[go: up one dir, main page]

Charles et al., 2019 - Google Patents

Blockchain compliance by design: Regulatory considerations for blockchain in clinical research

Charles et al., 2019

View HTML
Document ID
11743333716731054520
Author
Charles W
Marler N
Long L
Manion S
Publication year
Publication venue
Frontiers in Blockchain

External Links

Snippet

As clinical research moves toward real-world data capture with increased data sharing, there is a growing need for patient-centered technologies that ensure data authenticity and promote researcher and patient access. Blockchain is one of an emerging set of distributed …
Continue reading at www.frontiersin.org (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/30Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
    • G06F19/32Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
    • G06F19/322Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/22Health care, e.g. hospitals; Social work

Similar Documents

Publication Publication Date Title
Charles et al. Blockchain compliance by design: Regulatory considerations for blockchain in clinical research
Giuffrè et al. Harnessing the power of synthetic data in healthcare: innovation, application, and privacy
Leeming et al. A ledger of me: personalizing healthcare using blockchain technology
Shen et al. Patient privacy perspectives on health information exchange in a mental health context: qualitative study
Esmaeilzadeh et al. Patients’ support for health information exchange: a literature review and classification of key factors
Konnoth Health information equity
McGraw et al. From commercialization to accountability: responsible health data collection, use, and disclosure for the 21st century
Aldamaeen et al. Toward patient-centric healthcare systems: key requirements and framework for personal health records based on blockchain technology
Diener et al. Prevention of medication overuse and medication overuse headache in patients with migraine: a randomized, controlled, parallel, allocation-blinded, multicenter, prospective trial using a mobile software application
Charles Accelerating life sciences research with blockchain
Feeney et al. Using administrative data for randomized evaluations
Alnuaimi et al. Trustworthy healthcare professional credential verification using blockchain technology
Saks et al. Advancing the Use of HIE Data for Research
Konnoth Governing health information
Charles Regulatory compliance considerations for blockchain in life sciences research
Lidströmer et al. Systematic review of ethics and legislation of a Global Patient co-Owned Cloud (GPOC)
Chaudhary et al. Analyzing Blockchain in Healthcare: Applicability and Empirical Evidence of Blockchain Technology in Health Science (English Edition)
Malviya et al. Blockchain for Healthcare 4.0: Technology, Challenges, and Applications
BUNDI AN ENHANCED SECURE DISTRIBUTED LEDGER INTEROPERABILITY FRAMEWORK FOR MEDICAL SYSTEMS
Qambar A blockchain based policy framework for the management of electronic health record (EHRS)
Baysal A GENERIC BLOCKCHAIN PROCESS REFERENCE MODEL FOR SOFTWARE DEVELOPMENT IN SAFETY CRITICAL DOMAINS
Matlebjane Adoption of blockchain to enhance patients’ health information management
Soares et al. Bridging Blockchain Technology to Electronic Patient Record Engineering: A Sociotechnical and User-centered Analysis
Chernik et al. Enhancing Encryption Measures for Expanded HIPAA Covered Entities
Levinson et al. Not all recommended fraud safeguards have been implemented in hospital EHR Technology