[HTML][HTML] Security and privacy in electronic health records: A systematic literature review

JL Fernández-Alemán, IC Señor, PÁO Lozoya… - Journal of biomedical …, 2013 - Elsevier
OBJECTIVE: To report the results of a systematic literature review concerning the security
and privacy of electronic health record (EHR) systems. DATA SOURCES: Original articles …

Privacy in mobile technology for personal healthcare

S Avancha, A Baxi, D Kotz - ACM Computing Surveys (CSUR), 2012 - dl.acm.org
Information technology can improve the quality, efficiency, and cost of healthcare. In this
survey, we examine the privacy requirements of mobile computing technologies that have …

Information security and privacy in healthcare: current state of research

A Appari, ME Johnson - International journal of Internet and …, 2010 - inderscienceonline.com
Information security and privacy in the healthcare sector is an issue of growing importance.
The adoption of digital patient records, increased regulation, provider consolidation and the …

Electronic health records

A Hoerbst, E Ammenwerth - Methods of information in medicine, 2010 - thieme-connect.com
Objectives: Since the first concepts for electronic health records (EHRs) in the 1990s, the
content, structure, and technology of such records were frequently changed and adapted …

Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions

HSG Pussewalage, VA Oleshchuk - International Journal of Information …, 2016 - Elsevier
In the last few decades, there have been significant efforts in integrating information and
communication technologies (ICT) into healthcare practices. This new paradigm commonly …

A threat taxonomy for mHealth privacy

D Kotz - … Conference on Communication Systems and Networks …, 2011 - ieeexplore.ieee.org
Networked mobile devices have great potential to enable individuals (and their physicians)
to better monitor their health and to manage medical conditions. In this paper, we examine …

Using statistical and machine learning to help institutions detect suspicious access to electronic health records

AA Boxwala, J Kim, JM Grillo… - Journal of the …, 2011 - academic.oup.com
Objective To determine whether statistical and machine-learning methods, when applied to
electronic health record (EHR) access data, could help identify suspicious (ie, potentially …

[HTML][HTML] Situation-based access control: Privacy management via modeling of patient data access scenarios

M Peleg, D Beimel, D Dori, Y Denekamp - Journal of biomedical informatics, 2008 - Elsevier
Access control is a central problem in privacy management. A common practice in
controlling access to sensitive data, such as electronic health records (EHRs), is Role-Based …

Access control requirements for processing electronic health records

B Alhaqbani, C Fidge - International conference on business process …, 2007 - Springer
There is currently a strong focus worldwide on the potential of large-scale Electronic Health
Record systems to cut costs and improve patient outcomes through increased efficiency. A …

Using OWL and SWRL to represent and reason with situation-based access control policies

D Beimel, M Peleg - Data & Knowledge Engineering, 2011 - Elsevier
Access control is a central problem in confidentiality management, in particular in the
healthcare domain, where many stakeholders require access to patients' health records …