[go: up one dir, main page]

Arthur Conklin et al., 2010 - Google Patents

Information security foundations for the interoperability of electronic health records

Arthur Conklin et al., 2010

View PDF
Document ID
14891336956953015005
Author
Arthur Conklin W
McLeod A
Publication year
Publication venue
International Journal of Healthcare Technology and Management

External Links

Snippet

Electronic Health Records (EHRs) are clearly in the future of medicine and will provide benefits to all parties. Accurate and timely health record information is essential and dependent upon the security of the system and the security of related, interconnected …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/30Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
    • G06F19/32Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
    • G06F19/322Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings

Similar Documents

Publication Publication Date Title
Rindfleisch Privacy, information technology, and health care
Branch et al. Trends in malware attacks against United States healthcare organizations, 2016-2017
Wellington Cyberattacks on medical devices and hospital networks: legal gaps and regulatory solutions
Bommareddy et al. A review on healthcare data privacy and security
Lehto et al. Cyber security in healthcare systems
Bajrić Data security and privacy issues in healthcare
Raval et al. Cloud-based information security and privacy in healthcare
Joshua et al. Managing information security risk and Internet of Things (IoT) impact on challenges of medicinal problems with complex settings: a complete systematic approach
Mackenzie et al. Managing security and privacy concerns over data storage in healthcare research
Sharma et al. Understanding cybersecurity management in healthcare
Abuasal et al. Designing a standard-based approach for security of healthcare systems
Zalozhnev et al. Intelligent system and human-computer interaction for personal data cyber security in medicaid enterprises
Parker Healthcare regulations, threats, and their impact on cybersecurity
Thomson et al. Privacy and security challenges in bioinformatics
Daniels et al. Legislation and the Negative Impact on Cybersecurity in Healthcare.
Arthur Conklin et al. Information security foundations for the interoperability of electronic health records
Jafar et al. Addressing unique cybersecurity challenges in telehealth and remote physiologic monitoring
Ahmed Augmenting Accountability, Security and Fraud Detection in Health Data Sharing Systems
Clarke III et al. CONSUMER PRIVACY ISSUES ASSOCIATED WITH THE USE OF ELECTRONIC HEALTH RECORDS.
Kumari Security Aspects of Patient's Data in a Medical Diagnostic System
Murtaza Risk management for health information security and privacy
Rahman et al. Information Security Principles for Electronic Medical Record (EMR) Systems
Landry et al. A threat tree for health information security and privacy
Tetteh Does HIPAA Provide Enough Protection for Healthcare in the Age of Ransomware and Current Cybersecurity Threats
Branch et al. Trends in malware attacks against united states healthcare organizations