Suppr超能文献

Implementing security and access control mechanisms for an electronic healthcare record.

作者信息

Ueckert Frank K, Prokosch Hans-Ulrich

机构信息

Department of Medical Informatics and Biomathematics, University of Muenster, Germany.

出版信息

Proc AMIA Symp. 2002:825-9.

Abstract

Personal Electronic Health Records (EHR) have recently been published as one means to support patient empowerment and patient control over their personal health record. The functionality of such an EHR may vary from a simple web-based interface for interactive data entry and data review up to a much more powerful system additionally supporting electronic data/document communication between clinical information systems of primary care practitioners or hospitals and even reminder based support for the empowered citizen, to actively take care of his health, based on relevant disease management programs. Since storage and communication of data in an EHR comprises sensible personal health data, each of those functions need specific security and access management requirements to be considered and implemented. In this article the most critical requirements for these aspects will be classified and respective mechanisms to provide secure data storage and communication as well as flexible access management functions will be presented.

摘要

相似文献

3
Functions of an electronic health record.
Int J Comput Dent. 2002 Apr-Jul;5(2-3):125-32.
4
Empowerment of patients and communication with health care professionals through an electronic health record.
Int J Med Inform. 2003 Jul;70(2-3):99-108. doi: 10.1016/s1386-5056(03)00052-2.
6
The need to know the history of the use of digital patient data, in particular the EHR.
Int J Med Inform. 2007 May-Jun;76(5-6):438-41. doi: 10.1016/j.ijmedinf.2006.09.009. Epub 2006 Oct 25.
7
Security requirements in EHR systems and archives.
Stud Health Technol Inform. 2004;103:453-8.
8
Patient participation in EHR benefits.
Health Manag Technol. 2003 Oct;24(10):64, 63.

引用本文的文献

2
Informatics challenges for the impending patient information explosion.
J Am Med Inform Assoc. 2005 Nov-Dec;12(6):614-7. doi: 10.1197/jamia.M1873. Epub 2005 Jul 27.
3
Wireless technology infrastructures for authentication of patients: PKI that rings.
J Am Med Inform Assoc. 2005 May-Jun;12(3):263-8. doi: 10.1197/jamia.M1681. Epub 2005 Jan 31.

本文引用的文献

1
Giving patients access to their medical records via the internet: the PCASSO experience.
J Am Med Inform Assoc. 2002 Mar-Apr;9(2):181-91. doi: 10.1197/jamia.m1005.
2
Personal health records: evaluation of functionality and utility.
J Am Med Inform Assoc. 2002 Mar-Apr;9(2):171-80. doi: 10.1197/jamia.m0978.
3
The HL7 Clinical Document Architecture.
J Am Med Inform Assoc. 2001 Nov-Dec;8(6):552-69. doi: 10.1136/jamia.2001.0080552.
4
What do patients do with access to their medical records?
Stud Health Technol Inform. 2001;84(Pt 2):1440-4.
5
Patient empowerment and the electronic health record.
Stud Health Technol Inform. 2001;84(Pt 1):663-5.
6
E-health: transforming the physician/patient relationship.
Int J Med Inform. 2001 Apr;61(1):1-10. doi: 10.1016/s1386-5056(00)00130-1.

文献AI研究员

20分钟写一篇综述,助力文献阅读效率提升50倍。

立即体验

用中文搜PubMed

大模型驱动的PubMed中文搜索引擎

马上搜索

文档翻译

学术文献翻译模型,支持多种主流文档格式。

立即体验