Published on in Vol 3, No 2 (2001):

A Framework for an Institutional High Level Security Policy for the Processing of Medical Data and their Transmission through the Internet

A Framework for an Institutional High Level Security Policy for the Processing of Medical Data and their Transmission through the Internet

A Framework for an Institutional High Level Security Policy for the Processing of Medical Data and their Transmission through the Internet

Authors of this article:

Christos Ilioudis ;   George Pangalos

Journals

  1. Tremblay M, Vallée C, Carignan M, Provencher V, Delli-Colli N, Poulin V, Giguère A, Careau E, Giroux D. Design and implementation of the Competency Assessment Tool (CAT): user experience usability study. Informatics for Health and Social Care 2020;45(1):57 View
  2. Demeris G, Eysenbach G. Internet use in disease management for home care patients: A call for papers. Journal of Medical Internet Research 2002;4(2):e6 View
  3. McGeady D, Kujala J, Ilvonen K. The impact of patient–physician web messaging on healthcare service provision. International Journal of Medical Informatics 2008;77(1):17 View
  4. Masseroli M, Marchente M. X-PAT: A Multiplatform Patient Referral Data Management System for Small Healthcare Institution Requirements. IEEE Transactions on Information Technology in Biomedicine 2008;12(4):424 View
  5. Mejía-Granda C, Fernández-Alemán J, Carrillo de Gea J, García-Berná J. A method and validation for auditing e-Health applications based on reusable software security requirements specifications. International Journal of Medical Informatics 2025;194:105699 View

Books/Policy Documents

  1. Van Horn J, Wolfe J, Agnoli A, Woodward J, Schmitt M, Dobson J, Schumacher S, Vance B. Neuroimaging, Part A. View

Conference Proceedings

  1. Jensen J, Tøndel I, Jaatun M, Meland P, Andresen H. 2009 International Conference on Availability, Reliability and Security. Reusable Security Requirements for Healthcare Applications View
  2. Sasson R, Jaatun M, Jensen J. 2010 International Conference on Availability, Reliability and Security. The Road to Hell is Paved with Good Intentions: A Story of (In)secure Software Development View