1998
DOI: 10.1016/s1386-5056(98)00006-9
|View full text |Cite
|
Sign up to set email alerts
|

Patient data and security: an overview

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0
1

Year Published

2000
2000
2017
2017

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 5 publications
0
6
0
1
Order By: Relevance
“…According to the main goal of Health Information Exchange (HIE) systems, semantic interoperability is a significant issue in the integration of EHR data in different repositories, and the review articles proposed different methods to provide such interoperability. Policies, such as CEN prENV 1306 policy, required mandating and formulating to be able to provide interoperability (Blobel & Pharow 2007;Barber 1998 (Hsieh & Chen 2012). Broker-based composite EHR authorisation provides interoperability by establishing a small system, and then the Health Information System Broker (HISB) organises the patient data in the local and public databases (Aljarullah & El-Masri 2012).…”
Section: Interoperabilitymentioning
confidence: 99%
“…According to the main goal of Health Information Exchange (HIE) systems, semantic interoperability is a significant issue in the integration of EHR data in different repositories, and the review articles proposed different methods to provide such interoperability. Policies, such as CEN prENV 1306 policy, required mandating and formulating to be able to provide interoperability (Blobel & Pharow 2007;Barber 1998 (Hsieh & Chen 2012). Broker-based composite EHR authorisation provides interoperability by establishing a small system, and then the Health Information System Broker (HISB) organises the patient data in the local and public databases (Aljarullah & El-Masri 2012).…”
Section: Interoperabilitymentioning
confidence: 99%
“…Clinical data exchange within GUA-PA raised several concerns regarding confidentiality of data, particularly in the face of deficient legislation. However, current electronic medical record technology offers the same or greater security and confidentiality of data as do paper records (18)(19)(20) and should suffice to protect data transfer between Mexico and the United States. Also, international regulations of electronic medical records (21) and standardization of laboratory data are being developed (22).…”
Section: Discussionmentioning
confidence: 99%
“…This scenario can improve the security level of the fingerprint authentication system because the server can be more secure than the client. A server should be protected by the security experts, while a client maintained by an individual user may be more vulnerable to several attacks such as Trojan Horse [12][13][14]. On the other hand, the computational workload of the server in this scenario increases as the number of clients increases.…”
Section: Fingerprint Verification Scenarios For the Large-scale Clienmentioning
confidence: 99%
“…In general, the visible information on the health card may contain the cardholder's name, identification number, birth date, photo, and the card serial number. The contents inside the card can be divided into four segments: basic data, health insurance data, medical data, and public health administration data [13,14]. The basic data segment stores the identification information for both the cardholder and the card itself.…”
Section: Introductionmentioning
confidence: 99%