13
Views
0
CrossRef citations to date
0
Altmetric
Research Article

An integrated architecture for deploying a virtual private medical network over the Web

Pages 49-72 | Published online: 12 Jul 2009

  • THE SEISMED CONSORTIUM (Eds.), 1995, Data Security for Health Care, Vol. I, II, III, (Amsterdam: IOS Press).
  • BARBER, B., et al. (Eds.), 1999, Standardisation in Health Care Security (Amsterdam: IOS Press).
  • GARFINKEL, S., and SPAFFORD, E., 1997, Practical Unix and Internet Security (Sebastopol: O'Reilly & Associates, Inc.)
  • COUNCIL OF EUROPE RECOMMENDATION R(97)5,1997, On the Protection of Medical Da ta (Strasbourg: CoE).
  • GRITZALIS, S., ILIADIS, J., GRITZALIS, D. SPINELLIS, D. and KATSIKAS, S., 1999, Developing secure Web-based medical applications. Medical Informatics, 24, 75-90.
  • EUROPEAN PARLIAMENT AND THE COUNCIL, 1999, Directive 1999/93/EC on a Community Framework for Electronic Signatures, Official Journal of the European Communities, 19.1.2000, L13/L2, EN.
  • CCITT, 1988, Recommendations X.500-X.521, Data Communication Networks Directory (Geneva: CCITT).
  • RSA DATA SECURITY INC., 1995, S/MIME Implementation Guide, Interoperability Profile, Ver.1. (Massachusetts: RSA Inc.).
  • YEONG, W., HOWES, T. and KILLE, S., 1995, LDAP Lightweight Directory Access Protocol, University of Michigan, ISODE Consortium, Request For Comments RFC 1777.
  • ILIADIS, J., SPINELLIS, D., KATSIKAS, S., GRITZALIS, D. and PRENEEL, B., 2000, Evaluating Certificate Status Information Mechanisms, Proceeding of the 7th ACM Conference on Computer and Communication Security CCS'2000, November 2000 (New York: ACM Press) pp. 1-8.
  • CCITT BLUE BOOK, 1988, Recommendations X.509 and ISO 9594-8, Information Processing Systems - OSI - The Directory Authentication Framework (Geneva: CCITT).
  • KALISKI, B., 1992, The MD2 Message-Digest Algorithm, Request For Comments RFC 1319.
  • RIVEST, R. and DUSSE, S., 1992, The MD5 Message-Digest Algorithm, Request For Comments RFC 1321.
  • ATKINSON, R. J., 1995, Security Architecture for the Internet Protocol, Request For Comments RFC 1825.
  • SCHNEIER, B. and KELSEY, J., 1998, Cryptographic Support for Secure Logs on Untrusted Machines, Proceedings of the 7th USENIX Security Symposium, (Berkeley: USENIX) pp. 53-62.
  • COUNCIL OF EUROPE, 1981, Convention for the protection of individuals with regard to automatic processing of personal data, Convention No. 108 (Strasbourg: CoE).
  • ISO 17799, 2001, Code of Practice for Information Security Management (work in progress), available at www.securitvauditor.net/ISO17799/.
  • OMG, 1995, CORBA: The Common Object Request Broker Architecture: Architecture and Specification.
  • OMG, 1997, CORBA: The Common Object Request Broker Architecture: Services Specification.
  • MOULINOS, K. and GRITZALIS, D., 2000, Cryptographic Libraries as a Means to Support PrivacyEnhanced Information Systems, Proceeding of the 7th ACM Conference on Computer and Communication Security CCS'2000, Workshop on Security and Privacy in Electronic Commerce, November 2000 (New York: ACM Press).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.