Secure Electronic Health Record Exchange: Achieving the Meaningful Use Objectives
暂无分享,去创建一个
Dale Fuller | Subrata Acharya | Brian Coats | Arpit Saluja | Brian Coats | Subrata Acharya | D. Fuller | Arpit Saluja
[1] Karen A. Scarfone,et al. Guidelines on Securing Public Web Servers , 2002 .
[2] Karen A. Scarfone,et al. SP 800-153. Guidelines for Securing Wireless Local Area Networks (WLANs) , 2012 .
[3] John Wack,et al. Guidelines on Firewalls and Firewall Policy , 2002 .
[4] Shirley Radack,et al. Guidelines for Securing Wireless Local Area Networks (WLANs) , 2012 .
[5] Karen A. Scarfone,et al. Technical Guide to Information Security Testing and Assessment , 2008 .
[6] Elaine B. Barker. Recommendation for Key Management - Part 1 General , 2014 .
[7] D. Blumenthal,et al. The "meaningful use" regulation for electronic health records. , 2010, The New England journal of medicine.
[8] J. McClay,et al. Electronic Health Record (EHR) , 2015 .