2008 21st IEEE International Symposium on Computer-Based Medical Systems 2008
DOI: 10.1109/cbms.2008.101
|View full text |Cite
|
Sign up to set email alerts
|

Restoring the Patient Control over Her Medical History

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2009
2009
2016
2016

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 4 publications
0
11
0
Order By: Relevance
“…Examples of research contributions using this pattern are the application mentioned in section 2 (Pay per use, Electronic Toll pricing, Smart meter) or the personal health record management approach from [ 22], which is further extended to secure personal data servers [ 23].…”
Section: Example Of Patternsmentioning
confidence: 99%
“…Examples of research contributions using this pattern are the application mentioned in section 2 (Pay per use, Electronic Toll pricing, Smart meter) or the personal health record management approach from [ 22], which is further extended to secure personal data servers [ 23].…”
Section: Example Of Patternsmentioning
confidence: 99%
“…We assume that such a code can be feasibly transmitted and stored in a patient's integrated personal health record [6], or encrypted on a personal smart card issued to a patient [12], or similarly secured on a patient's portable device for carrying electronic health records [2].…”
Section: Assumptionsmentioning
confidence: 99%
“…In the healthcare sector, there is also substantial widespread concern about the importance of maintaining the privacy and confidentiality of personal health information (PHI) [2,14]. There is significant established regulation issued by the Department of Health and Human Services on the disclosure of PHI by healthcare providers and various affiliated institutions [1], under the Health Insurance Portability and Accountability Act (HIPAA) and more recently the Health Information Technology for Economic and Clinical Health (HITECH) Act.…”
Section: Introductionmentioning
confidence: 99%
“…PBFilter has been implemented and integrated in the storage manager of an embedded DBMS dedicated to the management of secure portable folders [1]. The prototype runs on a secure USB Flash platform provided by Gemalto, our industrial partner.…”
Section: Platform Descriptionmentioning
confidence: 99%
“…When a new record is inserted, it is added at the end of the record area (RA). Then, a new index entry composed by a couple <key, pt> is added at the end of the key area (KA), where key is the primary key of the inserted record and pt is the record physical address 1 . If a record is deleted, its identifier (or its address) is inserted at the end of the delete area (DA) but no update is performed in RA nor KA.…”
Section: Pbfilter Indexing Schemementioning
confidence: 99%