메뉴 건너뛰기




Volumn 46, Issue 3, 2013, Pages 541-562

Security and privacy in electronic health records: A systematic literature review

Author keywords

Confidentiality; Electronic health records; Privacy; Security; Standards; Systematic review

Indexed keywords

CONFIDENTIALITY; ELECTRONIC HEALTH RECORD; ELECTRONIC HEALTH RECORD SYSTEMS; HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACTS; PUBLIC KEY INFRASTRUCTURE; SECURITY; SYSTEMATIC LITERATURE REVIEW; SYSTEMATIC REVIEW;

EID: 84878197970     PISSN: 15320464     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jbi.2012.12.003     Document Type: Review
Times cited : (516)

References (138)
  • 1
    • 78449293106 scopus 로고    scopus 로고
    • Adoption, non-adoption, and abandonment of a personal electronic health record: case study of HealthSpace
    • Greenhalgh T., Hinder S., Stramer K., Bratan T., Russell J. Adoption, non-adoption, and abandonment of a personal electronic health record: case study of HealthSpace. BMJ 2010, 341:c5814.
    • (2010) BMJ , vol.341
    • Greenhalgh, T.1    Hinder, S.2    Stramer, K.3    Bratan, T.4    Russell, J.5
  • 7
    • 36849006090 scopus 로고    scopus 로고
    • Health privacy in the electronic age
    • Rothstein M.A. Health privacy in the electronic age. J Leg Med 2007, 28(4):487-501.
    • (2007) J Leg Med , vol.28 , Issue.4 , pp. 487-501
    • Rothstein, M.A.1
  • 8
    • 77956057059 scopus 로고    scopus 로고
    • Security requirements and solutions in electronic health records: lessons learned from a comparative study
    • Farzandipour M., Sadoughi F., Ahmadi M., Karimi I. Security requirements and solutions in electronic health records: lessons learned from a comparative study. J Med Syst 2010, 34(4):629-642.
    • (2010) J Med Syst , vol.34 , Issue.4 , pp. 629-642
    • Farzandipour, M.1    Sadoughi, F.2    Ahmadi, M.3    Karimi, I.4
  • 10
    • 84878199692 scopus 로고    scopus 로고
    • ISO/EN 13606. <> [accessed 07.12.12].
    • ISO/EN 13606. <> [accessed 07.12.12]. http://www.iso.org/iso/home.htm.
  • 12
    • 84878200966 scopus 로고    scopus 로고
    • NHS Lothian Communications Office. NHS Lothian staff member loses patient data. <> [accessed 07.12.12].
    • NHS Lothian Communications Office. NHS Lothian staff member loses patient data. <> [accessed 07.12.12]. http://www.nhslothian.scot.nhs.uk/MediaCentre/PressReleases/2008/Pages/0307PatientData.aspx.
  • 13
    • 84891559845 scopus 로고    scopus 로고
    • Review of issues related to the loss of VA information involving the identity of millions of veterans [accessed 07.12.12].
    • Department of Veterans Affairs Office of Inspector General. Review of issues related to the loss of VA information involving the identity of millions of veterans; 2006. [accessed 07.12.12]. http://www.va.gov/oig/apps/info/OversightReports.aspx?igRT=ai/&igPG=4.
    • (2006) Department of Veterans Affairs Office of Inspector General
  • 14
    • 33947269844 scopus 로고    scopus 로고
    • Compelled authorizations for disclosure of health records: magnitude and implications
    • Rothstein M.A., Talbott M.K. Compelled authorizations for disclosure of health records: magnitude and implications. Am J Bioeth 2007, 7(3):38-45.
    • (2007) Am J Bioeth , vol.7 , Issue.3 , pp. 38-45
    • Rothstein, M.A.1    Talbott, M.K.2
  • 15
    • 58149256387 scopus 로고    scopus 로고
    • Patient opinion-EHR assessment from the users perspective
    • Zurita L., Nøhr C. Patient opinion-EHR assessment from the users perspective. Stud Health Technol Inform 2004, 107(2):1333-1336.
    • (2004) Stud Health Technol Inform , vol.107 , Issue.2 , pp. 1333-1336
    • Zurita, L.1    Nøhr, C.2
  • 16
    • 74449086435 scopus 로고    scopus 로고
    • Querschnittsbefragung von 8.000 BARMER-VersichertenzuErwartungen und EinsatzeinerelektronischenGesundheitsakte
    • [Survey on expectations and implementation of an electronic health record, in German]
    • Kirchner H, Prokosch H, Dudeck J, Jöckel KH, Lehmacher W, Gesenhues S. Querschnittsbefragung von 8.000 BARMER-VersichertenzuErwartungen und EinsatzeinerelektronischenGesundheitsakte [Survey on expectations and implementation of an electronic health record, in German]. In: Proc of the annual meeting of the GMDS; 2009.
    • (2009) Proc of the annual meeting of the GMDS
    • Kirchner, H.1    Prokosch, H.2    Dudeck, J.3    Jöckel, K.H.4    Lehmacher, W.5    Gesenhues, S.6
  • 17
    • 33846379191 scopus 로고    scopus 로고
    • Consumers are ready to accept the transition to online and electronic records if they can be assured of the security measures
    • Chhanabhai P., Holt A. Consumers are ready to accept the transition to online and electronic records if they can be assured of the security measures. Med Gen Med 2007, 9(1):8.
    • (2007) Med Gen Med , vol.9 , Issue.1 , pp. 8
    • Chhanabhai, P.1    Holt, A.2
  • 18
    • 74449083991 scopus 로고    scopus 로고
    • Attitudes and behaviors related to the introduction of electronic health records among Austrian and German citizens
    • Hoerbst A., Kohl C.D., Knaup P., Ammenwerth E. Attitudes and behaviors related to the introduction of electronic health records among Austrian and German citizens. Int J Med Inform 2010, 79(2):81-89.
    • (2010) Int J Med Inform , vol.79 , Issue.2 , pp. 81-89
    • Hoerbst, A.1    Kohl, C.D.2    Knaup, P.3    Ammenwerth, E.4
  • 20
    • 58149252163 scopus 로고    scopus 로고
    • Patient accessible electronic health records: exploring recommendations for successful implementation strategies
    • Wiljer D., Urowitz S., Apatu E., DeLenardo C., Eysenbach G., Harth T., et al. Patient accessible electronic health records: exploring recommendations for successful implementation strategies. J Med Internet Res 2008, 10(4):e34.
    • (2008) J Med Internet Res , vol.10 , Issue.4
    • Wiljer, D.1    Urowitz, S.2    Apatu, E.3    DeLenardo, C.4    Eysenbach, G.5    Harth, T.6
  • 21
    • 84891557959 scopus 로고    scopus 로고
    • The new threat: attackers that target healthcare
    • (and what you can do about it). [accessed 07.12.12].
    • Brigade T. The new threat: attackers that target healthcare (and what you can do about it). [accessed 07.12.12]. http://www.infosecwriters.com/text_resources/pdf/New_Threat_Brigade.pdf.
    • Brigade, T.1
  • 22
    • 77955431422 scopus 로고    scopus 로고
    • Security requirements engineering framework for software product lines
    • Mellado D., Fernández-Medina E., Piattini M. Security requirements engineering framework for software product lines. Inform Softw Technol 2010, 52(10):1094-1117.
    • (2010) Inform Softw Technol , vol.52 , Issue.10 , pp. 1094-1117
    • Mellado, D.1    Fernández-Medina, E.2    Piattini, M.3
  • 23
    • 79952606419 scopus 로고    scopus 로고
    • Barriers to the adoption and use of personal health record systems
    • Liu LS, Shih PC, Hayes GR. Barriers to the adoption and use of personal health record systems. In: Proc of iConference; 2011. p. 363-70.
    • (2011) Proc of iConference , pp. 363-370
    • Liu, L.S.1    Shih, P.C.2    Hayes, G.R.3
  • 24
    • 84891561647 scopus 로고    scopus 로고
    • Database state. Joseph Rowntree Reform Trust; 2009. [accessed 07.12.12].
    • Anderson R, Brown I, Dowty T, Inglesant P, Heath W, Sasse A. Database state. Joseph Rowntree Reform Trust; 2009. [accessed 07.12.12]. http://www.cl.cam.ac.uk/~rja14/Papers/database-state.pdf.
    • Anderson, R.1    Brown, I.2    Dowty, T.3    Inglesant, P.4    Heath, W.5    Sasse, A.6
  • 25
    • 84891561232 scopus 로고    scopus 로고
    • ISO 27799:2008. Health informatics - information security management in health using ISO/IEC 27002. [accessed 07.12.12].
    • ISO 27799:2008. Health informatics - information security management in health using ISO/IEC 27002. [accessed 07.12.12]. http://www.iso.org/iso/home.htm.
  • 26
    • 84872011968 scopus 로고    scopus 로고
    • The PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate health care interventions: explanation and elaboration
    • Liberati A., Altman D.G., Tetzlaff J., Mulrow C., Gøtzsche P.C., Ioannidis J.P.A., et al. The PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate health care interventions: explanation and elaboration. J Clin Epidemiol 2009, 62(10):e1-34.
    • (2009) J Clin Epidemiol , vol.62 , Issue.10
    • Liberati, A.1    Altman, D.G.2    Tetzlaff, J.3    Mulrow, C.4    Gøtzsche, P.C.5    Ioannidis, J.P.A.6
  • 27
    • 79851514417 scopus 로고    scopus 로고
    • A methodology for the pseudonymization of medical data
    • Neubauer T., Heurix J. A methodology for the pseudonymization of medical data. Int J Med Inform 2011, 80(3):190-204.
    • (2011) Int J Med Inform , vol.80 , Issue.3 , pp. 190-204
    • Neubauer, T.1    Heurix, J.2
  • 28
    • 75949087265 scopus 로고    scopus 로고
    • Critical areas of national electronic health record programs-is our focus correct?
    • Deutsch E., Duftschmid G., Dorda W. Critical areas of national electronic health record programs-is our focus correct?. Int J Med Inform 2010, 79(3):211-222.
    • (2010) Int J Med Inform , vol.79 , Issue.3 , pp. 211-222
    • Deutsch, E.1    Duftschmid, G.2    Dorda, W.3
  • 29
    • 77956652072 scopus 로고    scopus 로고
    • Human factors in information security: the insider threat - who can you trust these days?
    • Colwill C. Human factors in information security: the insider threat - who can you trust these days?. Information Security Technical Report 2009, 14(4):186-196.
    • (2009) Information Security Technical Report , vol.14 , Issue.4 , pp. 186-196
    • Colwill, C.1
  • 30
    • 41549130915 scopus 로고    scopus 로고
    • Medical record privacy and security in a digital environment
    • Kahn S., Sheshadri V. Medical record privacy and security in a digital environment. IT Professional 2008, 10(2):46-52.
    • (2008) IT Professional , vol.10 , Issue.2 , pp. 46-52
    • Kahn, S.1    Sheshadri, V.2
  • 31
    • 77955333989 scopus 로고    scopus 로고
    • A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations
    • Hu J., Chen H.H., Hou T.W. A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations. Computer Standards & Interfaces 2010, 32(5-6):274-280.
    • (2010) Computer Standards & Interfaces , vol.32 , Issue.5-6 , pp. 274-280
    • Hu, J.1    Chen, H.H.2    Hou, T.W.3
  • 32
    • 33747622542 scopus 로고    scopus 로고
    • Personal health record systems and their security protection
    • Win K.T., Susilo W., Mu Y. Personal health record systems and their security protection. J Med Syst 2006, 30(4):309-315.
    • (2006) J Med Syst , vol.30 , Issue.4 , pp. 309-315
    • Win, K.T.1    Susilo, W.2    Mu, Y.3
  • 33
    • 33947621113 scopus 로고    scopus 로고
    • Securing electronic health records without impeding the flow of information
    • Agrawal R., Johnson C. Securing electronic health records without impeding the flow of information. Int J Med Inform 2007, 76(5-6):471-479.
    • (2007) Int J Med Inform , vol.76 , Issue.5-6 , pp. 471-479
    • Agrawal, R.1    Johnson, C.2
  • 37
    • 77957968012 scopus 로고    scopus 로고
    • Security models and requirements for healthcare application clouds
    • Zhang R Liu L. Security models and requirements for healthcare application clouds. In: Proc IEEE 3rd int cloud computing (CLOUD) conf; 2010. p. 268-75.
    • (2010) Proc IEEE 3rd int cloud computing (CLOUD) conf , pp. 268-275
    • Zhang, R.1    Liu, L.2
  • 38
    • 77956230334 scopus 로고    scopus 로고
    • Cross-domain data sharing in distributed electronic health record systems
    • Sun J., Fang Y. Cross-domain data sharing in distributed electronic health record systems. IEEE Trans Parallel Distrib Syst 2010, 21(6):754-764.
    • (2010) IEEE Trans Parallel Distrib Syst , vol.21 , Issue.6 , pp. 754-764
    • Sun, J.1    Fang, Y.2
  • 41
    • 79952761041 scopus 로고    scopus 로고
    • The DEDUCE guided query tool: providing simplified access to clinical data for research and quality improvement
    • Horvath M.M., Winfield S., Evans S., Slopek S., Shang H., Ferranti J. The DEDUCE guided query tool: providing simplified access to clinical data for research and quality improvement. J Biomed Inform 2011, 44(2):266-276.
    • (2011) J Biomed Inform , vol.44 , Issue.2 , pp. 266-276
    • Horvath, M.M.1    Winfield, S.2    Evans, S.3    Slopek, S.4    Shang, H.5    Ferranti, J.6
  • 42
    • 33846576210 scopus 로고    scopus 로고
    • Audit-based access control for electronic health records
    • Dekker M., Etalle S. Audit-based access control for electronic health records. Electron Notes Theoret Comput Sci 2007, 168:221-236.
    • (2007) Electron Notes Theoret Comput Sci , vol.168 , pp. 221-236
    • Dekker, M.1    Etalle, S.2
  • 43
    • 55549122324 scopus 로고    scopus 로고
    • Situation-based access control: privacy management via modeling of patient data access scenarios
    • Peleg M., Beimel D., Dori D., Denekamp Y. Situation-based access control: privacy management via modeling of patient data access scenarios. J Biomed Inform 2008, 41(6):1028-1040.
    • (2008) J Biomed Inform , vol.41 , Issue.6 , pp. 1028-1040
    • Peleg, M.1    Beimel, D.2    Dori, D.3    Denekamp, Y.4
  • 44
    • 52649105433 scopus 로고    scopus 로고
    • Access and privacy rights using web security standards to increase patient empowerment
    • Falcão-Reis F., Costa-Pereira A., Correia M.E. Access and privacy rights using web security standards to increase patient empowerment. Stud Health Technol Inform 2008, 137:275-285.
    • (2008) Stud Health Technol Inform , vol.137 , pp. 275-285
    • Falcão-Reis, F.1    Costa-Pereira, A.2    Correia, M.E.3
  • 45
    • 49049099663 scopus 로고    scopus 로고
    • An initial model and a discussion of access control in patient controlled health records
    • Rostad L. An initial model and a discussion of access control in patient controlled health records. In: Proc conf availability, reliability and security ARES; 2008. p. 935-42.
    • (2008) Proc conf availability, reliability and security ARES , pp. 935-942
    • Rostad, L.1
  • 47
    • 59349103556 scopus 로고    scopus 로고
    • Inter-organizational future proof EHR systems. A review of the security and privacy related issues
    • van der Linden H., Kalra D., Hasman A., Talmon J. Inter-organizational future proof EHR systems. A review of the security and privacy related issues. Int J Med Inform 2009, 78(3):141-160.
    • (2009) Int J Med Inform , vol.78 , Issue.3 , pp. 141-160
    • van der Linden, H.1    Kalra, D.2    Hasman, A.3    Talmon, J.4
  • 48
    • 84891557105 scopus 로고    scopus 로고
    • ENV 13729:2000. Health informatics. Secure user identification. Strong authentication microprocessor cards. [accessed 07.12.12].
    • ENV 13729:2000. Health informatics. Secure user identification. Strong authentication microprocessor cards. [accessed 07.12.12]. http://www.freestd.us/soft/144932.htm.
  • 49
    • 78751704723 scopus 로고    scopus 로고
    • Medical record search engines, using pseudonymised patient identity: an alternative to centralised medical records
    • Quantin C., Jaquet-Chiffelle D.O., Coatrieux G., Benzenine E., Allaert F.A. Medical record search engines, using pseudonymised patient identity: an alternative to centralised medical records. Int J Med Inform 2011, 80(2):e6-11.
    • (2011) Int J Med Inform , vol.80 , Issue.2
    • Quantin, C.1    Jaquet-Chiffelle, D.O.2    Coatrieux, G.3    Benzenine, E.4    Allaert, F.A.5
  • 50
    • 20344376441 scopus 로고    scopus 로고
    • Security and confidentiality approach for the clinical e-science framework (CLEF)
    • Kalra D., Singleton P., Milan J., Mackay J., Detmer D., Rector A., et al. Security and confidentiality approach for the clinical e-science framework (CLEF). Methods Inf Med 2005, 44(2):193-197.
    • (2005) Methods Inf Med , vol.44 , Issue.2 , pp. 193-197
    • Kalra, D.1    Singleton, P.2    Milan, J.3    Mackay, J.4    Detmer, D.5    Rector, A.6
  • 51
    • 0036357623 scopus 로고    scopus 로고
    • Implementing security and access control mechanisms for an electronic healthcare record
    • Ueckert F, Prokosch HU. Implementing security and access control mechanisms for an electronic healthcare record. In: Proc AMIA symp; 2002. p. 825-9.
    • (2002) Proc AMIA symp , pp. 825-829
    • Ueckert, F.1    Prokosch, H.U.2
  • 52
    • 78650814446 scopus 로고    scopus 로고
    • An electronic health record to support patients and institutions of the health care system
    • Ueckert F., Müller M.L., Bürkle T., Prokosch H.U. An electronic health record to support patients and institutions of the health care system. Ger Med Sci 2004, 2.
    • (2004) Ger Med Sci , vol.2
    • Ueckert, F.1    Müller, M.L.2    Bürkle, T.3    Prokosch, H.U.4
  • 53
    • 0041565074 scopus 로고    scopus 로고
    • Empowerment of patients and communication with health care professionals through an electronic health record
    • Ueckert F., Goerz M., Ataian M., Tessmann S., Prokosch H.U. Empowerment of patients and communication with health care professionals through an electronic health record. Int J Med Inform 2003, 70(2-3):99-108.
    • (2003) Int J Med Inform , vol.70 , Issue.2-3 , pp. 99-108
    • Ueckert, F.1    Goerz, M.2    Ataian, M.3    Tessmann, S.4    Prokosch, H.U.5
  • 57
    • 67849099103 scopus 로고    scopus 로고
    • Privacy preservation and information security protection for patients' portable electronic health records
    • Huang L.C., Chu H.C., Lien C.Y., Hsiao C.H., Kao T. Privacy preservation and information security protection for patients' portable electronic health records. Comput Biol Med 2009, 39(9):743-750.
    • (2009) Comput Biol Med , vol.39 , Issue.9 , pp. 743-750
    • Huang, L.C.1    Chu, H.C.2    Lien, C.Y.3    Hsiao, C.H.4    Kao, T.5
  • 59
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir A. How to share a secret. Commun ACM 1979, 22(11):612-613.
    • (1979) Commun ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 60
    • 39749152423 scopus 로고    scopus 로고
    • Web-based secure access from multiple patient repositories
    • Choe J., Yoo S.K. Web-based secure access from multiple patient repositories. Int J Med Inform 2008, 77(4):242-248.
    • (2008) Int J Med Inform , vol.77 , Issue.4 , pp. 242-248
    • Choe, J.1    Yoo, S.K.2
  • 62
    • 79952752662 scopus 로고    scopus 로고
    • The Taiwanese method for providing patients data from multiple hospital EHR systems
    • Jian W.S., Wen H.C., Scholl J., Shabbir S.A., Lee P., Hsu C.Y., et al. The Taiwanese method for providing patients data from multiple hospital EHR systems. J Biomed Inform 2011, 44(2):326-332.
    • (2011) J Biomed Inform , vol.44 , Issue.2 , pp. 326-332
    • Jian, W.S.1    Wen, H.C.2    Scholl, J.3    Shabbir, S.A.4    Lee, P.5    Hsu, C.Y.6
  • 63
    • 33646041671 scopus 로고    scopus 로고
    • A secure web-based approach for accessing transitional health information for people with traumatic brain injury
    • Lemaire E.D., Deforge D., Marshall S., Curran D. A secure web-based approach for accessing transitional health information for people with traumatic brain injury. Comput Methods Programs Biomed 2006, 81(3):213-219.
    • (2006) Comput Methods Programs Biomed , vol.81 , Issue.3 , pp. 213-219
    • Lemaire, E.D.1    Deforge, D.2    Marshall, S.3    Curran, D.4
  • 64
    • 0030198936 scopus 로고    scopus 로고
    • Digital signatures and the electronic health records: providing legal and security guarantees
    • Bos J.J. Digital signatures and the electronic health records: providing legal and security guarantees. Int J Biomed Comput 1996, 42(1-2):157-163.
    • (1996) Int J Biomed Comput , vol.42 , Issue.1-2 , pp. 157-163
    • Bos, J.J.1
  • 65
    • 77956062731 scopus 로고    scopus 로고
    • An approach to access control in electronic health record
    • Sucurovic S. An approach to access control in electronic health record. J Med Syst 2010, 34(4):659-666.
    • (2010) J Med Syst , vol.34 , Issue.4 , pp. 659-666
    • Sucurovic, S.1
  • 66
    • 33947676926 scopus 로고    scopus 로고
    • Implementing security in a distributed web-based EHCR
    • Sucurovic S. Implementing security in a distributed web-based EHCR. Int J Med Inform 2007, 76(5-6):491-496.
    • (2007) Int J Med Inform , vol.76 , Issue.5-6 , pp. 491-496
    • Sucurovic, S.1
  • 67
    • 33846828664 scopus 로고    scopus 로고
    • Purposes of health identification cards and role of a secure access platform (be-health) in Belgium
    • France F.H.R., Bangels M., De-Clercq E. Purposes of health identification cards and role of a secure access platform (be-health) in Belgium. Int J Med Inform 2007, 76(2-3):84-88.
    • (2007) Int J Med Inform , vol.76 , Issue.2-3 , pp. 84-88
    • France, F.H.R.1    Bangels, M.2    De-Clercq, E.3
  • 73
    • 1842527000 scopus 로고    scopus 로고
    • A cross-platform model for secure electronic health record communication
    • Ruotsalainen P. A cross-platform model for secure electronic health record communication. Int J Med Inform 2004, 73(3):291-295.
    • (2004) Int J Med Inform , vol.73 , Issue.3 , pp. 291-295
    • Ruotsalainen, P.1
  • 74
    • 1842422494 scopus 로고    scopus 로고
    • Chief medical officer actions on information security in an Italian rehabilitation centre
    • Reni G., Molteni M., Arlotti S., Pinciroli F. Chief medical officer actions on information security in an Italian rehabilitation centre. Int J Med Inform 2004, 73(3):271-279.
    • (2004) Int J Med Inform , vol.73 , Issue.3 , pp. 271-279
    • Reni, G.1    Molteni, M.2    Arlotti, S.3    Pinciroli, F.4
  • 75
    • 33947628689 scopus 로고    scopus 로고
    • Comprehensive management of the access to the electronic patient record: towards trans-institutional networks
    • Lovis C., Spahni S., Cassoni N., Geissbuhler A. Comprehensive management of the access to the electronic patient record: towards trans-institutional networks. Int J Med Inform 2007, 76(5-6):466-470.
    • (2007) Int J Med Inform , vol.76 , Issue.5-6 , pp. 466-470
    • Lovis, C.1    Spahni, S.2    Cassoni, N.3    Geissbuhler, A.4
  • 76
    • 0345490607 scopus 로고    scopus 로고
    • Certificateless public key cryptography
    • Al-Riyami SS, Paterson KG. Certificateless public key cryptography. In: Proc ASIACRYPT; 2003. p. 452-73.
    • (2003) Proc ASIACRYPT , pp. 452-473
    • Al-Riyami, S.S.1    Paterson, K.G.2
  • 77
    • 39049126192 scopus 로고    scopus 로고
    • A study of access control requirements for healthcare systems based on audit trails from access logs
    • Rostad L, Edsberg O. A study of access control requirements for healthcare systems based on audit trails from access logs. In: Proc annual computer security applications conf; 2006. p. 175-86.
    • (2006) Proc annual computer security applications conf , pp. 175-186
    • Rostad, L.1    Edsberg, O.2
  • 78
    • 85006532875 scopus 로고    scopus 로고
    • A health information infrastructure enabling secure access to the life-long multimedia electronic health record
    • Tsiknakis M, Katehakis D, Orphanoudakis S. A health information infrastructure enabling secure access to the life-long multimedia electronic health record. In: Proc computer assisted radiology and surgery; 2004. p. 289-94.
    • (2004) Proc computer assisted radiology and surgery , pp. 289-294
    • Tsiknakis, M.1    Katehakis, D.2    Orphanoudakis, S.3
  • 79
    • 79951680016 scopus 로고    scopus 로고
    • Patient-centric authorization framework for electronic healthcare services
    • Jin J., Ahn G.J., Hu H., Covington M.J., Zhang X. Patient-centric authorization framework for electronic healthcare services. Comput Secur 2011, 30(2-3):116-127.
    • (2011) Comput Secur , vol.30 , Issue.2-3 , pp. 116-127
    • Jin, J.1    Ahn, G.J.2    Hu, H.3    Covington, M.J.4    Zhang, X.5
  • 80
    • 1842422467 scopus 로고    scopus 로고
    • Access to EHR and access control at a moment in the past: a discussion of the need and an exploration of the consequences
    • Bakker A. Access to EHR and access control at a moment in the past: a discussion of the need and an exploration of the consequences. Int J Med Inform 2004, 73(3):267-270.
    • (2004) Int J Med Inform , vol.73 , Issue.3 , pp. 267-270
    • Bakker, A.1
  • 81
    • 84891557119 scopus 로고    scopus 로고
    • ISI Journal Citation Reports (JCR); [accessed 07.12.12].
    • ISI Journal Citation Reports (JCR); 2011. [accessed 07.12.12]. http://www.accesowok.fecyt.es/jcr.
    • (2011)
  • 82
    • 84891557627 scopus 로고    scopus 로고
    • SCImago Journal Rank (SJR); [accessed 07.12.12].
    • SCImago Journal Rank (SJR); 2010. [accessed 07.12.12]. http://www.scimagojr.com/journalrank.php.
    • (2010)
  • 83
    • 84891559915 scopus 로고    scopus 로고
    • CORE. COmputing Research and Education; [accessed 07.12.12].
    • CORE. COmputing Research and Education; 2010. [accessed 07.12.12]. http://www.core.edu.au/index.php/categories/conference/%20rankings/1.
    • (2010)
  • 84
    • 84865103661 scopus 로고    scopus 로고
    • Translating standards into practice. Experience and lessons learned at the Department of Veterans Affairs
    • Bouhaddou O., Cromwell T., Davis M., Maulden S., Hsing N., Carlson D., et al. Translating standards into practice. Experience and lessons learned at the Department of Veterans Affairs. J Biomed Inform 2012, 45(4):813-823.
    • (2012) J Biomed Inform , vol.45 , Issue.4 , pp. 813-823
    • Bouhaddou, O.1    Cromwell, T.2    Davis, M.3    Maulden, S.4    Hsing, N.5    Carlson, D.6
  • 85
    • 45949087681 scopus 로고    scopus 로고
    • Advancing personalized health care through health information technology: an update from the American Health Information Community's Personalized Health Care Workgroup
    • Glaser J., Henley D.E., Downing G., Brinner K.M. Advancing personalized health care through health information technology: an update from the American Health Information Community's Personalized Health Care Workgroup. J Am Med Inform Assoc 2008, 15(4):391-396.
    • (2008) J Am Med Inform Assoc , vol.15 , Issue.4 , pp. 391-396
    • Glaser, J.1    Henley, D.E.2    Downing, G.3    Brinner, K.M.4
  • 86
    • 52049118113 scopus 로고    scopus 로고
    • Confidentiality, privacy, and security of genetic and genomic test information in electronic health records: points to consider
    • McGuire A.L., Fisher R., Cusenza P., Hudson K., Rothstein M.A., McGraw D., et al. Confidentiality, privacy, and security of genetic and genomic test information in electronic health records: points to consider. Genet Med 2008, 10(7):495-499.
    • (2008) Genet Med , vol.10 , Issue.7 , pp. 495-499
    • McGuire, A.L.1    Fisher, R.2    Cusenza, P.3    Hudson, K.4    Rothstein, M.A.5    McGraw, D.6
  • 87
    • 33645344483 scopus 로고    scopus 로고
    • A review of security of electronic health records
    • Win K.T. A review of security of electronic health records. HIM J 2005, 34(1):13-18.
    • (2005) HIM J , vol.34 , Issue.1 , pp. 13-18
    • Win, K.T.1
  • 88
    • 33748088569 scopus 로고    scopus 로고
    • Disambiguation data: extracting information from anonymized sources
    • Dreiseitl S., Vinterbo S., Ohno-Machado L. Disambiguation data: extracting information from anonymized sources. J Am Med Inform Assoc 2002, 9(6 Suppl. 1):s110-s114.
    • (2002) J Am Med Inform Assoc , vol.9 , Issue.6 SUPPL. 1
    • Dreiseitl, S.1    Vinterbo, S.2    Ohno-Machado, L.3
  • 89
    • 34548557737 scopus 로고    scopus 로고
    • Multi-centric universal pseudonymisation for secondary use of the EHR
    • Lo-Iacono L. Multi-centric universal pseudonymisation for secondary use of the EHR. Stud Health Technol Inform 2007, 126:239-247.
    • (2007) Stud Health Technol Inform , vol.126 , pp. 239-247
    • Lo-Iacono, L.1
  • 90
    • 0033772930 scopus 로고    scopus 로고
    • Protection of privacy by third-party encryption in genetic research in Iceland
    • Gulcher J.R., Kristjánsson K., Gudbjartsson H., Stefánsson K. Protection of privacy by third-party encryption in genetic research in Iceland. Eur J Hum Genet 2000, 8(10):739-742.
    • (2000) Eur J Hum Genet , vol.8 , Issue.10 , pp. 739-742
    • Gulcher, J.R.1    Kristjánsson, K.2    Gudbjartsson, H.3    Stefánsson, K.4
  • 91
    • 15544389962 scopus 로고    scopus 로고
    • Secondary use of the electronic health record via pseudonymisation
    • IOS Press, Amsterdam, L. Bos, S. Laxminarayan, A. Marsh (Eds.)
    • Pommerening K., Reng M. Secondary use of the electronic health record via pseudonymisation. Medical care compunetics 1 2004, 441-446. IOS Press, Amsterdam. L. Bos, S. Laxminarayan, A. Marsh (Eds.).
    • (2004) Medical care compunetics 1 , pp. 441-446
    • Pommerening, K.1    Reng, M.2
  • 92
    • 84878189909 scopus 로고    scopus 로고
    • European Agency for the Evaluation of Medical Products (EMEA) Committee for Proprietary Medicinal Products. Position paper on terminology in pharmacogenomics. Report No. EMEA/CPMP/3070/01, London;.
    • European Agency for the Evaluation of Medical Products (EMEA) Committee for Proprietary Medicinal Products. Position paper on terminology in pharmacogenomics. Report No. EMEA/CPMP/3070/01, London; 2002.
    • (2002)
  • 93
    • 0036811662 scopus 로고    scopus 로고
    • K-anonymity: a model for protecting privacy
    • Sweeney L. K-anonymity: a model for protecting privacy. Int J Uncertain Fuzzy Knowl-Based Syst 2002, 10(5):557-570.
    • (2002) Int J Uncertain Fuzzy Knowl-Based Syst , vol.10 , Issue.5 , pp. 557-570
    • Sweeney, L.1
  • 94
    • 0036356364 scopus 로고    scopus 로고
    • A proposed key escrow system for secure patient information disclosure in biomedical research databases
    • Ferris TA, Garrison GM, Lowe HJ. A proposed key escrow system for secure patient information disclosure in biomedical research databases. In: Proc AMIA symp; 2002. p. 245-9.
    • (2002) Proc AMIA symp , pp. 245-249
    • Ferris, T.A.1    Garrison, G.M.2    Lowe, H.J.3
  • 95
    • 0037768626 scopus 로고    scopus 로고
    • Privacy enhancing techniques - the key to secure communication and management of clinical and genomic data
    • De-Moor G.J.E., Claerhout B., De-Meyer F. Privacy enhancing techniques - the key to secure communication and management of clinical and genomic data. Methods Inf Med 2003, 42(2):148-153.
    • (2003) Methods Inf Med , vol.42 , Issue.2 , pp. 148-153
    • De-Moor, G.J.E.1    Claerhout, B.2    De-Meyer, F.3
  • 97
    • 77954061524 scopus 로고    scopus 로고
    • Embedding a hiding function in a portable electronic health record for privacy preservation
    • Huang L.C., Chu H.C., Lien C.Y., Hsiao C.H., Kao T. Embedding a hiding function in a portable electronic health record for privacy preservation. J Med Syst 2010, 34(3):313-320.
    • (2010) J Med Syst , vol.34 , Issue.3 , pp. 313-320
    • Huang, L.C.1    Chu, H.C.2    Lien, C.Y.3    Hsiao, C.H.4    Kao, T.5
  • 98
    • 84862293738 scopus 로고    scopus 로고
    • Strategies for de-identification and anonymization of electronic health record data for use in multicenter research studies
    • Kushida C.A., Nichols D.A., Jadrnicek R., Miller R., Walsh J.K., Griffin K. Strategies for de-identification and anonymization of electronic health record data for use in multicenter research studies. Med Care 2012, 50:S82-S101.
    • (2012) Med Care , vol.50
    • Kushida, C.A.1    Nichols, D.A.2    Jadrnicek, R.3    Miller, R.4    Walsh, J.K.5    Griffin, K.6
  • 99
    • 67349221790 scopus 로고    scopus 로고
    • A pixel-based scrambling scheme for digital medical images protection
    • Hu J., Han F. A pixel-based scrambling scheme for digital medical images protection. J Netw Comput Appl 2009, 32(4):788-794.
    • (2009) J Netw Comput Appl , vol.32 , Issue.4 , pp. 788-794
    • Hu, J.1    Han, F.2
  • 100
    • 0036452648 scopus 로고    scopus 로고
    • Networking in shared care-first steps towards a shared electronic patient record for cancer patients
    • van-der-Haak M., Mludek V., Wolff A.C., Bülzebruck H., Oetzel D., Zierhut D., et al. Networking in shared care-first steps towards a shared electronic patient record for cancer patients. Methods Inf Med 2002, 41(5):419-425.
    • (2002) Methods Inf Med , vol.41 , Issue.5 , pp. 419-425
    • van-der-Haak, M.1    Mludek, V.2    Wolff, A.C.3    Bülzebruck, H.4    Oetzel, D.5    Zierhut, D.6
  • 101
    • 0347415586 scopus 로고    scopus 로고
    • Patient privacy in electronic prescription transfer
    • Ball E., Chadwick D.W., Mundy D. Patient privacy in electronic prescription transfer. IEEE Secur Privacy 2003, 1(2):77-80.
    • (2003) IEEE Secur Privacy , vol.1 , Issue.2 , pp. 77-80
    • Ball, E.1    Chadwick, D.W.2    Mundy, D.3
  • 102
    • 84891560430 scopus 로고    scopus 로고
    • How to tamper with electronic health records. [accessed 07.12.12].
    • Horst H. How to tamper with electronic health records. [accessed 07.12.12]. http://www.gnumed.net/gnotary/tampering.html.
    • Horst, H.1
  • 103
    • 1842527023 scopus 로고    scopus 로고
    • The legal knowledge of the electronic signature: a key for a secure direct access of patients to their computerised medical record
    • Allaert F., Le-Teuff G., Quantin C., Barber B. The legal knowledge of the electronic signature: a key for a secure direct access of patients to their computerised medical record. Int J Med Inform 2004, 73:239-242.
    • (2004) Int J Med Inform , vol.73 , pp. 239-242
    • Allaert, F.1    Le-Teuff, G.2    Quantin, C.3    Barber, B.4
  • 104
    • 13844266517 scopus 로고    scopus 로고
    • Internet security and privacy protection for the health care professional
    • Alban R.F., Feldmar D., Gabbay J., Lefor A.T. Internet security and privacy protection for the health care professional. Current Surgery 2005, 62:106-110.
    • (2005) Current Surgery , vol.62 , pp. 106-110
    • Alban, R.F.1    Feldmar, D.2    Gabbay, J.3    Lefor, A.T.4
  • 105
    • 18044367110 scopus 로고    scopus 로고
    • Wireless technology infrastructures for authentication of patients: PKI that rings
    • Sax U., Kohane I., Mandl K.D. Wireless technology infrastructures for authentication of patients: PKI that rings. J Am Med Inform Assoc 2005, 12(3):263-268.
    • (2005) J Am Med Inform Assoc , vol.12 , Issue.3 , pp. 263-268
    • Sax, U.1    Kohane, I.2    Mandl, K.D.3
  • 107
    • 33947528272 scopus 로고    scopus 로고
    • A fingerprint orientation model based on 2D Fourier expansion (FOMFE) and its application to singular-point detection and fingerprint indexing
    • Wang Y., Hu J., Phillips D. A fingerprint orientation model based on 2D Fourier expansion (FOMFE) and its application to singular-point detection and fingerprint indexing. IEEE Trans Pattern Anal Mach Intel 2007, 29:573-585.
    • (2007) IEEE Trans Pattern Anal Mach Intel , vol.29 , pp. 573-585
    • Wang, Y.1    Hu, J.2    Phillips, D.3
  • 108
    • 33947492044 scopus 로고    scopus 로고
    • From template to image: reconstructing fingerprints from minutiae points
    • Ross A., Shah J., Jain A.K. From template to image: reconstructing fingerprints from minutiae points. IEEE Trans Pattern Anal Mach Intel 2007, 29:544-560.
    • (2007) IEEE Trans Pattern Anal Mach Intel , vol.29 , pp. 544-560
    • Ross, A.1    Shah, J.2    Jain, A.K.3
  • 109
    • 84891557426 scopus 로고    scopus 로고
    • Liberty Alliance Project, [accessed 07.12.12].
    • Liberty Alliance Project 2009. [accessed 07.12.12]. http://www.projectliberty.org.
    • (2009)
  • 110
    • 43049170120 scopus 로고    scopus 로고
    • The challenge of federated identity management
    • Smith D. The challenge of federated identity management. Network Security 2008, 2008(4):7-9.
    • (2008) Network Security , vol.2008 , Issue.4 , pp. 7-9
    • Smith, D.1
  • 111
    • 57349200762 scopus 로고    scopus 로고
    • Privacy, confidentiality and electronic medical records
    • Barrows R.J., Clayton P. Privacy, confidentiality and electronic medical records. J Am Med Inform Assoc 1996, 3:139-148.
    • (1996) J Am Med Inform Assoc , vol.3 , pp. 139-148
    • Barrows, R.J.1    Clayton, P.2
  • 112
    • 79959638566 scopus 로고    scopus 로고
    • Using statistical and machine learning to help institutions detect suspicious access to electronic health records
    • Boxwala A.A., Kim J., Grillo J.M., Ohno-Machado L. Using statistical and machine learning to help institutions detect suspicious access to electronic health records. J Am Med Inform Assoc 2011, 18(4):498-505.
    • (2011) J Am Med Inform Assoc , vol.18 , Issue.4 , pp. 498-505
    • Boxwala, A.A.1    Kim, J.2    Grillo, J.M.3    Ohno-Machado, L.4
  • 114
    • 1842474926 scopus 로고    scopus 로고
    • Authorisation and access control for electronic health record systems
    • Blobel B. Authorisation and access control for electronic health record systems. Int J Med Inform 2004, 73(3):251-257.
    • (2004) Int J Med Inform , vol.73 , Issue.3 , pp. 251-257
    • Blobel, B.1
  • 117
    • 84891558309 scopus 로고    scopus 로고
    • Standard Guide for Information Access Privileges to Health Information, ASTM E1986-98; [accessed 07.12.12].
    • Standard Guide for Information Access Privileges to Health Information, ASTM E1986-98; 2005. [accessed 07.12.12]. http://www.astm.org/DATABASE.CART/HISTORICAL/E1986-98R05.htm.
    • (2005)
  • 118
    • 84891559679 scopus 로고    scopus 로고
    • ISO DTS 21298 Functional and structural roles. [accessed 07.12.12].
    • ISO DTS 21298 Functional and structural roles. [accessed 07.12.12]. http://www.iso.org/iso/home.htm.
  • 119
    • 84891559111 scopus 로고    scopus 로고
    • American National Standard Institute (ANSI). American National Standard for information technology: role based access control. Technical Report ANSI INCITS 359-2004; [accessed 07.12.12].
    • American National Standard Institute (ANSI). American National Standard for information technology: role based access control. Technical Report ANSI INCITS 359-2004; 2004. [accessed 07.12.12]. http://www.csrc.nist.gov/rbac/EDACcompliance.pdf.
    • (2004)
  • 120
    • 37249020924 scopus 로고    scopus 로고
    • A critique of the ANSI Standard on role-based access control
    • Li N., Byun J.W., Bertino E. A critique of the ANSI Standard on role-based access control. IEEE Security Privacy 2007, 5(6):41-49.
    • (2007) IEEE Security Privacy , vol.5 , Issue.6 , pp. 41-49
    • Li, N.1    Byun, J.W.2    Bertino, E.3
  • 121
  • 122
    • 0142151165 scopus 로고    scopus 로고
    • A contextual role-based access control authorization model for electronic patient record
    • Motta G.H., Furuie S.S. A contextual role-based access control authorization model for electronic patient record. IEEE Trans Inf Technol Biomed 2003, 7(3):202-207.
    • (2003) IEEE Trans Inf Technol Biomed , vol.7 , Issue.3 , pp. 202-207
    • Motta, G.H.1    Furuie, S.S.2
  • 123
    • 77957235707 scopus 로고    scopus 로고
    • Special requirements of electronic medical record systems in obstetrics and gynecology
    • Bates G.W. Special requirements of electronic medical record systems in obstetrics and gynecology. Obstet Gynecol 2010, 116(4):994.
    • (2010) Obstet Gynecol , vol.116 , Issue.4 , pp. 994
    • Bates, G.W.1
  • 125
    • 84891558231 scopus 로고    scopus 로고
    • ISO/TS 22600-1 Health informatics-Privilege management and access control-Part 1: Overview and policy management. ISO 2006. [accessed 07.12.12].
    • ISO/TS 22600-1 Health informatics-Privilege management and access control-Part 1: Overview and policy management. ISO 2006. [accessed 07.12.12]. http://www.iso.org/iso/home.htm.
  • 126
    • 84891559171 scopus 로고    scopus 로고
    • ISO/TS 22600-2 Health informatics-Privilege management and access control-Part 2: Formal models;. [accessed 07.12.12].
    • ISO/TS 22600-2 Health informatics-Privilege management and access control-Part 2: Formal models; 2006. [accessed 07.12.12]. http://www.iso.org/iso/home.htm.
    • (2006)
  • 128
    • 84878173179 scopus 로고    scopus 로고
    • US Department of Health and Human Services, Office for Civil Rights. Standards for protection of electronic health information; final rule. Federal Register 45 cfr: pt. 164;.
    • US Department of Health and Human Services, Office for Civil Rights. Standards for protection of electronic health information; final rule. Federal Register 45 cfr: pt. 164; 2003.
    • (2003)
  • 129
    • 32044472250 scopus 로고    scopus 로고
    • Web-based personal health record systems evaluation
    • Win K.T. Web-based personal health record systems evaluation. Int J Healthcare Technol Manage 2006, 7(3-4):208-217.
    • (2006) Int J Healthcare Technol Manage , vol.7 , Issue.3-4 , pp. 208-217
    • Win, K.T.1
  • 130
    • 60649102513 scopus 로고    scopus 로고
    • A qualitative analysis of an electronic health record (EHR) implementation in an academic ambulatory setting
    • Yoon-Flannery K., Zandieh S.O., Kuperman G.J., Langsam D.J., Hyman D., Kaushal R. A qualitative analysis of an electronic health record (EHR) implementation in an academic ambulatory setting. Inform Prim Care 2008, 16(4):277-284.
    • (2008) Inform Prim Care , vol.16 , Issue.4 , pp. 277-284
    • Yoon-Flannery, K.1    Zandieh, S.O.2    Kuperman, G.J.3    Langsam, D.J.4    Hyman, D.5    Kaushal, R.6
  • 131
    • 35348898546 scopus 로고    scopus 로고
    • The story behind the story: physician skepticism about relying on clinical information technologies to reduce medical errors
    • McAlearney A.S., Chisolm D.J., Schweikhart S., Medow M.A., Kelleher K. The story behind the story: physician skepticism about relying on clinical information technologies to reduce medical errors. Int J Med Inform 2007, 76(11-12):836-842.
    • (2007) Int J Med Inform , vol.76 , Issue.11-12 , pp. 836-842
    • McAlearney, A.S.1    Chisolm, D.J.2    Schweikhart, S.3    Medow, M.A.4    Kelleher, K.5
  • 132
    • 14544304095 scopus 로고    scopus 로고
    • Role of computerized physician order entry systems in facilitating medication errors
    • Koppel R., Metlay J.P., Cohen A., Abaluck B., Localio A.R., Kimmel S.E., et al. Role of computerized physician order entry systems in facilitating medication errors. JAMA 2005, 293(10):1197-1203.
    • (2005) JAMA , vol.293 , Issue.10 , pp. 1197-1203
    • Koppel, R.1    Metlay, J.P.2    Cohen, A.3    Abaluck, B.4    Localio, A.R.5    Kimmel, S.E.6
  • 133
    • 71549166995 scopus 로고    scopus 로고
    • The health information system security threat lifecycle: an informatics theory
    • Fernando J., Dawson L. The health information system security threat lifecycle: an informatics theory. Int J Med Inform 2009, 78(12):815-826.
    • (2009) Int J Med Inform , vol.78 , Issue.12 , pp. 815-826
    • Fernando, J.1    Dawson, L.2
  • 134
    • 71549131048 scopus 로고    scopus 로고
    • Clinician assessments of workplace security training-an informatics perspective
    • Fernando J., Dawson L. Clinician assessments of workplace security training-an informatics perspective. eJHI 2008, 3(1):e7.
    • (2008) eJHI , vol.3 , Issue.1
    • Fernando, J.1    Dawson, L.2
  • 135
    • 84891555432 scopus 로고    scopus 로고
    • AHIMA. The state of HIPAA privacy and security compliance, April. [accessed 07.12.12].
    • AHIMA. The state of HIPAA privacy and security compliance, April 2006. [accessed 07.12.12]. http://www.library.ahima.org/xpedio/groups/public/documents/ahima/bok1_022739.pdf.
    • (2006)
  • 136
    • 0036490572 scopus 로고    scopus 로고
    • Giving patients access to their medical records via the internet: the PCASSO experience
    • Masys D., Baker D., Butros A., Cowles K.E. Giving patients access to their medical records via the internet: the PCASSO experience. J Am Med Inform Assoc 2002, 9(2):181-191.
    • (2002) J Am Med Inform Assoc , vol.9 , Issue.2 , pp. 181-191
    • Masys, D.1    Baker, D.2    Butros, A.3    Cowles, K.E.4
  • 137
    • 0034316956 scopus 로고    scopus 로고
    • Cognitive models in training health professionals to protect patients' confidential information
    • Patel V.L., Arocha J.F., Shortliffe E.H. Cognitive models in training health professionals to protect patients' confidential information. Int J Med Inform 2000, 60(2):143-150.
    • (2000) Int J Med Inform , vol.60 , Issue.2 , pp. 143-150
    • Patel, V.L.1    Arocha, J.F.2    Shortliffe, E.H.3
  • 138
    • 80053014514 scopus 로고    scopus 로고
    • Electronic health record: wiring Europe's healthcare
    • Kierkegaard P. Electronic health record: wiring Europe's healthcare. Comput Law Security Rev 2011, 27(5):503-515.
    • (2011) Comput Law Security Rev , vol.27 , Issue.5 , pp. 503-515
    • Kierkegaard, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.