Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Baker, Dixie
add a person with the name Baker, Dixie
 

Other publications of authors with the same name

Addressing Beacon re-identification attacks: quantification and mitigation of privacy risks., , , , , , , , , and 8 other author(s). JAMIA, 24 (4): 799-805 (2017)PCASSO: Applying and Extending State-of-the-Art Security in the Healthcare Domain., , and . ACSAC, page 251-. IEEE Computer Society, (1997)Protecting clinical data on Web client computers: the PCASSO approach., and . AMIA, AMIA, (1998)Privacy-Preserving Linkage of Genomic and Clinical Data Sets., , , , , , and . IEEE/ACM Trans. Comput. Biology Bioinform., 16 (4): 1342-1348 (2019)Privacy and Security in Public Health: Maintaining the Delicate Balance between Personal Privacy and Population Safety.. ACSAC, page 3-22. IEEE Computer Society, (2006)Assurance: the power behind PCASSO security., , , and . AMIA, AMIA, (1999)Fortresses built upon sand.. NSPW, page 148-153. ACM, (1996)Evaluating and classifying the readiness of technology specifications for national standardization., , and . JAMIA, 22 (3): 738-743 (2015)Research Paper: Giving Patients Access to Their Medical Records via the Internet: The PCASSO Experience., , , and . JAMIA, 9 (2): 181-191 (2002)Patient-Centered Access to Secure Systems Online (PCASSO): a secure approach to clinical data access via the World Wide Web., and . AMIA, AMIA, (1997)