-
1
-
-
33646456203
-
The PREPaRe system-patient oriented access to the personal electronic medical record
-
Märkle S., Köchy K., Tschirley R., Lemke H.U. The PREPaRe system-patient oriented access to the personal electronic medical record. Proceedings of the 17th International Congress and Exhibition on Computer Assisted Radiology and Surgery, ser. International Congress Series, no. 1256 2001, 849-854.
-
(2001)
Proceedings of the 17th International Congress and Exhibition on Computer Assisted Radiology and Surgery, ser. International Congress Series, no. 1256
, pp. 849-854
-
-
Märkle, S.1
Köchy, K.2
Tschirley, R.3
Lemke, H.U.4
-
2
-
-
0035291754
-
Drug-related morbidity and mortality: updating the cost-of-illness model
-
Ernst F.R., Grizzle A.J. Drug-related morbidity and mortality: updating the cost-of-illness model. Journal of the American Pharmacists Association 2001, 41(2):192-199.
-
(2001)
Journal of the American Pharmacists Association
, vol.41
, Issue.2
, pp. 192-199
-
-
Ernst, F.R.1
Grizzle, A.J.2
-
3
-
-
33644855528
-
HIPAA administrative simplification: enforcement; final rule
-
United States Department of Health Human Service
-
United States Department of Health Human Service HIPAA administrative simplification: enforcement; final rule. Federal Register/Rules and Regulations 2006, 71(32).
-
(2006)
Federal Register/Rules and Regulations
, vol.71
, Issue.32
-
-
-
4
-
-
0003187764
-
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
-
European Union.
-
European Union Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities 1995, L 281:31-50.
-
(1995)
Official Journal of the European Communities
, vol.L 281
, pp. 31-50
-
-
-
5
-
-
79851511953
-
-
Martinus Nijhoff Publishers., Council of Europe
-
Council of Europe European Convention on Human Rights 1987, Martinus Nijhoff Publishers.
-
(1987)
European Convention on Human Rights
-
-
-
7
-
-
0038443128
-
Privacy legislation: a comparison of the US and European approaches
-
Hinde S. Privacy legislation: a comparison of the US and European approaches. Computers and Security 2003, 22(5):378-387.
-
(2003)
Computers and Security
, vol.22
, Issue.5
, pp. 378-387
-
-
Hinde, S.1
-
9
-
-
79851511663
-
-
U.S. Department of Health & Human Services Office for Civil Rights, "Summary of the HIPAA Privacy Rule" [Online]. Available.
-
U.S. Department of Health & Human Services Office for Civil Rights, "Summary of the HIPAA Privacy Rule" 2003. [Online]. Available: http://www.hhs.gov/ocr/privacy/hipaa/understanding/summary/.
-
(2003)
-
-
-
10
-
-
79851513042
-
-
U.S. Congress, "Health Insurance Portability and Accountability Act of 1996" 104th Congress, [Online]. Available.
-
U.S. Congress, "Health Insurance Portability and Accountability Act of 1996" 104th Congress, 1996. [Online]. Available: http://www.cms.hhs.gov/HIPAAGenInfo/Downloads/HIPAALaw.pdf.
-
(1996)
-
-
-
11
-
-
79851513722
-
What are functional requirements of future shared electronic health records?
-
Schabetsberger T., Ammenwerth E., Göbel G., Lechleitner G., Penz R., Vogl R., Wozak F. What are functional requirements of future shared electronic health records?. Connecting Medical Informatics and Bio-Informatics 2005, 1070-1075.
-
(2005)
Connecting Medical Informatics and Bio-Informatics
, pp. 1070-1075
-
-
Schabetsberger, T.1
Ammenwerth, E.2
Göbel, G.3
Lechleitner, G.4
Penz, R.5
Vogl, R.6
Wozak, F.7
-
12
-
-
34548159019
-
A secure architecture for the pseudonymization of medical data
-
Riedl B., Neubauer T., Goluch G., Boehm O., Reinauer G., Krumboeck A. A secure architecture for the pseudonymization of medical data. Proceedings of the Second International Conference on Availability Reliability and Security 2007, 318-324.
-
(2007)
Proceedings of the Second International Conference on Availability Reliability and Security
, pp. 318-324
-
-
Riedl, B.1
Neubauer, T.2
Goluch, G.3
Boehm, O.4
Reinauer, G.5
Krumboeck, A.6
-
13
-
-
57349200762
-
Privacy, confidentiality, and electronic medical records
-
Barrows R.C., Clayton P.D. Privacy, confidentiality, and electronic medical records. Journal of the American Medical Informatics Association 1996, 13:139-148.
-
(1996)
Journal of the American Medical Informatics Association
, vol.13
, pp. 139-148
-
-
Barrows, R.C.1
Clayton, P.D.2
-
15
-
-
84867162459
-
Medical images simulation, storage, and processing on the European DataGrid Testbed
-
Montagnat J., Bellet F., Benoit-Cattin H., Breton V., Brunie L., Duque H., Legré Y., Magnin I.E., Maigne L., Miguet S., Pierson J.M., Seitz L., Tweed T. Medical images simulation, storage, and processing on the European DataGrid Testbed. Journal of Grid Computing 2004, 2(4):387-400.
-
(2004)
Journal of Grid Computing
, vol.2
, Issue.4
, pp. 387-400
-
-
Montagnat, J.1
Bellet, F.2
Benoit-Cattin, H.3
Breton, V.4
Brunie, L.5
Duque, H.6
Legré, Y.7
Magnin, I.E.8
Maigne, L.9
Miguet, S.10
Pierson, J.M.11
Seitz, L.12
Tweed, T.13
-
17
-
-
84937564790
-
Anonymity, unobservability and pseudeonymity-a proposal for terminology
-
Springer-Verlag, Inc., New York
-
Pfitzmann A., Koehntopp M. Anonymity, unobservability and pseudeonymity-a proposal for terminology. International Workshop on Designing Privacy Enhancing Technologies 2001, 1-9. Springer-Verlag, Inc., New York.
-
(2001)
International Workshop on Designing Privacy Enhancing Technologies
, pp. 1-9
-
-
Pfitzmann, A.1
Koehntopp, M.2
-
18
-
-
34548172730
-
Technology, security and privacy: the fear of Frankenstein, the mythology of privacy and the lessons of King Ludd
-
Taipale K.A. Technology, security and privacy: the fear of Frankenstein, the mythology of privacy and the lessons of King Ludd. International Journal of Communications Law & Policy 2004, 9.
-
(2004)
International Journal of Communications Law & Policy
, vol.9
-
-
Taipale, K.A.1
-
19
-
-
44349126437
-
Clef-joining up healthcare with clinical and post-genomic research
-
Rector A, Rogers J., Taweel A., Ingram D., Kalra D., Milan J., Singleton P., Gaizauskas R., Hepple M., Scott D., Power R. Clef-joining up healthcare with clinical and post-genomic research. Proceedings of UK e-Science All Hands Meeting 2003, 203-211.
-
(2003)
Proceedings of UK e-Science All Hands Meeting
, pp. 203-211
-
-
Rector, A.1
Rogers, J.2
Taweel, A.3
Ingram, D.4
Kalra, D.5
Milan, J.6
Singleton, P.7
Gaizauskas, R.8
Hepple, M.9
Scott, D.10
Power, R.11
-
20
-
-
79851507692
-
-
Patent: data processing system for patient data, Int. Patent, WO 03/034294 A2.
-
C. Thielscher, M. Gottfried, S. Umbreit, F. Boegner, J. Haack, N. Schroeders, Patent: data processing system for patient data, Int. Patent, WO 03/034294 A2, 2005.
-
(2005)
-
-
Thielscher, C.1
Gottfried, M.2
Umbreit, S.3
Boegner, F.4
Haack, J.5
Schroeders, N.6
-
21
-
-
79851513560
-
The human factor in information technology
-
Maris K. The human factor in information technology. Proceedings of Hack.lu 2005.
-
(2005)
Proceedings of Hack.lu
-
-
Maris, K.1
-
25
-
-
20444375246
-
Secondary use of the electronic health record via pseudonymisation
-
IOS Press.
-
Pommerening K., Reng M. Secondary use of the electronic health record via pseudonymisation. Medical and Care Compunetics 2004, vol. 1. IOS Press, pp. 441-446.
-
(2004)
Medical and Care Compunetics
, vol.1
, pp. 441-446
-
-
Pommerening, K.1
Reng, M.2
-
27
-
-
79851514191
-
-
Pseudonymization of radiology data for research purposes.
-
R. Noumeir, A. Lemay, J. Lina, Pseudonymization of radiology data for research purposes, 2007.
-
(2007)
-
-
Noumeir, R.1
Lemay, A.2
Lina, J.3
-
28
-
-
0003688173
-
-
National Electrical Manufacturers Association Std.
-
Digital Imaging Communications in Medicine 2008, National Electrical Manufacturers Association Std.
-
(2008)
Digital Imaging Communications in Medicine
-
-
-
29
-
-
79851516433
-
-
Patent: encryption system for allowing immediate universal access to medical records while maintaining complete patient control over privacy, US Patent US 2003/0074564 A1.
-
R.L. Peterson, Patent: encryption system for allowing immediate universal access to medical records while maintaining complete patient control over privacy, US Patent US 2003/0074564 A1, 2003.
-
(2003)
-
-
Peterson, R.L.1
-
30
-
-
33749405570
-
Der Patient bleibt Herr seiner Daten: Realisierung des eGK-Berechtigungskonzepts über ein ticketbasiertes, virtuelles Dateisystem
-
Caumanns J. Der Patient bleibt Herr seiner Daten: Realisierung des eGK-Berechtigungskonzepts über ein ticketbasiertes, virtuelles Dateisystem. Informatik-Spektrum 2006, 29(5):323-331.
-
(2006)
Informatik-Spektrum
, vol.29
, Issue.5
, pp. 323-331
-
-
Caumanns, J.1
-
31
-
-
79851515521
-
-
Fraunhofer Institut, Spezifikation der Lösungsarchitektur zur Umsetzung der Anwendungen der elektronischen Gesundheitskarte, March
-
Fraunhofer Institut, Spezifikation der Lösungsarchitektur zur Umsetzung der Anwendungen der elektronischen Gesundheitskarte, March 2005.
-
(2005)
-
-
-
32
-
-
79851513235
-
Realisierung eines sicheren zentralen Datenrepositories
-
DACH Security.
-
Stingl C.D., Slamanig D., Rauner-Reithmayer D., Fischer H. Realisierung eines sicheren zentralen Datenrepositories. Tagungsband 2006, DACH Security, pp. 1-15.
-
(2006)
Tagungsband
, pp. 1-15
-
-
Stingl, C.D.1
Slamanig, D.2
Rauner-Reithmayer, D.3
Fischer, H.4
-
33
-
-
65549146613
-
Berechtigungskonzept für ein e-health-portal
-
Österreichische Computer Gesellschaft, G. Schreier, D. Hayn, E. Ammenwerth (Eds.)
-
Stingl C., Slamanig D. Berechtigungskonzept für ein e-health-portal. eHealth 2007-Medical Informatics Meets eHealth, no. 227 2007, 135-140. Österreichische Computer Gesellschaft. G. Schreier, D. Hayn, E. Ammenwerth (Eds.).
-
(2007)
eHealth 2007-Medical Informatics Meets eHealth, no. 227
, pp. 135-140
-
-
Stingl, C.1
Slamanig, D.2
-
35
-
-
79851516534
-
-
Understanding Security APIs, Ph.D. dissertation, University of Cambridge, Computer Laboratory, Emmanuel College.
-
M.K. Bond, Understanding Security APIs, Ph.D. dissertation, University of Cambridge, Computer Laboratory, Emmanuel College, 2004.
-
(2004)
-
-
Bond, M.K.1
-
36
-
-
79851511024
-
-
Federal information processing standards publication, "Security requirements for cryptographic modules (Fips pub 140-2)," Institute of Standards and Technology (NIST), Tech. Rep., 05
-
Federal information processing standards publication, "Security requirements for cryptographic modules (Fips pub 140-2)," Institute of Standards and Technology (NIST), Tech. Rep., 05 2001.
-
(2001)
-
-
-
37
-
-
33845228975
-
-
University of Cambridge, Computer Laboratory Tech. Rep.
-
Anderson R., Bond M., Clulow J., Skorobogatov S. Cryptographic Processors-A Survey 2005, University of Cambridge, Computer Laboratory Tech. Rep.
-
(2005)
Cryptographic Processors-A Survey
-
-
Anderson, R.1
Bond, M.2
Clulow, J.3
Skorobogatov, S.4
-
42
-
-
0142250276
-
Hardware encapsulation of security services
-
Springer, Berlin/Heidelberg
-
Baldwin A., Shiu S. Hardware encapsulation of security services. 8th European Symposium on Research in Computer Security (ESORICS), ser. LNCS, vol. 2808 2003, Springer, Berlin/Heidelberg.
-
(2003)
8th European Symposium on Research in Computer Security (ESORICS), ser. LNCS, vol. 2808
-
-
Baldwin, A.1
Shiu, S.2
-
43
-
-
79851512372
-
-
Trusted Systems Laboratory, HP Laboratories Bristol, Tech. Rep.
-
Casassa-Mont M., Baldwin A., Pato J. Secure Hardware-based Distributed Authorisation Underpinning a Web Service Framework 2003, Trusted Systems Laboratory, HP Laboratories Bristol, Tech. Rep.
-
(2003)
Secure Hardware-based Distributed Authorisation Underpinning a Web Service Framework
-
-
Casassa-Mont, M.1
Baldwin, A.2
Pato, J.3
-
46
-
-
0018545449
-
How to share a secret
-
Shamir A. How to share a secret. Communications of the ACM 1979, 22(11):612-613.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
51
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
Avizienis A., Laprie J.-C., Randell B., Landwehr C. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing 2004, 1(1):11-33.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.-C.2
Randell, B.3
Landwehr, C.4
|