Sciweavers

28 search results - page 2 / 6
» The HIPAA-potamus in health care data security
Sort
View
JAMIA
2011
101views more  JAMIA 2011»
12 years 10 months ago
The military health system's personal health record pilot with Microsoft HealthVault and Google Health
Objective To design, build, implement, and evaluate a personal health record (PHR), tethered to the Military Health System, that leverages MicrosoftÒ HealthVault and GoogleÒ Hea...
Nhan V. Do, Rick Barnhill, Kimberly A. Heermann-Do...
FC
2009
Springer
112views Cryptology» more  FC 2009»
14 years 2 months ago
Data Hemorrhages in the Health-Care Sector
Confidential data hemorrhaging from health-care providers pose financial risks to firms and medical risks to patients. We examine the consequences of data hemorrhages including pri...
M. Eric Johnson
JSW
2008
240views more  JSW 2008»
13 years 7 months ago
A Secure e-Health Architecture based on the Appliance of Pseudonymization
Due to the cost pressure on the health care system an increase in the need for electronic healthcare records (EHR) could be observed in the last decade, because EHRs promise massiv...
Bernhard Riedl, Veronika Grascher, Thomas Neubauer
HICSS
2008
IEEE
155views Biometrics» more  HICSS 2008»
14 years 1 months ago
Pseudonymization for improving the Privacy in E-Health Applications
— Electronic health records (EHR) promise to improve communication between health care providers, thus leading to better quality of patients’ treatment and reduced costs. As hi...
Bernhard Riedl, Veronika Grascher, Stefan Fenz, Th...
TITB
2010
128views Education» more  TITB 2010»
13 years 2 months ago
Data-Centric Privacy Protocol for Intensive Care Grids
Abstract--Modern e-Health systems require advanced computing and storage capabilities, leading to the adoption of technologies like the grid and giving birth to novel health grid s...
J. Luna, Marios D. Dikaiakos, Manolis Marazakis, T...