-
(1985)
Commun. ACM
, vol.28
, pp. 1030-1044
-
-
Chaum, D.1
-
19
-
-
67651053584
-
Pseudonym systems
-
A. Lysyanskaya, R. L. Rivest, A. Sahai, and S. Wolf, "Pseudonym systems," Lecture notes in computer science, pp. 184-199,2000.
-
(2000)
Lecture Notes in Computer Science
, pp. 184-199
-
-
Lysyanskaya, A.1
Rivest, R.L.2
Sahai, A.3
Wolf, S.4
-
21
-
-
13444310528
-
Privacy protection for clinical and genomic data the use of privacyenhancing techniques in medicine
-
B. Claerhout and G. J. E. DeMoor, "Privacy protection for clinical and genomic data The use of privacyenhancing techniques in medicine," International Journal of Medical Informatics, vol.74, pp. 257-265, 2005.
-
(2005)
International Journal of Medical Informatics
, vol.74
, pp. 257-265
-
-
Claerhout, B.1
Demoor, G.J.E.2
-
22
-
-
34548557737
-
Multi-centric Universal Pseudonymisation for Secondary Use of the EHR
-
L. L. Iacono, "Multi-centric Universal Pseudonymisation for Secondary Use of the EHR," Studies in health technology and informatics, vol.126, pp. 239, 2007.
-
(2007)
Studies in Health Technology and Informatics
, vol.126
, pp. 239
-
-
Iacono, L.L.1
|