Journal articles on the topic 'Computer security Medical records Data protection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Computer security Medical records Data protection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Carrillo, Eduardo, and Maricarmen Sequera. "PERSONAL DATA IN THE SOCIAL SECURITY INSTITUTE." Law, State and Telecommunications Review 12, no. 2 (October 13, 2020): 14–37. http://dx.doi.org/10.26512/lstr.v12i2.34689.
Full textWang, Baocheng, and Zetao Li. "Healthchain: A Privacy Protection System for Medical Data Based on Blockchain." Future Internet 13, no. 10 (September 24, 2021): 247. http://dx.doi.org/10.3390/fi13100247.
Full textMbonihankuye, Scholas, Athanase Nkunzimana, and Ange Ndagijimana. "Healthcare Data Security Technology: HIPAA Compliance." Wireless Communications and Mobile Computing 2019 (October 17, 2019): 1–7. http://dx.doi.org/10.1155/2019/1927495.
Full textZhao, Yongbin, Meng Cui, Lijuan Zheng, Rui Zhang, Lili Meng, Dong Gao, and Yu Zhang. "Research on electronic medical record access control based on blockchain." International Journal of Distributed Sensor Networks 15, no. 11 (November 2019): 155014771988933. http://dx.doi.org/10.1177/1550147719889330.
Full textShi, Mingyue, Rong Jiang, Wei Zhou, Sen Liu, and Savio Sciancalepore. "A Privacy Risk Assessment Model for Medical Big Data Based on Adaptive Neuro-Fuzzy Theory." Security and Communication Networks 2020 (September 29, 2020): 1–18. http://dx.doi.org/10.1155/2020/5610839.
Full textChen, Yingwen, Linghang Meng, Huan Zhou, and Guangtao Xue. "A Blockchain-Based Medical Data Sharing Mechanism with Attribute-Based Access Control and Privacy Protection." Wireless Communications and Mobile Computing 2021 (June 29, 2021): 1–12. http://dx.doi.org/10.1155/2021/6685762.
Full textWu, Jimmy Ming-Tai, Gautam Srivastava, Jerry Chun-Wei Lin, and Qian Teng. "A Multi-Threshold Ant Colony System-based Sanitization Model in Shared Medical Environments." ACM Transactions on Internet Technology 21, no. 2 (June 2021): 1–26. http://dx.doi.org/10.1145/3408296.
Full textQuantin, Catherine, François-André Allaert, Paul Avillach, Maniane Fassa, Benoît Riandey, Gilles Trouessin, and Olivier Cohen. "Building Application-Related Patient Identifiers: What Solution for a European Country?" International Journal of Telemedicine and Applications 2008 (2008): 1–5. http://dx.doi.org/10.1155/2008/678302.
Full textAnciaux, Nicolas, Morgane Berthelot, Laurent Braconnier, Luc Bouganim, Martine De la Blache, Georges Gardarin, Philippe Kesmarszky, et al. "A Tamper-Resistant and Portable Healthcare Folder." International Journal of Telemedicine and Applications 2008 (2008): 1–9. http://dx.doi.org/10.1155/2008/763534.
Full textMartín del Rey, A., J. L. Hernández Pastora, and G. Rodríguez Sánchez. "3D medical data security protection." Expert Systems with Applications 54 (July 2016): 379–86. http://dx.doi.org/10.1016/j.eswa.2016.02.001.
Full textJorwekar, Harshal. "Medical Records Management with Decentralized Framework." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (July 10, 2021): 193–200. http://dx.doi.org/10.22214/ijraset.2021.35703.
Full textYang, Che-Ming, Herng-Ching Lin, Polun Chang, and Wen-Shan Jian. "Taiwan's perspective on electronic medical records’ security and privacy protection: Lessons learned from HIPAA." Computer Methods and Programs in Biomedicine 82, no. 3 (June 2006): 277–82. http://dx.doi.org/10.1016/j.cmpb.2006.04.002.
Full textStanberry, Ben. "The legal and ethical aspects of telemedicine. 2: Data protection, security and European law." Journal of Telemedicine and Telecare 4, no. 1 (March 1, 1998): 18–24. http://dx.doi.org/10.1258/1357633981931236.
Full textMartínez Monterrubio, Sergio Mauricio, Juan Frausto Solis, and Raúl Monroy Borja. "EMRlog Method for Computer Security for Electronic Medical Records with Logic and Data Mining." BioMed Research International 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/542016.
Full textLambe, Gerard, Niall Linnane, Ian Callanan, and Marcus W. Butler. "Cleaning up the paper trail – our clinical notes in open view." International Journal of Health Care Quality Assurance 31, no. 3 (April 16, 2018): 228–36. http://dx.doi.org/10.1108/ijhcqa-09-2016-0126.
Full textGoreva, Natalya, Sushma Mishra, Peter Draus, George Bromall, and Don Caputo. "A Study Of The Security Of Electronic Medical Records Utilizing Six Knowledge Categories And Subjects Demographics." International Journal of Management & Information Systems (IJMIS) 20, no. 3 (June 30, 2016): 51–58. http://dx.doi.org/10.19030/ijmis.v20i3.9738.
Full textLi, Na. "Body Sensor Network Processing Mechanism for Micro-Data Security Publishing." Advanced Materials Research 1049-1050 (October 2014): 1536–39. http://dx.doi.org/10.4028/www.scientific.net/amr.1049-1050.1536.
Full textZaz, Youssef, Lhoussain El Fadil, and Mohamed El Kayyali. "Securing EPR Data Using Cryptography and Image Watermarking." International Journal of Mobile Computing and Multimedia Communications 4, no. 2 (April 2012): 76–87. http://dx.doi.org/10.4018/jmcmc.2012040106.
Full textHabib, Muhammad Asif, C. M. Nadeem Faisal, Shahzad Sarwar, Muhammad Ahsan Latif, Farhan Aadil, Mudassar Ahmad, Rehan Ashraf, and Muazzam Maqsood. "Privacy-based medical data protection against internal security threats in heterogeneous Internet of Medical Things." International Journal of Distributed Sensor Networks 15, no. 9 (September 2019): 155014771987565. http://dx.doi.org/10.1177/1550147719875653.
Full textChen, Hsuan-Yu, Zhen-Yu Wu, Tzer-Long Chen, Yao-Min Huang, and Chia-Hui Liu. "Security Privacy and Policy for Cryptographic Based Electronic Medical Information System." Sensors 21, no. 3 (January 21, 2021): 713. http://dx.doi.org/10.3390/s21030713.
Full textHuang, Liang, and Hyung-Hyo Lee. "A Medical Data Privacy Protection Scheme Based on Blockchain and Cloud Computing." Wireless Communications and Mobile Computing 2020 (September 26, 2020): 1–11. http://dx.doi.org/10.1155/2020/8859961.
Full textXu, Zhiyan, Min Luo, Neeraj Kumar, Pandi Vijayakumar, and Li Li. "Privacy-Protection Scheme Based on Sanitizable Signature for Smart Mobile Medical Scenarios." Wireless Communications and Mobile Computing 2020 (November 22, 2020): 1–10. http://dx.doi.org/10.1155/2020/8877405.
Full textLv, Yan Li, Yuan Long Li, Shuang Xiang, and Chun He Xia. "The Research and Realization of a Kind of Log Management-Oriented Descriptive Language to Describe the Security of Computer Network." Applied Mechanics and Materials 556-562 (May 2014): 5765–70. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5765.
Full textGirardi, Francesco, Gaetano De Gennaro, Lucio Colizzi, and Nicola Convertini. "Improving the Healthcare Effectiveness: The Possible Role of EHR, IoMT and Blockchain." Electronics 9, no. 6 (May 26, 2020): 884. http://dx.doi.org/10.3390/electronics9060884.
Full textKiss, Gabor. "The information security awareness of the Slovakian kindergarten teacher students at starting and finishing the study in higher education." SHS Web of Conferences 66 (2019): 01042. http://dx.doi.org/10.1051/shsconf/20196601042.
Full textNaddaf-Dezfbli, A. R., Sandra L. H. Davenport, and A. Joyce. "A Medical Microcomputer Database Management System." Methods of Information in Medicine 24, no. 02 (April 1985): 73–78. http://dx.doi.org/10.1055/s-0038-1635357.
Full textLisiak-Felicka, Dominika, Pawel Nowak, and Maciej Szmit. "Selected Aspects of Information Security Management in Entities Performing Medical Activity." International Journal of Operations Management 1, no. 2 (2021): 30–37. http://dx.doi.org/10.18775/ijom.2757-0509.2020.12.4004.
Full textQin, Qiuli, Biyuan Jin, and Yanqing Liu. "A Secure Storage and Sharing Scheme of Stroke Electronic Medical Records Based on Consortium Blockchain." BioMed Research International 2021 (February 1, 2021): 1–14. http://dx.doi.org/10.1155/2021/6676171.
Full textAbunadi, Ibrahim, and Ramasamy Lakshmana Kumar. "BSF-EHR: Blockchain Security Framework for Electronic Health Records of Patients." Sensors 21, no. 8 (April 19, 2021): 2865. http://dx.doi.org/10.3390/s21082865.
Full textKhan, Muhammad, Ankita Chaturvedi, Dheerendra Mishra, and Saru Kumari. "On the security enhancement of integrated electronic patient records information systems." Computer Science and Information Systems 12, no. 2 (2015): 857–72. http://dx.doi.org/10.2298/csis141029030k.
Full textFragopoulos, Anastasios, John Gialelis, and Dimitrios Serpanos. "Security Framework for Pervasive Healthcare Architectures Utilizing MPEG-21 IPMP Components." International Journal of Telemedicine and Applications 2009 (2009): 1–9. http://dx.doi.org/10.1155/2009/461560.
Full textHe, Xiaoshuang, Hechuan Guo, and Xueyu Cheng. "Blockchain-Based Privacy Protection Scheme for IoT-Assisted Educational Big Data Management." Wireless Communications and Mobile Computing 2021 (August 13, 2021): 1–11. http://dx.doi.org/10.1155/2021/3558972.
Full textSher, Ming-Ling, Paul C. Talley, Ching-Wen Yang, and Kuang-Ming Kuo. "Compliance With Electronic Medical Records Privacy Policy: An Empirical Investigation of Hospital Information Technology Staff." INQUIRY: The Journal of Health Care Organization, Provision, and Financing 54 (January 1, 2017): 004695801771175. http://dx.doi.org/10.1177/0046958017711759.
Full textKalloniatis, Christos, Costas Lambrinoudakis, Mathias Musahl, Athanasios Kanatas, and Stefanos Gritzalis. "Incorporating privacy by design in body sensor networks for medical applications: A privacy and data protection framework." Computer Science and Information Systems, no. 00 (2020): 57. http://dx.doi.org/10.2298/csis200922057k.
Full textUd Din, Shams, Zahoor Jan, Muhammad Sajjad, Maqbool Hussain, Rahman Ali, Asmat Ali, and Sungyoung Lee. "Secure Exchange of Medical Data Using a Novel Real-Time Biometric-Based Protection and Recognition Method." Electronics 9, no. 12 (November 28, 2020): 2013. http://dx.doi.org/10.3390/electronics9122013.
Full textDetermann, Lothar. "Healthy Data Protection." Michigan Technology Law Review, no. 26.2 (2020): 229. http://dx.doi.org/10.36645/mtlr.26.2.healthy.
Full textAlghazo, Jaafar M. "Intelligent Security and Privacy of Electronic Health Records Using Biometric Images." Current Medical Imaging Formerly Current Medical Imaging Reviews 15, no. 4 (April 11, 2019): 386–94. http://dx.doi.org/10.2174/1573405615666181228121535.
Full textMarwan, Mbarek, Abdelkarim Ait Temghart, Fatima Sifou, and Feda AlShahwan. "A Cloud Solution for Securing Medical Image Storage." Journal of information and organizational sciences 44, no. 1 (June 25, 2020): 113–39. http://dx.doi.org/10.31341/jios.44.1.5.
Full textNagm, Ahmad, and Mohammed Safy Elwan. "Protection of the patient data against intentional attacks using a hybrid robust watermarking code." PeerJ Computer Science 7 (March 22, 2021): e400. http://dx.doi.org/10.7717/peerj-cs.400.
Full textDayo Alowolodu, Olufunso, Gabriel K Adelaja, Boniface K Alese, and Olufunke Catherine Olayemi. "Medical Image Security Using Quantum Cryptography." Issues in Informing Science and Information Technology 15 (2018): 057–67. http://dx.doi.org/10.28945/4008.
Full textYuan, Munan, Xiaofeng Li, Xiru Li, Haibo Tan, and Jinlin Xu. "Trust Hardware Based Secured Privacy Preserving Computation System for Three-Dimensional Data." Electronics 10, no. 13 (June 25, 2021): 1546. http://dx.doi.org/10.3390/electronics10131546.
Full textLiu, Xueyan, Yukun Luo, and Xiaotao Yang. "Traceable Attribute-Based Secure Data Sharing with Hidden Policies in Mobile Health Networks." Mobile Information Systems 2020 (August 3, 2020): 1–12. http://dx.doi.org/10.1155/2020/3984048.
Full textVelliangiri S. and Naga Rama Devi G. "Hybrid Crypto Techniques for Secured Multimedia Big Data Content Protection System (SMBDCPS)." International Journal of e-Collaboration 17, no. 2 (April 2021): 1–21. http://dx.doi.org/10.4018/ijec.2021040101.
Full textZhang, Zelin, Jian Xu, Bin Ma, Chunpeng Wang, Jian Li, and Yuli Wang. "Medical Image Key Area Protection Scheme Based on QR Code and Reversible Data Hiding." Security and Communication Networks 2021 (July 15, 2021): 1–11. http://dx.doi.org/10.1155/2021/5511806.
Full textCheng, Wenzhi, Wei Ou, Xiangdong Yin, Wanqin Yan, Dingwan Liu, and Chunyan Liu. "A Privacy-Protection Model for Patients." Security and Communication Networks 2020 (December 10, 2020): 1–12. http://dx.doi.org/10.1155/2020/6647562.
Full textWang, Qihua, Huaqun Wang, Yufeng Wang, and Rui Guo. "A Distributed Access Control with Outsourced Computation in Fog Computing." Security and Communication Networks 2019 (July 8, 2019): 1–10. http://dx.doi.org/10.1155/2019/6782753.
Full textLisiak-Felicka, Dominika, Paweł A. Nowak, Maciej Szmit, and Radosław Zajdel. "THE FINANCING OF INFORMATION SECURITY MANAGEMENT IN ENTITIES PERFORMING MEDICAL ACTIVITIES." Zeszyty Naukowe Uniwersytetu Przyrodniczo-Humanistycznego w Siedlcach. Seria: Administracja i Zarządzanie, no. 53(126) (January 27, 2021): 5–16. http://dx.doi.org/10.34739/zn.2020.53.01.
Full textAyyappan, Sonal, C. Lakshmi, and Varun Menon. "A Secure Reversible Data Hiding and Encryption System for Embedding EPR in Medical Images." Current Signal Transduction Therapy 15, no. 2 (December 1, 2020): 124–35. http://dx.doi.org/10.2174/1574362414666190304162411.
Full textZhou, Xingguang, Jianwei Liu, Zongyang Zhang, and Qianhong Wu. "Secure Outsourced Medical Data against Unexpected Leakage with Flexible Access Control in a Cloud Storage System." Security and Communication Networks 2020 (February 10, 2020): 1–20. http://dx.doi.org/10.1155/2020/8347213.
Full textFatokun, Tomilayo, Avishek Nag, and Sachin Sharma. "Towards a Blockchain Assisted Patient Owned System for Electronic Health Records." Electronics 10, no. 5 (March 2, 2021): 580. http://dx.doi.org/10.3390/electronics10050580.
Full text