{"title":"定义医疗保健安全的技术体系结构","authors":"Dahl Gerberick, D. Huber, Robert Rudloff","doi":"10.1201/1086/43305.8.2.19990601/31064.8","DOIUrl":null,"url":null,"abstract":"Abstract In the previous article, “Preparing for Health Care Legislation,” we established the need for Health Care security concerns and emphasized an enterprise approach to properly, effectively, establishing security for Electronic Medical Records (EMRs). In this article we present a technical architecture addressing Health Insurance Portability and Accountability Act (HIPAA) of 1996.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"100 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1999-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Defining a Technical Architecture for Health Care Security\",\"authors\":\"Dahl Gerberick, D. Huber, Robert Rudloff\",\"doi\":\"10.1201/1086/43305.8.2.19990601/31064.8\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Abstract In the previous article, “Preparing for Health Care Legislation,” we established the need for Health Care security concerns and emphasized an enterprise approach to properly, effectively, establishing security for Electronic Medical Records (EMRs). In this article we present a technical architecture addressing Health Insurance Portability and Accountability Act (HIPAA) of 1996.\",\"PeriodicalId\":207082,\"journal\":{\"name\":\"Inf. Secur. J. A Glob. Perspect.\",\"volume\":\"100 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1999-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Inf. Secur. J. A Glob. Perspect.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1201/1086/43305.8.2.19990601/31064.8\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Inf. Secur. J. A Glob. Perspect.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1201/1086/43305.8.2.19990601/31064.8","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Defining a Technical Architecture for Health Care Security
Abstract In the previous article, “Preparing for Health Care Legislation,” we established the need for Health Care security concerns and emphasized an enterprise approach to properly, effectively, establishing security for Electronic Medical Records (EMRs). In this article we present a technical architecture addressing Health Insurance Portability and Accountability Act (HIPAA) of 1996.