Silva, 2012 - Google Patents

ACES–A Cytel White Paper

Silva, 2012

View PDF
Document ID
6472161475730485044
Author
Silva E
Publication year

External Links

Snippet

In the past decade, there has been a significant increase in the use of Data Monitoring Committees (DMC) and Adaptive Designs (AD) in clinical trials. While the monitoring of safety data by a formal committee is not required for all clinical trials, it has become the norm …
Continue reading at www.cytel.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Similar Documents

Publication Publication Date Title
US11637840B2 (en) Method and system for forensic data tracking
US10147502B2 (en) Data driven schema for patient data exchange system
JP2022510245A (en) Centralized and decentralized personalized medicine platform
US8731965B2 (en) Collaborative multi-facility medication management system
US11783349B2 (en) Compliance management system
US20220319719A1 (en) Managed medical information exchange
CN103400226A (en) Integrated tobacco industry information security, operation and maintenance application platform system
JP7071490B2 (en) Dosage preparation data analysis
Ekblaw MedRec: blockchain for medical data access, permission management and trend analysis
Coutinho et al. Integrated cybersecurity methodology and supporting tools for healthcare operational information systems
Howison et al. Protecting sensitive data with secure data enclaves
US20140304009A1 (en) System and method for management of insurable assets
US20230401503A1 (en) Compliance management system
Silva ACES–A Cytel White Paper
Labuda et al. Medical 4.0: medical data ready for deep and machine learning
Beaty et al. Managing sensitive applications in the public cloud
Diaz et al. Scalable management architecture for electronic health records based on blockchain
Reza et al. A Framework to Secure Electronic Health Records using Privacy-Enabled Hyperledger Fabric
JP2021124878A (en) Electronic application assist method, electronic application assist system, program for electronic application assist system, and recording medium therefor
Senese A study of access control for electronic health records
Chavali et al. Clinical Trials in the Realm of Health Informatics
US20240291824A1 (en) Modifying user access levels to computing software computing applications based on detected state changes via integrations with third-party systems
Geada Improving Security, Privacy, and Connectivity Among Telemedicine Platforms
Oh A Comparative Analysis of Three Clinical Data Management Systems Across Seven Major Categories
Duncavage et al. A modeling environment for patient portals