-
1
-
-
84875548667
-
Secure electronic health record exchange: Achieving the meaningful use objectives
-
Wailea, Hawaii, USA, (accessed 23 August 2013)
-
Acharya, S., Coats, B., Saluja, A. and Fuller, D. (2013). Secure electronic health record exchange: achieving the meaningful use objectives. 46th Hawaii International Conference on System Sciences. Wailea, Hawaii, USA, 2555-2564. Available at: http://www.computer.org/csdl/proceedings/hicss/2013/4892/00/4892c555.pdf (accessed 23 August 2013).
-
(2013)
46Th Hawaii International Conference on System Sciences
, pp. 2555-2564
-
-
Acharya, S.1
Coats, B.2
Saluja, A.3
Fuller, D.4
-
2
-
-
85182126990
-
-
Trusted framework for health information exchange. Frontiers of Information Technology, Islamabad, (accessed 23 August 2013)
-
Afzal, M., Hussain, M., Ahmad, M. and Anwar, Z. (2011). Trusted framework for health information exchange. Frontiers of Information Technology, Islamabad. Available at: http://www.computer.org/csdl/proceedings/fit/2011/4625/00/4625a308.pdf (accessed 23 August 2013).
-
(2011)
-
-
Afzal, M.1
Hussain, M.2
Ahmad, M.3
Anwar, Z.4
-
3
-
-
84878948803
-
A novel system architecture for the national integration of electronic health records: A semi-centralized approach
-
Aljarullah, A. and El-Masri, S. (2012). A novel system architecture for the national integration of electronic health records: a semi-centralized approach. Journal of Medical Systems 37(4): 9953.
-
(2012)
Journal of Medical Systems
, vol.37
, Issue.4
, pp. 9953
-
-
Aljarullah, A.1
El-Masri, S.2
-
4
-
-
0033135172
-
PCASSO: A design for secure communication of personal health information via the internet
-
Bakers, D.B. and Masys, D.R. (1999). PCASSO: a design for secure communication of personal health information via the internet. International Journal of Medical Informatics 54(2): 97-104.
-
(1999)
International Journal of Medical Informatics
, vol.54
, Issue.2
, pp. 97-104
-
-
Bakers, D.B.1
Masys, D.R.2
-
8
-
-
0035004828
-
A systematic approach for analysis and design of secure health information systems
-
Blobel, B. and Roger-France, F. (2001). A systematic approach for analysis and design of secure health information systems. International Journal of Medical Informatics 62(1): 51-78.
-
(2001)
International Journal of Medical Informatics
, vol.62
, Issue.1
, pp. 51-78
-
-
Blobel, B.1
Roger-France, F.2
-
9
-
-
1842474926
-
Authorization and access control for electronic health record systems
-
Blobel, B. (2004). Authorization and access control for electronic health record systems. International Journal of Medical Informatics 73(3):251-257.
-
(2004)
International Journal of Medical Informatics
, vol.73
, Issue.3
, pp. 251-257
-
-
Blobel, B.1
-
10
-
-
33846828667
-
A model driven approach for the German health telematics architectural framework and security infrastructure
-
Blobel, B. and Pharow, P. (2007). A model driven approach for the German health telematics architectural framework and security infrastructure. International Journal of Medical Informatics 76(2-3): 169-175.
-
(2007)
International Journal of Medical Informatics
, vol.7
, Issue.2-3
, pp. 169-175
-
-
Blobel, B.1
Pharow, P.2
-
12
-
-
84868628586
-
Standards for health information technology to ensure adolescent privacy
-
Blythe, M.J. et al. (2012). Standards for health information technology to ensure adolescent privacy. Pediatrics 130(5): 987-990.
-
(2012)
Pediatrics
, vol.130
, Issue.5
, pp. 987-990
-
-
Blythe, M.J.1
-
13
-
-
84865103661
-
Translating standards into practice: Experience and lessons learned at the Department of Veterans Affairs
-
Bouhaddou, O., Cromwell, T., Davis, M., Maulden, S., Hsing, N., Carlson, D., Cockle, J., Hoang, C. and Fischetti, L. (2012). Translating standards into practice: experience and lessons learned at the Department of Veterans Affairs. Journal of Biomedical Informatics 45(4): 813-823.
-
(2012)
Journal of Biomedical Informatics
, vol.45
, Issue.4
, pp. 813-823
-
-
Bouhaddou, O.1
Cromwell, T.2
Davis, M.3
Maulden, S.4
Hsing, N.5
Carlson, D.6
Cockle, J.7
Hoang, C.8
Fischetti, L.9
-
15
-
-
84881244028
-
The privacy and security of occupational health records
-
Burton, B., Cothran, C., Davis, N., Dooling, J., Dunn, R., Jensen, J., Odia, G., Rose, A. D. and Twiggs, M. (2013). The privacy and security of occupational health records. Journal of AHIMA/American Health Information Management Association 84(4): 52-56.
-
(2013)
Journal of Ahima/American Health Information Management Association
, vol.84
, Issue.4
, pp. 52-56
-
-
Burton, B.1
Cothran, C.2
Davis, N.3
Dooling, J.4
Dunn, R.5
Jensen, J.6
Odia, G.7
Rose, A.D.8
Twiggs, M.9
-
16
-
-
84867313640
-
A secure EHR system based on hybrid clouds
-
Chen, Y.Y., Lu, J.C. and Jan, J.K. (2012). A secure EHR system based on hybrid clouds. Journal of Medical Systems 36(5): 3375-3384.
-
(2012)
Journal of Medical Systems
, vol.36
, Issue.5
, pp. 3375-3384
-
-
Chen, Y.Y.1
Lu, J.C.2
Jan, J.K.3
-
17
-
-
84867855240
-
Secure dynamic access control scheme of PHR in cloud computing
-
Chen, T.S., Liu, C.H., Chen, T.L., Chen, C.S., Bau, J.G. and Lin, T.C. (2012). Secure dynamic access control scheme of PHR in cloud computing. Journal of Medical Systems 36(6): 4005-4020.
-
(2012)
Journal of Medical Systems
, vol.36
, Issue.6
, pp. 4005-4020
-
-
Chen, T.S.1
Liu, C.H.2
Chen, T.L.3
Chen, C.S.4
Bau, J.G.5
Lin, T.C.6
-
18
-
-
84875014632
-
Segmenting data privacy. Cross-industry initiative aims to piece out privacy within the health record
-
Coleman, J. (2013). Segmenting data privacy. Cross-industry initiative aims to piece out privacy within the health record. Journal of AHIMA/ American Health Information Management Association 84(2): 34-38.
-
(2013)
Journal of AHIMA/ American Health Information Management Association
, vol.84
, Issue.2
, pp. 34-38
-
-
Coleman, J.1
-
19
-
-
85182111782
-
-
CORE, (accessed 8 December 2013)
-
CORE (2012). The CORE Conference Ranking Exercise. Available at: www.core.edu.au/coreportal (accessed 8 December 2013).
-
(2012)
The CORE Conference Ranking Exercise
-
-
-
20
-
-
85182124564
-
-
CWTS Journal Indicators, SNIP indicator, (accessed 8 December 2013)
-
CWTS Journal Indicators (2012). SNIP indicator. Available at: http://www.journalindicators.com (accessed 8 December 2013).
-
(2012)
-
-
-
21
-
-
81155159565
-
-
Chichester, John Wiley & Sons Ltd
-
Deeks, J., Higgins, J., and Altman, D. (2003). Cochrane Reviewers’ Handbook 4.2.1. The Cochrane Library. Chichester, John Wiley Sons Ltd.
-
(2003)
Cochrane Reviewers’ Handbook 4.2.1. The Cochrane Library
-
-
Deeks, J.1
Higgins, J.2
Altman, D.3
-
22
-
-
84893573899
-
A systematic review on aspects in software architecture design
-
Valparaiso, (accessed 20 March 2013)
-
De Oliveira, K.S. and Soares, M.S. (2012). A systematic review on aspects in software architecture design. International Conference of the Chilean Computer Science Society, 21-28, Valparaiso. Available: http://www.computer.org/csdl/proceedings/sccc/2012/2938/00/2937a021.pdf (accessed 20 March 2013).
-
(2012)
International Conference of the Chilean Computer Science Society
, pp. 21-28
-
-
De Oliveira, K.S.1
Soares, M.S.2
-
23
-
-
84892489103
-
The relationship between requirements engineering and virtual reality systems: A systematic literature review
-
Cuiaba, (accessed 20 March 2013)
-
Dos Santos, A.C.C, Delamaro, M.E. and Nunes, F.L.S. (2013). The relationship between requirements engineering and virtual reality systems: A systematic literature review. XV Symposium on Virtual and Augmented Reality: 53-62. Cuiaba. Available at: http://dl.acm.org/citation.cfm?id=2511560 (accessed 20 March 2013).
-
(2013)
XV Symposium on Virtual and Augmented Reality
, pp. 53-62
-
-
Dos Santos, A.1
Delamaro, M.E.2
Nunes, F.3
-
24
-
-
84878197970
-
Security and privacy in electronic health records: A systematic literature review
-
Fernández-Alemán, J. L., Señor, I. C., Lozoya, P. T. O. and Toval, A. (2013). Security and privacy in electronic health records: a systematic literature review. Journal of Biomedical Informatics 46(3): 541-562.
-
(2013)
Journal of Biomedical Informatics
, vol.46
, Issue.3
, pp. 541-562
-
-
Fernández-Alemán, J.L.1
Señor, I.C.2
Lozoya, P.T.O.3
Toval, A.4
-
25
-
-
78649947856
-
Functionalities of free and open electronic health record systems
-
Flores Zuniga, A.E., Win, K.T. and Susilo, W. (2010). Functionalities of free and open electronic health record systems. International Journal of Technology Assessment in Health Care 26(4): 382-389.
-
(2010)
International Journal of Technology Assessment in Health Care
, vol.26
, Issue.4
, pp. 382-389
-
-
Flores Zuniga, A.E.1
Win, K.T.2
Susilo, W.3
-
26
-
-
84877683559
-
User-centric private matching for eHealth networks - a social perspective
-
Anaheim, California, (accessed 23 August 2013)
-
Guo L, Liu X, Fang Y and Li X. (2012).User-centric private matching for eHealth networks - a social perspective. Globecom 2012 IEEE - Communication and Information System Security Symposium, Anaheim, California. Available at: IEEE Xplore,http://www.ieee.org (accessed 23 August 2013).
-
(2012)
Globecom 2012 IEEE - Communication and Information System Security Symposium
-
-
Guo, L.1
Liu, X.2
Fang, Y.3
Li, X.4
-
27
-
-
70049099036
-
Chapter 8: Assessing risk of bias in included studies
-
Version 5.1.0 [updated March 2011]. J. Higgins & S. Green (Eds)
-
Higgins, J., Altman, D.G. and Sterne, J.A.C. (Eds) (2011). Chapter 8: Assessing risk of bias in included studies. In: Cochrane Handbook for Systematic Reviews of Interventions Version 5.1.0 [updated March 2011]. J. Higgins S. Green (Eds). Available at: http://www.cochrane-handbook.org (accessed 13 April 2015).
-
(2011)
Cochrane Handbook for Systematic Reviews of Interventions
-
-
Higgins, J.1
Altman, D.G.2
Sterne, J.3
-
28
-
-
84975290306
-
-
Health Level Seven International (HL7), (accessed 5 January 2014)
-
Health Level Seven International (HL7) (2013). Introduction to HL7standards. Available at: http://www.hl7.org/implement/standards/ (accessed 5 January 2014).
-
(2013)
Introduction to Hl7standards
-
-
-
29
-
-
84867310487
-
A secure integrated medical information system
-
Hsiao, T.C., Wu, Z.Y., Chung, Y.F., Chen, T.S. and Horng, G.B. (2012). A secure integrated medical information system. Journal of Medical Systems 36(5): 3103-3113.
-
(2012)
Journal of Medical Systems
, vol.36
, Issue.5
, pp. 3103-3113
-
-
Hsiao, T.C.1
Wu, Z.Y.2
Chung, Y.F.3
Chen, T.S.4
Horng, G.B.5
-
31
-
-
84867301818
-
A privacy-strengthened scheme for e-healthcare monitoring systems
-
Huang, C., Lee, H. and Lee, D.H. (2012). A privacy-strengthened scheme for e-healthcare monitoring systems. Journal of Medical Systems 36(5): 2959-2971.
-
(2012)
Journal of Medical Systems
, vol.36
, Issue.5
, pp. 2959-2971
-
-
Huang, C.1
Lee, H.2
Lee, D.H.3
-
32
-
-
85136567564
-
A hierarchical framework for secure and scalable EHR sharing and access control in multi-cloud
-
Pittsburgh, Pennsylvania, USA
-
Huang, J., Sharaf, M. and Huang, C.T. (2013). A hierarchical framework for secure and scalable EHR sharing and access control in multi-cloud. 41st International Conference on Parallel Processing Workshops, Pittsburgh, Pennsylvania, USA. Available at: IEEE Xplore,http://www.ieee.org (accessed 23 August 2013).
-
(2013)
41St International Conference on Parallel Processing Workshops
-
-
Huang, J.1
Sharaf, M.2
Huang, C.T.3
-
33
-
-
84874611075
-
Electronic health records in an occupational health setting - Part I. A global overview
-
Hunter, E.S. (2013). Electronic health records in an occupational health setting - Part I. A global overview. Workplace Health and Safety 61(2): 57-60.
-
(2013)
Workplace Health and Safety
, vol.61
, Issue.2
, pp. 57-60
-
-
Hunter, E.S.1
-
34
-
-
85182140255
-
-
ISO, ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security controls, (accessed 2 December 2013)
-
ISO (2013). ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security controls. Available at: http://www.iso.org/iso/home.html (accessed 2 December 2013)
-
(2013)
-
-
-
35
-
-
85182119620
-
-
ISO, ISO/IEC 29100 Information technology — Security techniques — Privacy framework, (accessed 2 December 2013)
-
ISO (2011). ISO/IEC 29100 Information technology — Security techniques — Privacy framework, Available at: http://www.iso.org/iso/home.html (accessed 2 December 2013).
-
(2011)
-
-
-
36
-
-
85182121558
-
-
ISO, ISO 27799 Information security management in health using ISO/IEC 27002, (accessed 15 March 2013)
-
ISO (2008). ISO 27799 Information security management in health using ISO/IEC 27002, Available at: http://www. iso.org/iso/home.html (accessed 15 March 2013).
-
(2008)
-
-
-
37
-
-
84877914835
-
Proposing an intelligent cloud-based electronic health record system
-
Khansa, L., Forcade, J., Nambari, G., Parasuraman, S. and Cox, P. (2012). Proposing an intelligent cloud-based electronic health record system. International Journal of Business Data Communications and Networking 8(3): 57-71.
-
(2012)
International Journal of Business Data Communications and Networking
, vol.8
, Issue.3
, pp. 57-71
-
-
Khansa, L.1
Forcade, J.2
Nambari, G.3
Parasuraman, S.4
Cox, P.5
-
38
-
-
84879287509
-
Security in healthcare informatics: Design and implementation of a robust authentication and a hybrid access control mechanism
-
Istanbul, Turkey
-
Khan, M.F.F. and Sakamura, K. (2012). Security in healthcare informatics: design and implementation of a robust authentication and a hybrid access control mechanism. The 5th International Conference on Communications, Computers and Applications (MIC-CCA2012), Istanbul, Turkey. Available at: IEEE Xplore,http://www.ieee.org (accessed 23 August 2013).
-
(2012)
The 5Th International Conference on Communications, Computers and Applications (MIC-CCA2012)
-
-
Khan, M.F.F.1
Sakamura, K.2
-
39
-
-
85182110543
-
-
Undertaking systematic reviews of research on effectiveness: CRD’s guidance for carrying out or commissioning reviews No. 4 (2nd ed.). NHS Centre for Reviews and Dissemination
-
Khan, K. S., Ter Riet, G., Glanville, J., Sowden, A. J. and Kleijnen, J. (2001). Undertaking systematic reviews of research on effectiveness: CRD’s guidance for carrying out or commissioning reviews No. 4 (2nd ed.). NHS Centre for Reviews and Dissemination.
-
(2001)
-
-
Khan, K.S.1
Ter Riet, G.2
Glanville, J.3
Sowden, A.J.4
Kleijnen, J.5
-
40
-
-
56649086628
-
Systematic literature reviews in software engineering: A systematic literature review
-
Kitchenham, B.A., Pearl Brereton, O., Budgen, D., Turner, M., Bailey, J. and Linkman, S. (2009). Systematic literature reviews in software engineering: a systematic literature review. Information and Software Technology 51(1): 7-15.
-
(2009)
Information and Software Technology
, vol.51
, Issue.1
, pp. 7-15
-
-
Kitchenham, B.A.1
Pearl Brereton, O.2
Budgen, D.3
Turner, M.4
Bailey, J.5
Linkman, S.6
-
41
-
-
27644567603
-
-
Technical Report TR/SE-0401. Keele, UK, Keele University NICTA Technical Report 0400011T.1
-
Kitchenham, B.A. (2004). Procedures for performing systematic reviews. Technical Report TR/SE-0401. Keele, UK, Keele University NICTA Technical Report 0400011T.1.
-
(2004)
Procedures for Performing Systematic Reviews
-
-
Kitchenham, B.A.1
-
42
-
-
84885174213
-
A systematic review of systematic review process research in software engineering
-
Kitchenham, B.A. and Brereton, P. (2013). A systematic review of systematic review process research in software engineering. Information and Software Technology 55(12): 2049-2075.
-
(2013)
Information and Software Technology
, vol.55
, Issue.12
, pp. 2049-2075
-
-
Kitchenham, B.A.1
Brereton, P.2
-
43
-
-
69149107727
-
The PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate health care interventions: Explanation and elaboration
-
Liberati, A., Altman, D. G., Tetzlaff, J., Mulrow, C., Gøtzsche, P. C., Ioannidis, J. P., et al. (2009). The PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate health care interventions: explanation and elaboration. Annals of Internal Medicine 151(4): W-65-W-94.
-
(2009)
Annals of Internal Medicine
, vol.151
, Issue.4
, pp. 65-94
-
-
Liberati, A.1
Altman, D.G.2
Tetzlaff, J.3
Mulrow, C.4
Gøtzsche, P.C.5
Ioannidis, J.P.6
-
44
-
-
84864062006
-
The enhancement of security in healthcare information systems
-
Liu, C.H., Chung, Y.F., Chen, T.S. and Wang, S.D. (2012). The enhancement of security in healthcare information systems. Journal of Medical Systems 36(3): 1673-1688.
-
(2012)
Journal of Medical Systems
, vol.36
, Issue.3
, pp. 1673-1688
-
-
Liu, C.H.1
Chung, Y.F.2
Chen, T.S.3
Wang, S.D.4
-
45
-
-
80053224147
-
Design and development of an international clinical data exchange system: The international layer function of the Dolphin Project
-
Li, J. S., Zhou, T. S., Chu, J., Araki, K. and Yoshihara, H. (2011). Design and development of an international clinical data exchange system: the international layer function of the Dolphin Project. Journal of the American Medical Informatics Association 18(5): 683-689.
-
(2011)
Journal of the American Medical Informatics Association
, vol.18
, Issue.5
, pp. 683-689
-
-
Li, J.S.1
Zhou, T.S.2
Chu, J.3
Araki, K.4
Yoshihara, H.5
-
46
-
-
84872200080
-
Simple group password-based authenticated key agreements for the integrated EPR information system
-
Lee, T.F., Chang, I.-P. and Wang, C.C. (2013). Simple group password-based authenticated key agreements for the integrated EPR information system. Journal of Medical Systems 37(2).
-
(2013)
Journal of Medical Systems
, vol.37
, Issue.2
-
-
Lee, T.F.1
Chang, I.-P.2
Wang, C.C.3
-
47
-
-
84870885441
-
Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption
-
(accessed 23 August 2013)
-
Li, M., Yu, S., Zheng, Y., Ren, K. and Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Transactions on Parallel and Distributed Systems 24(1): 131-143. Available at: IEEE Xplore,http://www.ieee.org (accessed 23 August 2013).
-
(2013)
IEEE Transactions on Parallel and Distributed Systems
, vol.24
, Issue.1
, pp. 131-143
-
-
Li, M.1
Yu, S.2
Zheng, Y.3
Ren, K.4
Lou, W.5
-
48
-
-
79960708195
-
Managing security and privacy concerns over data storage in healthcare research
-
Mackenzie, I.S., Mantay, B.J., McDonnell, P. G., Wei, L. and Macdonald, T. M. (2011). Managing security and privacy concerns over data storage in healthcare research. Pharmacoepidemiology and Drug Safety 20(8): 885-893.
-
(2011)
Pharmacoepidemiology and Drug Safety
, vol.20
, Issue.8
, pp. 885-893
-
-
Mackenzie, I.S.1
Mantay, B.J.2
McDonnell, P.G.3
Wei, L.4
Macdonald, T.M.5
-
49
-
-
84875634268
-
A semantic framework to protect the privacy of electronic health records with non-numerical attributes
-
Martínez, S., Sánchez, D. and Valls, A. (2013). A semantic framework to protect the privacy of electronic health records with non-numerical attributes. Journal of Biomedical Informatics 46(2): 294-303.
-
(2013)
Journal of Biomedical Informatics
, vol.46
, Issue.2
, pp. 294-303
-
-
Martínez, S.1
Sánchez, D.2
Valls, A.3
-
50
-
-
84871953667
-
Controlled data sharing in e-health
-
Matteucci, I., Mori, P., Petrocchi, M. and Wiegand, L. (2011). Controlled data sharing in e-health. 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST), Milan. Available at: IEEE Xplore,http://www.ieee.org (accessed 23 August 2013).
-
(2011)
1St Workshop on Socio-Technical Aspects in Security and Trust (STAST)
-
-
Matteucci, I.1
Mori, P.2
Petrocchi, M.3
Wiegand, L.4
-
51
-
-
68049122102
-
The PRISMA Group. Preferred Reporting Items for Systematic Reviews and Meta-Analyses: The PRISMA Statement
-
Moher D., Liberati A., Tetzlaff J. and Altman D.G. (2009). The PRISMA Group. Preferred Reporting Items for Systematic Reviews and Meta-Analyses: The PRISMA Statement. PLoS Med 6(6): e1000097. doi:10.1371/journal.pmed1000097.
-
(2009)
Plos Med
, vol.6
, Issue.6
, pp. 1000097
-
-
Moher, D.1
Liberati, A.2
Tetzlaff, J.3
Altman, D.G.4
-
52
-
-
80053512136
-
Privacy, confidentiality, HIPAA, and HITECH: Implications for the health care practitioner
-
Murray, T.L., Calhoun, M. and Philipsen, N.C. (2011). Privacy, confidentiality, HIPAA, and HITECH: Implications for the health care practitioner. Journal for Nurse Practitioners 7(9): 747-752.
-
(2011)
Journal for Nurse Practitioners
, vol.7
, Issue.9
, pp. 747-752
-
-
Murray, T.L.1
Calhoun, M.2
Philipsen, N.C.3
-
53
-
-
84863552500
-
Strategies for maintaining patient privacy in i2b2
-
Murphy, S.N., Gainer, V., Mendis, M., Churchill, S. and Kohane, I. (2011). Strategies for maintaining patient privacy in i2b2. Journal of the American Medical Informatics Association 18(1): 103-108.
-
(2011)
Journal of the American Medical Informatics Association
, vol.18
, Issue.1
, pp. 103-108
-
-
Murphy, S.N.1
Gainer, V.2
Mendis, M.3
Churchill, S.4
Kohane, I.5
-
55
-
-
83055191218
-
De-identifying an EHR database-anonymity, correctness and readability of the medical record
-
Pantazos, K., Lauesen, S. and Lippert, S. (2011). De-identifying an EHR database-anonymity, correctness and readability of the medical record. Studies in health technology and informatics 169: 862-6.
-
(2011)
Studies in Health Technology and Informatics
, vol.169
, pp. 862-866
-
-
Pantazos, K.1
Lauesen, S.2
Lippert, S.3
-
57
-
-
84883426914
-
Analysis of the security and privacy requirements of cloud-based electronic health records systems
-
Rodrigues, J.J.P.C., De La Torre, I., Fernández, G. and López-Coronado, M. (2013). Analysis of the security and privacy requirements of cloud-based electronic health records systems. Journal of Medical Internet Research 15(8): e186.
-
(2013)
Journal of Medical Internet Research
, vol.15
, Issue.8
, pp. 186
-
-
Rodrigues, J.J.P.C.1
De La Torre, I.2
Fernández, G.3
López-Coronado, M.4
-
59
-
-
84947715899
-
Informed use of patients’ records on trusted health care services
-
Victoria, British Columbia, Canada
-
Sahama T. and Miller, E. (2011). Informed use of patients’ records on trusted health care services. International Perspectives in Health Informatics, Victoria, British Columbia, Canada.
-
(2011)
International Perspectives in Health Informatics
-
-
Sahama, T.1
Miller, E.2
-
60
-
-
85182119292
-
-
20-23 January 2010, Valencia, Spain
-
Santos, J., Pedrosa, T., Costa, C. and Oliveira, J. (2010). Modeling a portable personal health record. Proceedings of the Third International Conference on Health Informatics, 20-23 January 2010, Valencia, Spain.
-
(2010)
Modeling a Portable Personal Health Record
-
-
Santos, J.1
Pedrosa, T.2
Costa, C.3
Oliveira, J.4
-
61
-
-
79960172418
-
On the use of openEHR in a portable PHR
-
Rome, Italy, (accessed 23 August 2013)
-
Santos, C., Pedrosa, T., Costa, C. and Oliveira, J. L. (2011). On the use of openEHR in a portable PHR. HEALTHINF-Proceedings of the International Conference on Health Informatics, Rome, Italy. Available at: BibSonomy, http://www.bibsonomy.org (accessed 23 August 2013).
-
(2011)
Healthinf-Proceedings of the International Conference on Health Informatics
-
-
Santos, C.1
Pedrosa, T.2
Costa, C.3
Oliveira, J.L.4
-
62
-
-
85182124122
-
-
SCImago, SJR — SCImago Journal & Country Rank, (accessed 8 December2013)
-
SCImago (2012). SJR — SCImago Journal Country Rank. Available at: http://www.scimagojr.com (accessed 8 December2013).
-
(2012)
-
-
-
63
-
-
84880953053
-
Dynamic federation in identity management for securing and sharing personal health records in a patient centric model in cloud
-
Singh, R., Gupta, V. and Mohan, K. (2013). Dynamic federation in identity management for securing and sharing personal health records in a patient centric model in cloud. International Journal of Engineering and Technology 5(3): 2201-2209.
-
(2013)
International Journal of Engineering and Technology
, vol.5
, Issue.3
, pp. 2201-2209
-
-
Singh, R.1
Gupta, V.2
Mohan, K.3
-
64
-
-
85182117768
-
-
Standards Australia, Health Level 7 (HL7), (accessed 2 January 2014)
-
Standards Australia (2013). Health Level 7 (HL7) Available at: http://www.ehealth.standards.org.au/StandardsOrganisations/HealthLevel7.aspx (accessed 2 January 2014).
-
(2013)
-
-
-
65
-
-
84922289019
-
Using EHRs to design drug repositioning trials: A devolved approach to data protection. International Review of Law
-
July
-
Stauch, M., Forgó, N. and Krügel, T. (2013). Using EHRs to design drug repositioning trials: A devolved approach to data protection. International Review of Law, Computers and Technology, 01 July 2013.
-
(2013)
Computers and Technology
, pp. 01
-
-
Stauch, M.1
Forgó, N.2
Krügel, T.3
-
66
-
-
84864091173
-
Health records and the cloud computing paradigm from a privacy perspective
-
Stingl, C. and Slamanig, D. (2011). Health records and the cloud computing paradigm from a privacy perspective. Journal of Healthcare Engineering 2(4): 487-508.
-
(2011)
Journal of Healthcare Engineering
, vol.2
, Issue.4
, pp. 487-508
-
-
Stingl, C.1
Slamanig, D.2
-
67
-
-
80051864290
-
HCPP: Cryptography based secure EHR system for patient privacy and emergency healthcare
-
Minneapolis, MN, (accessed 23 August 2013)
-
Sun, J., Zhu, X., Zhang, C. and Fang, Y. (2011). HCPP: Cryptography based secure EHR system for patient privacy and emergency healthcare. 31st International Conference on Distributed Computing Systems, Minneapolis, MN. Available at: IEEE Xplore,http://www.ieee.org (accessed 23 August 2013).
-
(2011)
31St International Conference on Distributed Computing Systems
-
-
Sun, J.1
Zhu, X.2
Zhang, C.3
Fang, Y.4
-
68
-
-
78650451034
-
Privacy by data provenance with digital watermarking: A proof-of-concept implementation for medical services with electronic health records
-
Darmstadt, (accessed: 23 August 2013)
-
Tharaud, J., Wohlgemuth, S., Echizen, I., Sonehara, N., Müller, G. and Lafourcade, P. (2010). Privacy by data provenance with digital watermarking: A proof-of-concept implementation for medical services with electronic health records. Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), Darmstadt. Available: IEEE Xplore,http://www.ieee.org (accessed: 23 August 2013).
-
(2010)
Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)
-
-
Tharaud, J.1
Wohlgemuth, S.2
Echizen, I.3
Sonehara, N.4
Müller, G.5
Lafourcade, P.6
-
69
-
-
81355123453
-
Comparative-effectiveness research in distributed health data networks
-
Toh, S., Platt, R., Steiner, J.F. and Brown, J.S. (2011). Comparative-effectiveness research in distributed health data networks. Clinical Pharmacology and Therapeutics 90(6): 883-887.
-
(2011)
Clinical Pharmacology and Therapeutics
, vol.90
, Issue.6
, pp. 883-887
-
-
Toh, S.1
Platt, R.2
Steiner, J.F.3
Brown, J.S.4
-
71
-
-
0043067952
-
Data security and protection in cross-institutional electronic patient records
-
van der Haak, M., Wolff, A.C., Brandner, R., Drings, P., Wannenmacher, M. and Wetter, Th. (2003). Data security and protection in cross-institutional electronic patient records. International Journal of Medical Informatics 70(2-3): 117-130.
-
(2003)
International Journal of Medical Informatics
, vol.70
, Issue.2-3
, pp. 117-130
-
-
Van Der Haak, M.1
Wolff, A.C.2
Brandner, R.3
Drings, P.4
Wannenmacher, M.5
Wetter, T.6
-
72
-
-
80053557137
-
EMOLST: A documentation flow for distributed health informatics
-
Von Laszewski, G., Dayal, J. and Wang, L. (2011). EMOLST: A documentation flow for distributed health informatics. Concurrency and Computation: Practice and Experience 23(16): 1857-1867.
-
(2011)
Concurrency and Computation: Practice and Experience
, vol.23
, Issue.16
, pp. 1857-1867
-
-
Von Laszewski, G.1
Dayal, J.2
Wang, L.3
-
73
-
-
84861523456
-
Patient safety through RFID: Vulnerabilities in recently proposed grouping protocols
-
Wickboldt, A.K. and Piramuthu, S. (2012). Patient safety through RFID: Vulnerabilities in recently proposed grouping protocols. Journal of Medical Systems 36(2): 431-435.
-
(2012)
Journal of Medical Systems
, vol.36
, Issue.2
, pp. 431-435
-
-
Wickboldt, A.K.1
Piramuthu, S.2
-
74
-
-
34249855960
-
Consent mechanisms for electronic health record systems: A simple yet unresolved issue
-
Win K.T. and Fulcher J. (2007), Consent mechanisms for electronic health record systems: a simple yet unresolved issue. Journal of Medical Systems 31(2): 91-96.
-
(2007)
Journal of Medical Systems
, vol.31
, Issue.2
, pp. 91-96
-
-
Win, K.T.1
Fulcher, J.2
-
75
-
-
33645344483
-
A review of security of electronic health record systems
-
Win K.T. (2005). A review of security of electronic health record systems. Health Information Management Journal 34(1): 13-18.
-
(2005)
Health Information Management Journal
, vol.34
, Issue.1
, pp. 13-18
-
-
Win, K.T.1
-
76
-
-
84883806079
-
A trusted and efficient cloud computing service with personal health record
-
Korea (South), (accessed 23 August 2013)
-
Wu, C.H., Hwang, J.J. and Zhuang, Z.Y. (2013). A trusted and efficient cloud computing service with personal health record. International Conference on Information Science and Applications (ICISA) Suwon, Korea (South). Available at: IEEE Xplore,http://www.ieee.org (accessed 23 August 2013).
-
(2013)
International Conference on Information Science and Applications (ICISA) Suwon
-
-
Wu, C.H.1
Hwang, J.J.2
Zhuang, Z.Y.3
-
77
-
-
84874415951
-
Secure sharing of electronic health records in clouds
-
Pittsburgh, Pennsylvania, (accessed 23 August 2013)
-
Wu, R., Ahn, G.J. and Hu, H. (2012). Secure sharing of electronic health records in clouds. 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Pittsburgh, Pennsylvania. Available at: IEEE Xplore,http://www.ieee.org (accessed 23 August 2013).
-
(2012)
8Th International Conference on Collaborative Computing: Networking, Applications and Worksharing (Collaboratecom)
-
-
Wu, R.1
Ahn, G.J.2
Hu, H.3
-
78
-
-
77957968012
-
Security models and requirements for healthcare application clouds
-
Miami, Florida, (accessed 23 August 2013)
-
Zhang R. and Liu, L. (2010). Security models and requirements for healthcare application clouds. IEEE 3rd International Conference on Cloud Computing, Miami, Florida. Available at: IEEE Xplore,http://www.ieee.org (accessed 23 August 2013).
-
(2010)
IEEE 3Rd International Conference on Cloud Computing
-
-
Zhang, R.1
Liu, L.2
-
79
-
-
80052595417
-
RBTBAC: Secure access and management of EHR data
-
Zhang, R., Liu, J., Han, Z. and Liu, L. (2011). RBTBAC: Secure access and management of EHR data. International Conference on Information Society (i-Society), London. Available at: IEEE Xplore,http://www.ieee.org (accessed 23 August 2013).
-
(2011)
International Conference on Information Society (I-Society)
-
-
Zhang, R.1
Liu, J.2
Han, Z.3
Liu, L.4
|