Secure Patient Information and Privacy in Medical Imaging
In present times, identity protection is becoming increasingly jeopardized. Numerous ways of protecting one
Autor*in: |
Ming Yang [verfasserIn] Monica Trifas [verfasserIn] Lei Chen [verfasserIn] Lei Song [verfasserIn] Dorothy Buenos-Aires [verfasserIn] Jaleesa Elston [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2010 |
---|
Schlagwörter: |
---|
Übergeordnetes Werk: |
In: Journal of Systemics, Cybernetics and Informatics - International Institute of Informatics and Cybernetics, 2011, 8(2010), 3, Seite 63-66 |
---|---|
Übergeordnetes Werk: |
volume:8 ; year:2010 ; number:3 ; pages:63-66 |
Links: |
---|
Katalog-ID: |
DOAJ010759867 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | DOAJ010759867 | ||
003 | DE-627 | ||
005 | 20230310031525.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230225s2010 xx |||||o 00| ||eng c | ||
035 | |a (DE-627)DOAJ010759867 | ||
035 | |a (DE-599)DOAJ5d06e4a83a604ca0b4cb95d6e28d4264 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
050 | 0 | |a T58.5-58.64 | |
050 | 0 | |a P87-96 | |
100 | 0 | |a Ming Yang |e verfasserin |4 aut | |
245 | 1 | 0 | |a Secure Patient Information and Privacy in Medical Imaging |
264 | 1 | |c 2010 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a In present times, identity protection is becoming increasingly jeopardized. Numerous ways of protecting one | ||
650 | 4 | |a Information Hiding | |
650 | 4 | |a Hipaa | |
650 | 4 | |a Privacy | |
650 | 4 | |a Medical Images | |
650 | 4 | |a Encryption | |
653 | 0 | |a Information technology | |
653 | 0 | |a Communication. Mass media | |
700 | 0 | |a Monica Trifas |e verfasserin |4 aut | |
700 | 0 | |a Lei Chen |e verfasserin |4 aut | |
700 | 0 | |a Lei Song |e verfasserin |4 aut | |
700 | 0 | |a Dorothy Buenos-Aires |e verfasserin |4 aut | |
700 | 0 | |a Jaleesa Elston |e verfasserin |4 aut | |
773 | 0 | 8 | |i In |t Journal of Systemics, Cybernetics and Informatics |d International Institute of Informatics and Cybernetics, 2011 |g 8(2010), 3, Seite 63-66 |w (DE-627)505952289 |w (DE-600)2216824-2 |x 16904524 |7 nnns |
773 | 1 | 8 | |g volume:8 |g year:2010 |g number:3 |g pages:63-66 |
856 | 4 | 0 | |u https://doaj.org/article/5d06e4a83a604ca0b4cb95d6e28d4264 |z kostenfrei |
856 | 4 | 0 | |u http://www.iiisci.org/Journal/CV$/sci/pdfs/GS347VO.pdf |z kostenfrei |
856 | 4 | 2 | |u https://doaj.org/toc/1690-4524 |y Journal toc |z kostenfrei |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_DOAJ | ||
912 | |a GBV_ILN_11 | ||
912 | |a GBV_ILN_20 | ||
912 | |a GBV_ILN_22 | ||
912 | |a GBV_ILN_23 | ||
912 | |a GBV_ILN_24 | ||
912 | |a GBV_ILN_39 | ||
912 | |a GBV_ILN_40 | ||
912 | |a GBV_ILN_60 | ||
912 | |a GBV_ILN_62 | ||
912 | |a GBV_ILN_63 | ||
912 | |a GBV_ILN_65 | ||
912 | |a GBV_ILN_69 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_73 | ||
912 | |a GBV_ILN_74 | ||
912 | |a GBV_ILN_95 | ||
912 | |a GBV_ILN_105 | ||
912 | |a GBV_ILN_110 | ||
912 | |a GBV_ILN_151 | ||
912 | |a GBV_ILN_161 | ||
912 | |a GBV_ILN_170 | ||
912 | |a GBV_ILN_206 | ||
912 | |a GBV_ILN_213 | ||
912 | |a GBV_ILN_230 | ||
912 | |a GBV_ILN_285 | ||
912 | |a GBV_ILN_293 | ||
912 | |a GBV_ILN_370 | ||
912 | |a GBV_ILN_602 | ||
912 | |a GBV_ILN_2014 | ||
912 | |a GBV_ILN_4012 | ||
912 | |a GBV_ILN_4037 | ||
912 | |a GBV_ILN_4112 | ||
912 | |a GBV_ILN_4125 | ||
912 | |a GBV_ILN_4126 | ||
912 | |a GBV_ILN_4249 | ||
912 | |a GBV_ILN_4305 | ||
912 | |a GBV_ILN_4306 | ||
912 | |a GBV_ILN_4307 | ||
912 | |a GBV_ILN_4313 | ||
912 | |a GBV_ILN_4322 | ||
912 | |a GBV_ILN_4323 | ||
912 | |a GBV_ILN_4324 | ||
912 | |a GBV_ILN_4325 | ||
912 | |a GBV_ILN_4326 | ||
912 | |a GBV_ILN_4335 | ||
912 | |a GBV_ILN_4338 | ||
912 | |a GBV_ILN_4367 | ||
912 | |a GBV_ILN_4700 | ||
951 | |a AR | ||
952 | |d 8 |j 2010 |e 3 |h 63-66 |
author_variant |
m y my m t mt l c lc l s ls d b a dba j e je |
---|---|
matchkey_str |
article:16904524:2010----::eueainifrainnpiayn |
hierarchy_sort_str |
2010 |
callnumber-subject-code |
T |
publishDate |
2010 |
allfields |
(DE-627)DOAJ010759867 (DE-599)DOAJ5d06e4a83a604ca0b4cb95d6e28d4264 DE-627 ger DE-627 rakwb eng T58.5-58.64 P87-96 Ming Yang verfasserin aut Secure Patient Information and Privacy in Medical Imaging 2010 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier In present times, identity protection is becoming increasingly jeopardized. Numerous ways of protecting one Information Hiding Hipaa Privacy Medical Images Encryption Information technology Communication. Mass media Monica Trifas verfasserin aut Lei Chen verfasserin aut Lei Song verfasserin aut Dorothy Buenos-Aires verfasserin aut Jaleesa Elston verfasserin aut In Journal of Systemics, Cybernetics and Informatics International Institute of Informatics and Cybernetics, 2011 8(2010), 3, Seite 63-66 (DE-627)505952289 (DE-600)2216824-2 16904524 nnns volume:8 year:2010 number:3 pages:63-66 https://doaj.org/article/5d06e4a83a604ca0b4cb95d6e28d4264 kostenfrei http://www.iiisci.org/Journal/CV$/sci/pdfs/GS347VO.pdf kostenfrei https://doaj.org/toc/1690-4524 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_206 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 8 2010 3 63-66 |
spelling |
(DE-627)DOAJ010759867 (DE-599)DOAJ5d06e4a83a604ca0b4cb95d6e28d4264 DE-627 ger DE-627 rakwb eng T58.5-58.64 P87-96 Ming Yang verfasserin aut Secure Patient Information and Privacy in Medical Imaging 2010 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier In present times, identity protection is becoming increasingly jeopardized. Numerous ways of protecting one Information Hiding Hipaa Privacy Medical Images Encryption Information technology Communication. Mass media Monica Trifas verfasserin aut Lei Chen verfasserin aut Lei Song verfasserin aut Dorothy Buenos-Aires verfasserin aut Jaleesa Elston verfasserin aut In Journal of Systemics, Cybernetics and Informatics International Institute of Informatics and Cybernetics, 2011 8(2010), 3, Seite 63-66 (DE-627)505952289 (DE-600)2216824-2 16904524 nnns volume:8 year:2010 number:3 pages:63-66 https://doaj.org/article/5d06e4a83a604ca0b4cb95d6e28d4264 kostenfrei http://www.iiisci.org/Journal/CV$/sci/pdfs/GS347VO.pdf kostenfrei https://doaj.org/toc/1690-4524 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_206 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 8 2010 3 63-66 |
allfields_unstemmed |
(DE-627)DOAJ010759867 (DE-599)DOAJ5d06e4a83a604ca0b4cb95d6e28d4264 DE-627 ger DE-627 rakwb eng T58.5-58.64 P87-96 Ming Yang verfasserin aut Secure Patient Information and Privacy in Medical Imaging 2010 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier In present times, identity protection is becoming increasingly jeopardized. Numerous ways of protecting one Information Hiding Hipaa Privacy Medical Images Encryption Information technology Communication. Mass media Monica Trifas verfasserin aut Lei Chen verfasserin aut Lei Song verfasserin aut Dorothy Buenos-Aires verfasserin aut Jaleesa Elston verfasserin aut In Journal of Systemics, Cybernetics and Informatics International Institute of Informatics and Cybernetics, 2011 8(2010), 3, Seite 63-66 (DE-627)505952289 (DE-600)2216824-2 16904524 nnns volume:8 year:2010 number:3 pages:63-66 https://doaj.org/article/5d06e4a83a604ca0b4cb95d6e28d4264 kostenfrei http://www.iiisci.org/Journal/CV$/sci/pdfs/GS347VO.pdf kostenfrei https://doaj.org/toc/1690-4524 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_206 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 8 2010 3 63-66 |
allfieldsGer |
(DE-627)DOAJ010759867 (DE-599)DOAJ5d06e4a83a604ca0b4cb95d6e28d4264 DE-627 ger DE-627 rakwb eng T58.5-58.64 P87-96 Ming Yang verfasserin aut Secure Patient Information and Privacy in Medical Imaging 2010 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier In present times, identity protection is becoming increasingly jeopardized. Numerous ways of protecting one Information Hiding Hipaa Privacy Medical Images Encryption Information technology Communication. Mass media Monica Trifas verfasserin aut Lei Chen verfasserin aut Lei Song verfasserin aut Dorothy Buenos-Aires verfasserin aut Jaleesa Elston verfasserin aut In Journal of Systemics, Cybernetics and Informatics International Institute of Informatics and Cybernetics, 2011 8(2010), 3, Seite 63-66 (DE-627)505952289 (DE-600)2216824-2 16904524 nnns volume:8 year:2010 number:3 pages:63-66 https://doaj.org/article/5d06e4a83a604ca0b4cb95d6e28d4264 kostenfrei http://www.iiisci.org/Journal/CV$/sci/pdfs/GS347VO.pdf kostenfrei https://doaj.org/toc/1690-4524 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_206 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 8 2010 3 63-66 |
allfieldsSound |
(DE-627)DOAJ010759867 (DE-599)DOAJ5d06e4a83a604ca0b4cb95d6e28d4264 DE-627 ger DE-627 rakwb eng T58.5-58.64 P87-96 Ming Yang verfasserin aut Secure Patient Information and Privacy in Medical Imaging 2010 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier In present times, identity protection is becoming increasingly jeopardized. Numerous ways of protecting one Information Hiding Hipaa Privacy Medical Images Encryption Information technology Communication. Mass media Monica Trifas verfasserin aut Lei Chen verfasserin aut Lei Song verfasserin aut Dorothy Buenos-Aires verfasserin aut Jaleesa Elston verfasserin aut In Journal of Systemics, Cybernetics and Informatics International Institute of Informatics and Cybernetics, 2011 8(2010), 3, Seite 63-66 (DE-627)505952289 (DE-600)2216824-2 16904524 nnns volume:8 year:2010 number:3 pages:63-66 https://doaj.org/article/5d06e4a83a604ca0b4cb95d6e28d4264 kostenfrei http://www.iiisci.org/Journal/CV$/sci/pdfs/GS347VO.pdf kostenfrei https://doaj.org/toc/1690-4524 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_206 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 8 2010 3 63-66 |
language |
English |
source |
In Journal of Systemics, Cybernetics and Informatics 8(2010), 3, Seite 63-66 volume:8 year:2010 number:3 pages:63-66 |
sourceStr |
In Journal of Systemics, Cybernetics and Informatics 8(2010), 3, Seite 63-66 volume:8 year:2010 number:3 pages:63-66 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Information Hiding Hipaa Privacy Medical Images Encryption Information technology Communication. Mass media |
isfreeaccess_bool |
true |
container_title |
Journal of Systemics, Cybernetics and Informatics |
authorswithroles_txt_mv |
Ming Yang @@aut@@ Monica Trifas @@aut@@ Lei Chen @@aut@@ Lei Song @@aut@@ Dorothy Buenos-Aires @@aut@@ Jaleesa Elston @@aut@@ |
publishDateDaySort_date |
2010-01-01T00:00:00Z |
hierarchy_top_id |
505952289 |
id |
DOAJ010759867 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">DOAJ010759867</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230310031525.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230225s2010 xx |||||o 00| ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)DOAJ010759867</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DOAJ5d06e4a83a604ca0b4cb95d6e28d4264</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">T58.5-58.64</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">P87-96</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Ming Yang</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secure Patient Information and Privacy in Medical Imaging</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2010</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In present times, identity protection is becoming increasingly jeopardized. Numerous ways of protecting one</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Hiding</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hipaa</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Medical Images</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Encryption</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Information technology</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Communication. Mass media</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Monica Trifas</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Lei Chen</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Lei Song</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Dorothy Buenos-Aires</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Jaleesa Elston</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">In</subfield><subfield code="t">Journal of Systemics, Cybernetics and Informatics</subfield><subfield code="d">International Institute of Informatics and Cybernetics, 2011</subfield><subfield code="g">8(2010), 3, Seite 63-66</subfield><subfield code="w">(DE-627)505952289</subfield><subfield code="w">(DE-600)2216824-2</subfield><subfield code="x">16904524</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:8</subfield><subfield code="g">year:2010</subfield><subfield code="g">number:3</subfield><subfield code="g">pages:63-66</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doaj.org/article/5d06e4a83a604ca0b4cb95d6e28d4264</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.iiisci.org/Journal/CV$/sci/pdfs/GS347VO.pdf</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/1690-4524</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_DOAJ</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_74</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_170</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_206</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4326</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4367</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">8</subfield><subfield code="j">2010</subfield><subfield code="e">3</subfield><subfield code="h">63-66</subfield></datafield></record></collection>
|
callnumber-first |
T - Technology |
author |
Ming Yang |
spellingShingle |
Ming Yang misc T58.5-58.64 misc P87-96 misc Information Hiding misc Hipaa misc Privacy misc Medical Images misc Encryption misc Information technology misc Communication. Mass media Secure Patient Information and Privacy in Medical Imaging |
authorStr |
Ming Yang |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)505952289 |
format |
electronic Article |
delete_txt_mv |
keep |
author_role |
aut aut aut aut aut aut |
collection |
DOAJ |
remote_str |
true |
callnumber-label |
T58 |
illustrated |
Not Illustrated |
issn |
16904524 |
topic_title |
T58.5-58.64 P87-96 Secure Patient Information and Privacy in Medical Imaging Information Hiding Hipaa Privacy Medical Images Encryption |
topic |
misc T58.5-58.64 misc P87-96 misc Information Hiding misc Hipaa misc Privacy misc Medical Images misc Encryption misc Information technology misc Communication. Mass media |
topic_unstemmed |
misc T58.5-58.64 misc P87-96 misc Information Hiding misc Hipaa misc Privacy misc Medical Images misc Encryption misc Information technology misc Communication. Mass media |
topic_browse |
misc T58.5-58.64 misc P87-96 misc Information Hiding misc Hipaa misc Privacy misc Medical Images misc Encryption misc Information technology misc Communication. Mass media |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
Journal of Systemics, Cybernetics and Informatics |
hierarchy_parent_id |
505952289 |
hierarchy_top_title |
Journal of Systemics, Cybernetics and Informatics |
isfreeaccess_txt |
true |
familylinks_str_mv |
(DE-627)505952289 (DE-600)2216824-2 |
title |
Secure Patient Information and Privacy in Medical Imaging |
ctrlnum |
(DE-627)DOAJ010759867 (DE-599)DOAJ5d06e4a83a604ca0b4cb95d6e28d4264 |
title_full |
Secure Patient Information and Privacy in Medical Imaging |
author_sort |
Ming Yang |
journal |
Journal of Systemics, Cybernetics and Informatics |
journalStr |
Journal of Systemics, Cybernetics and Informatics |
callnumber-first-code |
T |
lang_code |
eng |
isOA_bool |
true |
recordtype |
marc |
publishDateSort |
2010 |
contenttype_str_mv |
txt |
container_start_page |
63 |
author_browse |
Ming Yang Monica Trifas Lei Chen Lei Song Dorothy Buenos-Aires Jaleesa Elston |
container_volume |
8 |
class |
T58.5-58.64 P87-96 |
format_se |
Elektronische Aufsätze |
author-letter |
Ming Yang |
author2-role |
verfasserin |
title_sort |
secure patient information and privacy in medical imaging |
callnumber |
T58.5-58.64 |
title_auth |
Secure Patient Information and Privacy in Medical Imaging |
abstract |
In present times, identity protection is becoming increasingly jeopardized. Numerous ways of protecting one |
abstractGer |
In present times, identity protection is becoming increasingly jeopardized. Numerous ways of protecting one |
abstract_unstemmed |
In present times, identity protection is becoming increasingly jeopardized. Numerous ways of protecting one |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_206 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 |
container_issue |
3 |
title_short |
Secure Patient Information and Privacy in Medical Imaging |
url |
https://doaj.org/article/5d06e4a83a604ca0b4cb95d6e28d4264 http://www.iiisci.org/Journal/CV$/sci/pdfs/GS347VO.pdf https://doaj.org/toc/1690-4524 |
remote_bool |
true |
author2 |
Monica Trifas Lei Chen Lei Song Dorothy Buenos-Aires Jaleesa Elston |
author2Str |
Monica Trifas Lei Chen Lei Song Dorothy Buenos-Aires Jaleesa Elston |
ppnlink |
505952289 |
callnumber-subject |
T - General Technology |
mediatype_str_mv |
c |
isOA_txt |
true |
hochschulschrift_bool |
false |
callnumber-a |
T58.5-58.64 |
up_date |
2024-07-03T16:36:48.113Z |
_version_ |
1803576523479842816 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">DOAJ010759867</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230310031525.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230225s2010 xx |||||o 00| ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)DOAJ010759867</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DOAJ5d06e4a83a604ca0b4cb95d6e28d4264</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">T58.5-58.64</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">P87-96</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Ming Yang</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secure Patient Information and Privacy in Medical Imaging</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2010</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In present times, identity protection is becoming increasingly jeopardized. Numerous ways of protecting one</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Hiding</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hipaa</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Medical Images</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Encryption</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Information technology</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Communication. Mass media</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Monica Trifas</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Lei Chen</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Lei Song</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Dorothy Buenos-Aires</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Jaleesa Elston</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">In</subfield><subfield code="t">Journal of Systemics, Cybernetics and Informatics</subfield><subfield code="d">International Institute of Informatics and Cybernetics, 2011</subfield><subfield code="g">8(2010), 3, Seite 63-66</subfield><subfield code="w">(DE-627)505952289</subfield><subfield code="w">(DE-600)2216824-2</subfield><subfield code="x">16904524</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:8</subfield><subfield code="g">year:2010</subfield><subfield code="g">number:3</subfield><subfield code="g">pages:63-66</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doaj.org/article/5d06e4a83a604ca0b4cb95d6e28d4264</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.iiisci.org/Journal/CV$/sci/pdfs/GS347VO.pdf</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/1690-4524</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_DOAJ</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_74</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_170</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_206</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4326</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4367</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">8</subfield><subfield code="j">2010</subfield><subfield code="e">3</subfield><subfield code="h">63-66</subfield></datafield></record></collection>
|
score |
7.399913 |