Charles et al., 2019 - Google Patents
Blockchain compliance by design: Regulatory considerations for blockchain in clinical researchCharles et al., 2019
View HTML- Document ID
- 11743333716731054520
- Author
- Charles W
- Marler N
- Long L
- Manion S
- Publication year
- Publication venue
- Frontiers in Blockchain
External Links
Snippet
As clinical research moves toward real-world data capture with increased data sharing, there is a growing need for patient-centered technologies that ensure data authenticity and promote researcher and patient access. Blockchain is one of an emerging set of distributed …
- 238000011160 research 0 title abstract description 332
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/32—Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
- G06F19/322—Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/22—Health care, e.g. hospitals; Social work
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Charles et al. | Blockchain compliance by design: Regulatory considerations for blockchain in clinical research | |
Giuffrè et al. | Harnessing the power of synthetic data in healthcare: innovation, application, and privacy | |
Leeming et al. | A ledger of me: personalizing healthcare using blockchain technology | |
Shen et al. | Patient privacy perspectives on health information exchange in a mental health context: qualitative study | |
Esmaeilzadeh et al. | Patients’ support for health information exchange: a literature review and classification of key factors | |
Konnoth | Health information equity | |
McGraw et al. | From commercialization to accountability: responsible health data collection, use, and disclosure for the 21st century | |
Aldamaeen et al. | Toward patient-centric healthcare systems: key requirements and framework for personal health records based on blockchain technology | |
Diener et al. | Prevention of medication overuse and medication overuse headache in patients with migraine: a randomized, controlled, parallel, allocation-blinded, multicenter, prospective trial using a mobile software application | |
Charles | Accelerating life sciences research with blockchain | |
Feeney et al. | Using administrative data for randomized evaluations | |
Alnuaimi et al. | Trustworthy healthcare professional credential verification using blockchain technology | |
Saks et al. | Advancing the Use of HIE Data for Research | |
Konnoth | Governing health information | |
Charles | Regulatory compliance considerations for blockchain in life sciences research | |
Lidströmer et al. | Systematic review of ethics and legislation of a Global Patient co-Owned Cloud (GPOC) | |
Chaudhary et al. | Analyzing Blockchain in Healthcare: Applicability and Empirical Evidence of Blockchain Technology in Health Science (English Edition) | |
Malviya et al. | Blockchain for Healthcare 4.0: Technology, Challenges, and Applications | |
BUNDI | AN ENHANCED SECURE DISTRIBUTED LEDGER INTEROPERABILITY FRAMEWORK FOR MEDICAL SYSTEMS | |
Qambar | A blockchain based policy framework for the management of electronic health record (EHRS) | |
Baysal | A GENERIC BLOCKCHAIN PROCESS REFERENCE MODEL FOR SOFTWARE DEVELOPMENT IN SAFETY CRITICAL DOMAINS | |
Matlebjane | Adoption of blockchain to enhance patients’ health information management | |
Soares et al. | Bridging Blockchain Technology to Electronic Patient Record Engineering: A Sociotechnical and User-centered Analysis | |
Chernik et al. | Enhancing Encryption Measures for Expanded HIPAA Covered Entities | |
Levinson et al. | Not all recommended fraud safeguards have been implemented in hospital EHR Technology |