{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T19:58:55Z","timestamp":1726516735895},"reference-count":34,"publisher":"Elsevier BV","issue":"2-3","license":[{"start":{"date-parts":[[2003,7,1]],"date-time":"2003-07-01T00:00:00Z","timestamp":1057017600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["International Journal of Medical Informatics"],"published-print":{"date-parts":[[2003,7]]},"DOI":"10.1016\/s1386-5056(03)00033-9","type":"journal-article","created":{"date-parts":[[2003,6,30]],"date-time":"2003-06-30T17:29:01Z","timestamp":1056994141000},"page":"117-130","source":"Crossref","is-referenced-by-count":42,"title":["Data security and protection in cross-institutional electronic patient records"],"prefix":"10.1016","volume":"70","author":[{"given":"M","family":"van der Haak","sequence":"first","affiliation":[]},{"given":"A.C","family":"Wolff","sequence":"additional","affiliation":[]},{"given":"R","family":"Brandner","sequence":"additional","affiliation":[]},{"given":"P","family":"Drings","sequence":"additional","affiliation":[]},{"given":"M","family":"Wannenmacher","sequence":"additional","affiliation":[]},{"given":"Th","family":"Wetter","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1386-5056(03)00033-9_BIB1","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/S1386-5056(97)00058-0","article-title":"Comparing middleware concepts for advanced healthcare system architectures","volume":"46","author":"Blobel","year":"1997","journal-title":"Int. J. Med. Inf."},{"key":"10.1016\/S1386-5056(03)00033-9_BIB2","unstructured":"J.C. Klimczak, D.M. Witten, M. Ruiz, J.A. Mitchell, J.G. Brilhart, M.L. Frankenberger, Providing location-independent access to patient clinical narratives using Web browsers and a tiered server approach, in: Proc. AMIA Annu. Fall Symp. (1996) 623\u2013627."},{"key":"10.1016\/S1386-5056(03)00033-9_BIB3","series-title":"Medinfo 98","first-page":"315","article-title":"How can sharing clinical information be made to work?","author":"Neame","year":"1998"},{"key":"10.1016\/S1386-5056(03)00033-9_BIB4","first-page":"20","article-title":"Toward a virtual electronic patient record","volume":"16","author":"van Bemmel","year":"1999","journal-title":"MD Comput."},{"key":"10.1016\/S1386-5056(03)00033-9_BIB5","first-page":"483","article-title":"Experiences with a distributed virtual patient record system","volume":"86","author":"Forslund","year":"1996","journal-title":"Proc. AMIA Annu. Fall Symp."},{"key":"10.1016\/S1386-5056(03)00033-9_BIB6","first-page":"628","article-title":"Implementing a Web-based clinical information system using EMR middle layer services","volume":"19","author":"Kittredge","year":"1996","journal-title":"Proc. AMIA Annu. Fall Symp."},{"key":"10.1016\/S1386-5056(03)00033-9_BIB7","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/S1386-5056(98)00168-3","article-title":"Security in health-care information systems\u2014current trends","volume":"54","author":"Smith","year":"1999","journal-title":"Int. J. Med. Inf."},{"key":"10.1016\/S1386-5056(03)00033-9_BIB8","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1055\/s-0038-1634622","article-title":"Digital optical archiving of medical records in hospital information systems\u2014a practical approach towards the computer-based patient record?","volume":"34","author":"Dujat","year":"1995","journal-title":"Methods Inf. Med."},{"key":"10.1016\/S1386-5056(03)00033-9_BIB9","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/S1386-5056(00)00106-4","article-title":"Electronic patient records and the impact of the Internet","volume":"60","author":"Safran","year":"2000","journal-title":"Int. J. Med. Inf."},{"key":"10.1016\/S1386-5056(03)00033-9_BIB10","doi-asserted-by":"crossref","first-page":"1617","DOI":"10.1016\/S0140-6736(98)08309-3","article-title":"Opportunities for the challenges of computerisation","volume":"352","author":"Pownser","year":"1998","journal-title":"Lancet"},{"key":"10.1016\/S1386-5056(03)00033-9_BIB11","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1136\/jamia.1996.96236282","article-title":"Privacy, confidentiality and electronic medical records","volume":"3","author":"Barrows","year":"1996","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"10.1016\/S1386-5056(03)00033-9_BIB12","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1055\/s-0038-1634412","article-title":"Confidentiality issues within a clinical information system: moving from data-driven to event-driven design","volume":"38","author":"Staccini","year":"1999","journal-title":"Methods Inf. Med."},{"key":"10.1016\/S1386-5056(03)00033-9_BIB13","doi-asserted-by":"crossref","first-page":"1609","DOI":"10.1016\/S0140-6736(94)90409-X","article-title":"Clinical data systems 2: components and techniques","volume":"344","author":"Wyatt","year":"1994","journal-title":"The Lancet"},{"key":"10.1016\/S1386-5056(03)00033-9_BIB14","series-title":"Medinfo 98","first-page":"1119","article-title":"Results of European projects improving security of distributed health information systems","author":"Blobel","year":"1998"},{"key":"10.1016\/S1386-5056(03)00033-9_BIB15","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/S1386-5056(99)00012-X","article-title":"A search engine for virtual patient records","volume":"55","author":"Malamateniou","year":"1999","journal-title":"Int. J. Med. Inf."},{"key":"10.1016\/S1386-5056(03)00033-9_BIB16","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1055\/s-0038-1634389","article-title":"Electronic signature for medical documents\u2014integration and evaluation of a public key infrastructure in hospitals","volume":"41","author":"Brandner","year":"2002","journal-title":"Methods Inf. Med."},{"key":"10.1016\/S1386-5056(03)00033-9_BIB17","series-title":"Medinfo 2001","first-page":"698","article-title":"Using the eXtensible Markup Language (XML) in a regional electronic patient record for patients with malignant diseases","author":"Wolff","year":"2001"},{"key":"10.1016\/S1386-5056(03)00033-9_BIB18","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1055\/s-0038-1634250","article-title":"An end-to-end secure patient information access card system","volume":"39","author":"Alkhateeb","year":"2000","journal-title":"Methods Inf. Med."},{"key":"10.1016\/S1386-5056(03)00033-9_BIB19","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1016\/S1386-5056(00)00110-6","article-title":"Security of the distributed electronic patient record: a case-based approach to identifying policy issues","volume":"60","author":"Anderson","year":"2000","journal-title":"Int. J. Med. Inf."},{"key":"10.1016\/S1386-5056(03)00033-9_BIB20","first-page":"227","article-title":"Security of the distributed electronic patient record: conclusions, recommendations and guidance","volume":"60","author":"Bakker","year":"2000","journal-title":"Int. J. Med. Inf."},{"key":"10.1016\/S1386-5056(03)00033-9_BIB21","series-title":"Proceedings of the IFIP TC11 11th International Conference on Information Security","first-page":"13","article-title":"Analysis of DES double key mode","author":"Carter","year":"1995"},{"key":"10.1016\/S1386-5056(03)00033-9_BIB22","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Commun. ACM"},{"key":"10.1016\/S1386-5056(03)00033-9_BIB23","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/BF03168723","article-title":"Security for the digital information age of medicine: issues, applications, and implementation","volume":"11","author":"Epstein","year":"1998","journal-title":"J. Digit. Imaging"},{"key":"10.1016\/S1386-5056(03)00033-9_BIB24","series-title":"Building Internet Firewalls","author":"Chapman","year":"1995"},{"key":"10.1016\/S1386-5056(03)00033-9_BIB25","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1016\/S1386-5056(00)00116-7","article-title":"Architecture for networked electronic patient record systems","volume":"60","author":"Takeda","year":"2000","journal-title":"Int. J. Med. Inf."},{"key":"10.1016\/S1386-5056(03)00033-9_BIB26","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1055\/s-0038-1634372","article-title":"Networking in shared care\u2014first steps towards a shared electronic patient record for cancer patients","volume":"41","author":"van der Haak","year":"2002","journal-title":"Methods Inf. Med."},{"key":"10.1016\/S1386-5056(03)00033-9_BIB27","doi-asserted-by":"crossref","unstructured":"K. Beznosov, Y. Deng, B. Blakley, A resource access decision service for CORBA-based distributed systems, In: 15th Annual Computer Security Application Conference, Phoenix, AZ, 1999.","DOI":"10.1109\/CSAC.1999.816041"},{"key":"10.1016\/S1386-5056(03)00033-9_BIB28","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1197\/jamia.M1005","article-title":"Giving patients access to their medical records via the Internet","volume":"9","author":"Masys","year":"2002","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"10.1016\/S1386-5056(03)00033-9_BIB29","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/S1386-5056(98)00088-4","article-title":"PCASSO: a design for secure communication of personal health information via the Internet","volume":"54","author":"Baker","year":"1999","journal-title":"Int. J. Med. Inf."},{"key":"10.1016\/S1386-5056(03)00033-9_BIB30","first-page":"44","article-title":"Securing the exchange of health information","volume":"16","author":"van Dyk","year":"2000","journal-title":"MD Comput."},{"key":"10.1016\/S1386-5056(03)00033-9_BIB31","unstructured":"Development environment for open systems, In: Secude Sicherheitstechnologie Informationssysteme GmbH, Darmstadt, 1997."},{"key":"10.1016\/S1386-5056(03)00033-9_BIB32","unstructured":"O. Rienhoff, C. Laske, P. van Ecke, P. Wenzlaff, U. Piccolo, A legal framework for security in European health care telematics, Stud. Health Technol. Inform., IOS Press, Amsterdam, 2000."},{"key":"10.1016\/S1386-5056(03)00033-9_BIB33","unstructured":"R. Seliger, Clinical Context Object Workgroup\u2014Overview of HL7's CCOW Standard, http:\/\/www.hl7.org\/library\/committees\/sigvi\/ccow_overview_2001.doc (last access: 2002-11-28)."},{"key":"10.1016\/S1386-5056(03)00033-9_BIB34","unstructured":"R. Brandner, U. Pordesch, Long-term conservation of provability of electronically signed documents, In: Information Security Solution Europe, Disneyland, Paris, 2002. EEMA and TeleTrust."}],"container-title":["International Journal of Medical Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1386505603000339?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1386505603000339?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,3,24]],"date-time":"2020-03-24T14:43:23Z","timestamp":1585061003000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1386505603000339"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,7]]},"references-count":34,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2003,7]]}},"alternative-id":["S1386505603000339"],"URL":"https:\/\/doi.org\/10.1016\/s1386-5056(03)00033-9","relation":{},"ISSN":["1386-5056"],"issn-type":[{"value":"1386-5056","type":"print"}],"subject":[],"published":{"date-parts":[[2003,7]]}}}