Sciweavers

81 search results - page 17 / 17
» Verifiable Identifiers in Middleware Security
Sort
View
IHI
2010
197views Healthcare» more  IHI 2010»
13 years 5 days ago
Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
Regulations in various countries permit the reuse of health information without patient authorization provided the data is "de-identified". In the United States, for ins...
Kathleen Benitez, Grigorios Loukides, Bradley Mali...