Security and privacy in health IT

Kelly Caine, Michael Lesk

Research output: Contribution to journalEditorial

2 Citations (Scopus)

Abstract

To address health IT's unique security and privacy issues, researchers study validation methods to improve the accuracy of records, encryption techniques to conceal information in transit, anonymization to permit distribution of health data without revealing identities, access control policies to enforce who sees what, and so on. The articles in this special issue touch on many of these topics.

Original languageEnglish (US)
Article number6682945
Pages (from-to)10-11
Number of pages2
JournalIEEE Security and Privacy
Volume11
Issue number6
DOIs
StatePublished - Nov 1 2013

Fingerprint

privacy
Health
health
Access control
Cryptography

All Science Journal Classification (ASJC) codes

  • Law
  • Electrical and Electronic Engineering
  • Computer Networks and Communications

Cite this

Caine, Kelly ; Lesk, Michael. / Security and privacy in health IT. In: IEEE Security and Privacy. 2013 ; Vol. 11, No. 6. pp. 10-11.
@article{710e37436a004fe08cf36fb5fa2f0505,
title = "Security and privacy in health IT",
abstract = "To address health IT's unique security and privacy issues, researchers study validation methods to improve the accuracy of records, encryption techniques to conceal information in transit, anonymization to permit distribution of health data without revealing identities, access control policies to enforce who sees what, and so on. The articles in this special issue touch on many of these topics.",
author = "Kelly Caine and Michael Lesk",
year = "2013",
month = "11",
day = "1",
doi = "https://doi.org/10.1109/MSP.2013.149",
language = "English (US)",
volume = "11",
pages = "10--11",
journal = "IEEE Security and Privacy",
issn = "1540-7993",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "6",

}

Security and privacy in health IT. / Caine, Kelly; Lesk, Michael.

In: IEEE Security and Privacy, Vol. 11, No. 6, 6682945, 01.11.2013, p. 10-11.

Research output: Contribution to journalEditorial

TY - JOUR

T1 - Security and privacy in health IT

AU - Caine, Kelly

AU - Lesk, Michael

PY - 2013/11/1

Y1 - 2013/11/1

N2 - To address health IT's unique security and privacy issues, researchers study validation methods to improve the accuracy of records, encryption techniques to conceal information in transit, anonymization to permit distribution of health data without revealing identities, access control policies to enforce who sees what, and so on. The articles in this special issue touch on many of these topics.

AB - To address health IT's unique security and privacy issues, researchers study validation methods to improve the accuracy of records, encryption techniques to conceal information in transit, anonymization to permit distribution of health data without revealing identities, access control policies to enforce who sees what, and so on. The articles in this special issue touch on many of these topics.

UR - http://www.scopus.com/inward/record.url?scp=84890896138&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84890896138&partnerID=8YFLogxK

U2 - https://doi.org/10.1109/MSP.2013.149

DO - https://doi.org/10.1109/MSP.2013.149

M3 - Editorial

VL - 11

SP - 10

EP - 11

JO - IEEE Security and Privacy

JF - IEEE Security and Privacy

SN - 1540-7993

IS - 6

M1 - 6682945

ER -