Skip to main content
. 2013 Jan-Feb;20(1):95–101. doi: 10.1136/amiajnl-2012-001026

Figure 1.

Figure 1

Illustration of the threat model in this study. The attacker leverages a known patient's laboratory panel as a search key to discover a corresponding record in a biomedical research database. EMR, Electronic medical record; HIPAA, Health Insurance Portability and Accountability Act.