Literature DB >> 17489502

Security and access of health research data.

Willy Susilo1, Khin Than Win.   

Abstract

The objective of this study is to discover how to maximise the use of health research data without breaching the patient's confidentiality. To achieve this, we have examined available options identified in enhancing information security of health research data. It has been noted that there are gaps in information security for health research data. Our novel approach, searching through encrypted data is discussed in this paper.

Entities:  

Mesh:

Year:  2007        PMID: 17489502     DOI: 10.1007/s10916-006-9035-y

Source DB:  PubMed          Journal:  J Med Syst        ISSN: 0148-5598            Impact factor:   4.460


  12 in total

1.  Anonymous statistical methods versus cryptographic methods in epidemiology.

Authors:  C Quantin; F A Allaert; L Dusserre
Journal:  Int J Med Inform       Date:  2000-11       Impact factor: 4.046

2.  Using patient identifiable data without consent. Integrity of communicable disease surveillance is important patient care.

Authors:  B Evans; C N Ramsay
Journal:  BMJ       Date:  2001-04-07

3.  Informed consent for cancer registration.

Authors:  J Dudeck
Journal:  Lancet Oncol       Date:  2001-01       Impact factor: 41.316

4.  Learning from experience: privacy and the secondary use of data in health research.

Authors:  William Lowrance
Journal:  J Health Serv Res Policy       Date:  2003-07

5.  A review of security of electronic health records.

Authors:  Khin Than Win
Journal:  Health Inf Manag       Date:  2005       Impact factor: 3.185

6.  Multicenter patient records research: security policies and tools.

Authors:  F M Behlen; S B Johnson
Journal:  J Am Med Inform Assoc       Date:  1999 Nov-Dec       Impact factor: 4.497

7.  Using patient identifiable data without consent. Argument for consent may invalidate research and stigmatise some patients.

Authors:  L Roberts; S Wilson
Journal:  BMJ       Date:  2001-04-07

8.  Current medicolegal and confidentiality issues in large, multicenter research programs.

Authors:  P A Carney; B M Geller; H Moffett; M Ganger; M Sewell; W E Barlow; N Stalnaker; S H Taplin; C Sisk; V L Ernster; H A Wilkie; B Yankaskas; S P Poplack; N Urban; M M West; R D Rosenberg; S Michael; T D Mercurio; R Ballard-Barbash
Journal:  Am J Epidemiol       Date:  2000-08-15       Impact factor: 4.897

9.  Protecting patient privacy by quantifiable control of disclosures in disseminated databases.

Authors:  Lucila Ohno-Machado; Paulo Sérgio Panse Silveira; Staal Vinterbo
Journal:  Int J Med Inform       Date:  2004-08       Impact factor: 4.046

10.  A security architecture for interconnecting health information systems.

Authors:  Dimitris Gritzalis; Costas Lambrinoudakis
Journal:  Int J Med Inform       Date:  2004-03-31       Impact factor: 4.046

View more
  2 in total

1.  Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage.

Authors:  Lifeng Guo; Wei-Chuen Yau
Journal:  J Med Syst       Date:  2015-01-30       Impact factor: 4.460

2.  A web-based institutional DICOM distribution system with the integration of the Clinical Trial Processor (CTP).

Authors:  K Y E Aryanto; A Broekema; R G A Langenhuysen; M Oudkerk; P M A van Ooijen
Journal:  J Med Syst       Date:  2015-03-03       Impact factor: 4.460

  2 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.