Sciweavers

54 search results - page 5 / 11
» Access Control Requirements for Processing Electronic Health...
Sort
View
JSW
2008
240views more  JSW 2008»
13 years 7 months ago
A Secure e-Health Architecture based on the Appliance of Pseudonymization
Due to the cost pressure on the health care system an increase in the need for electronic healthcare records (EHR) could be observed in the last decade, because EHRs promise massiv...
Bernhard Riedl, Veronika Grascher, Thomas Neubauer
ACISP
2003
Springer
14 years 21 days ago
A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems
Abstract. This paper examines the access control requirements of distributed health care information networks. Since the electronic sharing of an individual’s personal health inf...
Jason Reid, Ian Cheong, Matthew Henricksen, Jason ...
JBI
2002
100views Bioinformatics» more  JBI 2002»
13 years 7 months ago
Representations of health concepts: a cognitive perspective
This paper discusses the differences between controlled medical vocabularies that are designed as external artifacts and the mental concepts that are inside users' heads and ...
Jiajie Zhang
WEBNET
2001
13 years 8 months ago
Electronically Assisting Communication for Health Professionals
: New information and computing technologies offer cost efficient and effective learning opportunities for health care professionals. The Assisted Electronic Communication project ...
Peter Scott, Fiona Brooks, Kevin Quick, Maria Maci...
ECIS
2000
13 years 8 months ago
Towards a Secure Web-Based Health Care Application
Even though security requirements in health care are traditionally high, most computerized health care applications lack sophisticated security measures or focus only on single sec...
Susanne Röhrig, Konstantin Knorr