Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Eugene Sanzi"'
Publikováno v:
International Journal of Privacy and Health Information Management. 7:80-102
Controlling access to sensitive personal information is a primary concern in healthcare. Regardless of whether access control policies are determined by patients, healthcare professionals, institutions, legal and regulatory authorities, or some combi
Publikováno v:
WEBIST
Autor:
Eugene Sanzi, Steven A. Demurjian
Publikováno v:
DATA
Health information technology (HIT) systems including electronic health records (EHRs) have a market saturation nearing 92% at individual institutions but are still unsuited for cross-institutional collaboration of stakeholders (e.g., medical provide
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::61faf64abb8497b2eab7062c0862a76d
https://doi.org/10.4018/978-1-5225-9863-3.ch014
https://doi.org/10.4018/978-1-5225-9863-3.ch014
The adoption of health information systems and the integration of healthcare data and systems into efficient cross-institutional collaboration workflows of stakeholders (e.g., medical providers such as physicians, hospitals, clinics, labs, etc.) is a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5251010be61377e8e0f0e4fac1d8fa57
https://doi.org/10.4018/978-1-5225-6915-2.ch034
https://doi.org/10.4018/978-1-5225-6915-2.ch034
Publikováno v:
International Journal of User-Driven Healthcare. 6:65-103
Health information technology (HIT) systems including electronic health records (EHRs) have a market saturation nearing 92% at individual institutions but are still unsuited for cross-institutional collaboration of stakeholders (e.g., medical provide
Publikováno v:
MobileCloud
Access to sensitive information is traditionally achieved through an authentication and authorization process via a username/password combination to validate a user's identity that is stored within the system being accessed. This method creates delay
In order to secure mobile devices, there has been movement to trust negotiation where two entities are able to establish a measure of mutual trust, even if no prior contact between either entity has existed in the past. This chapter explores adaptive
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a05b6d259a4543d05e25a2a03ec72536
https://doi.org/10.4018/978-1-5225-0945-5.ch005
https://doi.org/10.4018/978-1-5225-0945-5.ch005
Autor:
Eugene Sanzi, Steven A. Demurjian
Creating an online identity via a username/password does not provide the ability to establish trust with other systems in order to get access to unauthorized information in a time-critical situation. Trust is the ability of two entities to believe on
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f72add1c6fa7b37e8fb9fd1f5ff2168d
https://doi.org/10.4018/978-1-5225-0448-1.ch002
https://doi.org/10.4018/978-1-5225-0448-1.ch002