메뉴 건너뛰기




Volumn , Issue , 2012, Pages 409-418

Enhancing accountability of Electronic Health Record usage via patient-centric monitoring

Author keywords

Direct Project; EHR; HIE; HIPAA; Patient centricity; PHR

Indexed keywords

DIRECT PROJECT; EHR; HIE; HIPAA; PATIENT-CENTRICITY; PHR;

EID: 84857768453     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2110363.2110410     Document Type: Conference Paper
Times cited : (43)

References (34)
  • 2
    • 84857737762 scopus 로고    scopus 로고
    • CONNECT Community Portal. http://www.connectopensource.org/.
  • 3
    • 84857696634 scopus 로고    scopus 로고
    • Direct Project. http://wiki.directproject.org/.
  • 4
    • 84857724241 scopus 로고    scopus 로고
    • HealthVault Message Center. http://www.healthvault.com/messagecenter.
  • 5
    • 84857750884 scopus 로고    scopus 로고
    • Master Patient Index (MPI). http://healthinformatics.wikispaces.com/ Master+Patient+Index.
  • 6
    • 84857697903 scopus 로고    scopus 로고
    • Meaningful Use Announcement. http://healthit.hhs.gov/portal/server.pt/ community/healthit-hhs-gov-meaningful-use-announcement/2996.
  • 7
    • 84857722890 scopus 로고    scopus 로고
    • Medical Identity Theft. http://www.ftc.gov/bcp/edu/pubs/consumer/idtheft/ idt10.shtm.
  • 8
    • 84857740186 scopus 로고    scopus 로고
    • Microsoft HealthVault. http://healthvault.com/.
  • 9
    • 84857774315 scopus 로고    scopus 로고
    • Nationwide Health Information Network (NHIN). http://www.hhs.gov/ healthit/healthnetwork/background/.
  • 10
    • 84857730955 scopus 로고    scopus 로고
    • Notice of Proposed Rulemaking to Implement HITECH Act Modifications. http://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/hitechnprm. html.
  • 11
    • 84857721779 scopus 로고    scopus 로고
    • The Architecture for Privacy in a Networked Health Information Environment. http://www.markle.org/sites/default/files/P1-CFH-Architecture.pdf.
  • 12
    • 84857742213 scopus 로고    scopus 로고
    • National Ambulatory Medical Care Survey: 2008 Summary Tables. http://www.cdc.gov/nchs/data/ahcd/namcs-summary/namcssum2008.pdf, 2008.
    • (2008)
  • 13
    • 78650963512 scopus 로고    scopus 로고
    • MeD-Lights: A usable metaphor for patient controlled access to electronic health records
    • ACM
    • E. Adams, M. Intwala, and A. Kapadia. MeD-Lights: a usable metaphor for patient controlled access to electronic health records. In Proceedings of ACM IHI 2010, pages 800-808. ACM, 2010.
    • (2010) Proceedings of ACM IHI 2010 , pp. 800-808
    • Adams, E.1    Intwala, M.2    Kapadia, A.3
  • 15
    • 0003400251 scopus 로고
    • Secure computer system: Unified exposition and multics interpretation
    • MA
    • D. Bell. Secure computer system: Unified exposition and multics interpretation. Technical report, MITRE CORP BEDFORD MA, 1976.
    • (1976) Technical Report MITRE CORP BEDFORD
    • Bell, D.1
  • 16
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations and model
    • D. Bell and L. LaPadula. Secure computer systems: Mathematical foundations and model. MITRE CORP BEDFORD MA, 1(M74-244), 1973.
    • (1973) MITRE CORP BEDFORD MA , vol.1 , Issue.M74-244
    • Bell, D.1    Lapadula, L.2
  • 17
    • 74049110390 scopus 로고    scopus 로고
    • Patient controlled encryption: Ensuring privacy of electronic medical records
    • ACM
    • J. Benaloh, M. Chase, E. Horvitz, and K. Lauter. Patient controlled encryption: ensuring privacy of electronic medical records. In Proceedings of CCSW 2009, pages 103-114. ACM, 2009.
    • (2009) Proceedings of CCSW 2009 , pp. 103-114
    • Benaloh, J.1    Chase, M.2    Horvitz, E.3    Lauter, K.4
  • 18
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • MA
    • K. Biba. Integrity considerations for secure computer systems. Technical report, MITRE CORP BEDFORD MA, 1977.
    • (1977) Technical Report MITRE CORP BEDFORD
    • Biba, K.1
  • 21
    • 71549153479 scopus 로고    scopus 로고
    • A secure channel free public key encryption with keyword search scheme without random oracle
    • L. Fang, W. Susilo, C. Ge, and J. Wang. A secure channel free public key encryption with keyword search scheme without random oracle. Cryptology and Network Security, pages 248-258, 2009.
    • (2009) Cryptology and Network Security , pp. 248-258
    • Fang, L.1    Susilo, W.2    Ge, C.3    Wang, J.4
  • 25
    • 84927752554 scopus 로고    scopus 로고
    • Designated verifier proofs and their applications
    • M. Jakobsson, K. Sako, and R. Impagliazzo. Designated verifier proofs and their applications. In Proceedings of EUROCRYPT 1996, pages 143-154. Springer-Verlag, 1996. (Pubitemid 126071061)
    • (1996) Lecture Notes in Computer Science , Issue.1070 , pp. 143-154
    • Jakobsson, M.1    Sako, K.2    Impagliazzo, R.3
  • 31
    • 78650118369 scopus 로고    scopus 로고
    • Privacy preserving EHR system using attribute-based infrastructure
    • ACM
    • S. Narayan, M. Gagné, and R. Safavi-Naini. Privacy preserving EHR system using attribute-based infrastructure. In Proceedings of CCSW 2010, pages 47-52. ACM, 2010.
    • (2010) Proceedings of CCSW 2010 , pp. 47-52
    • Narayan, S.1    Gagné, M.2    Safavi-Naini, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.