- THE SEISMED CONSORTIUM (Eds.), 1995, Data Security for Health Care, Vol. I, II, III, (Amsterdam: IOS Press).
- BARBER, B., et al. (Eds.), 1999, Standardisation in Health Care Security (Amsterdam: IOS Press).
- GARFINKEL, S., and SPAFFORD, E., 1997, Practical Unix and Internet Security (Sebastopol: O'Reilly & Associates, Inc.)
- COUNCIL OF EUROPE RECOMMENDATION R(97)5,1997, On the Protection of Medical Da ta (Strasbourg: CoE).
- GRITZALIS, S., ILIADIS, J., GRITZALIS, D. SPINELLIS, D. and KATSIKAS, S., 1999, Developing secure Web-based medical applications. Medical Informatics, 24, 75-90.
- EUROPEAN PARLIAMENT AND THE COUNCIL, 1999, Directive 1999/93/EC on a Community Framework for Electronic Signatures, Official Journal of the European Communities, 19.1.2000, L13/L2, EN.
- CCITT, 1988, Recommendations X.500-X.521, Data Communication Networks Directory (Geneva: CCITT).
- RSA DATA SECURITY INC., 1995, S/MIME Implementation Guide, Interoperability Profile, Ver.1. (Massachusetts: RSA Inc.).
- YEONG, W., HOWES, T. and KILLE, S., 1995, LDAP Lightweight Directory Access Protocol, University of Michigan, ISODE Consortium, Request For Comments RFC 1777.
- ILIADIS, J., SPINELLIS, D., KATSIKAS, S., GRITZALIS, D. and PRENEEL, B., 2000, Evaluating Certificate Status Information Mechanisms, Proceeding of the 7th ACM Conference on Computer and Communication Security CCS'2000, November 2000 (New York: ACM Press) pp. 1-8.
- CCITT BLUE BOOK, 1988, Recommendations X.509 and ISO 9594-8, Information Processing Systems - OSI - The Directory Authentication Framework (Geneva: CCITT).
- KALISKI, B., 1992, The MD2 Message-Digest Algorithm, Request For Comments RFC 1319.
- RIVEST, R. and DUSSE, S., 1992, The MD5 Message-Digest Algorithm, Request For Comments RFC 1321.
- ATKINSON, R. J., 1995, Security Architecture for the Internet Protocol, Request For Comments RFC 1825.
- SCHNEIER, B. and KELSEY, J., 1998, Cryptographic Support for Secure Logs on Untrusted Machines, Proceedings of the 7th USENIX Security Symposium, (Berkeley: USENIX) pp. 53-62.
- COUNCIL OF EUROPE, 1981, Convention for the protection of individuals with regard to automatic processing of personal data, Convention No. 108 (Strasbourg: CoE).
- ISO 17799, 2001, Code of Practice for Information Security Management (work in progress), available at www.securitvauditor.net/ISO17799/.
- OMG, 1995, CORBA: The Common Object Request Broker Architecture: Architecture and Specification.
- OMG, 1997, CORBA: The Common Object Request Broker Architecture: Services Specification.
- MOULINOS, K. and GRITZALIS, D., 2000, Cryptographic Libraries as a Means to Support PrivacyEnhanced Information Systems, Proceeding of the 7th ACM Conference on Computer and Communication Security CCS'2000, Workshop on Security and Privacy in Electronic Commerce, November 2000 (New York: ACM Press).
An integrated architecture for deploying a virtual private medical network over the Web
Reprints and Corporate Permissions
Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?
To request a reprint or corporate permissions for this article, please click on the relevant link below:
Academic Permissions
Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?
Obtain permissions instantly via Rightslink by clicking on the button below:
If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.
Related research
People also read lists articles that other readers of this article have read.
Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.
Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.