Arthur Conklin et al., 2010 - Google Patents
Information security foundations for the interoperability of electronic health recordsArthur Conklin et al., 2010
View PDF- Document ID
- 14891336956953015005
- Author
- Arthur Conklin W
- McLeod A
- Publication year
- Publication venue
- International Journal of Healthcare Technology and Management
External Links
Snippet
Electronic Health Records (EHRs) are clearly in the future of medicine and will provide benefits to all parties. Accurate and timely health record information is essential and dependent upon the security of the system and the security of related, interconnected …
- 238000000034 method 0 abstract description 8
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/32—Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
- G06F19/322—Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/86—Secure or tamper-resistant housings
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rindfleisch | Privacy, information technology, and health care | |
Branch et al. | Trends in malware attacks against United States healthcare organizations, 2016-2017 | |
Wellington | Cyberattacks on medical devices and hospital networks: legal gaps and regulatory solutions | |
Bommareddy et al. | A review on healthcare data privacy and security | |
Lehto et al. | Cyber security in healthcare systems | |
Bajrić | Data security and privacy issues in healthcare | |
Raval et al. | Cloud-based information security and privacy in healthcare | |
Joshua et al. | Managing information security risk and Internet of Things (IoT) impact on challenges of medicinal problems with complex settings: a complete systematic approach | |
Mackenzie et al. | Managing security and privacy concerns over data storage in healthcare research | |
Sharma et al. | Understanding cybersecurity management in healthcare | |
Abuasal et al. | Designing a standard-based approach for security of healthcare systems | |
Zalozhnev et al. | Intelligent system and human-computer interaction for personal data cyber security in medicaid enterprises | |
Parker | Healthcare regulations, threats, and their impact on cybersecurity | |
Thomson et al. | Privacy and security challenges in bioinformatics | |
Daniels et al. | Legislation and the Negative Impact on Cybersecurity in Healthcare. | |
Arthur Conklin et al. | Information security foundations for the interoperability of electronic health records | |
Jafar et al. | Addressing unique cybersecurity challenges in telehealth and remote physiologic monitoring | |
Ahmed | Augmenting Accountability, Security and Fraud Detection in Health Data Sharing Systems | |
Clarke III et al. | CONSUMER PRIVACY ISSUES ASSOCIATED WITH THE USE OF ELECTRONIC HEALTH RECORDS. | |
Kumari | Security Aspects of Patient's Data in a Medical Diagnostic System | |
Murtaza | Risk management for health information security and privacy | |
Rahman et al. | Information Security Principles for Electronic Medical Record (EMR) Systems | |
Landry et al. | A threat tree for health information security and privacy | |
Tetteh | Does HIPAA Provide Enough Protection for Healthcare in the Age of Ransomware and Current Cybersecurity Threats | |
Branch et al. | Trends in malware attacks against united states healthcare organizations |