26
Views
14
CrossRef citations to date
0
Altmetric
Research Article

Developing secure Web-based medical applications

, , , &
Pages 75-90 | Published online: 12 Jul 2009

  • SMEETS, B., and JOHANSSON, T., 1997, Secure Storage and Retrieval in Medical Information Systems (Lund : Lund University Press).
  • SPINBLLIS, D., GRITZALIS, S., ILIADIS, J., GRITZALIS, D., KATSIKAS, S., POLEM, D., VARVTTSIOTIS, A., VELENTZAS, S., MARSH, A., UZIINOGLOU, N., DIMITRIADIS, D., BLOBEL, B., PHAROW, P., DB LUCA, L., and BARBER, B., 1997, Trusted Third Party Services for Healthcare in Europe, DGXIII/INFOSEC Project 20820 EUROMED-ETS final deliverable, http://www.math.aegean.gr/info-sec/projects/.
  • INTERNATIONAL STANDARDS ORGANISATION , 1988, ISO/TC97 7498-2, Information Processing Systems-OSI Reference Manual Part 2 : Security Architecture (Geneva: ISO).
  • GRTTZAUS, S., and SPTNELLIS, D., 1997, Addressing threats and security issues in World Wide Web technology. Proceedings of the 3rd IFIP International Conference on Communications and Multimedia Security, edited by S. Katsikas (London: Chapman & Hall), pp. 33-46.
  • MEYER, K., SCHAEFFER, S., and BAKER, D., 1995, Addressing threats in World Wide Web technology. Proceedings of the 11th IEEE Annual Computer Security Applications Conference (Los Alamitos: IEEE), pp. 123-132.
  • BROWN, A., GRAY, G., LAMBERT, O., MULLER, P., CASTELL, S., and BALOUET, V., 1993, User Requirements for TTP services, DGXIII/INFOSEC Project S2101 S01 deliverable, http://www.cordis.lu/infosec/src/down.htm.
  • RENSBURG, A., and SOLMS, B., 1977, A comparison of schemes for certification authorities. Proceedmgsofthe IFIP SEC' 97 International Information Security Conference (London : Chapman & Hall), pp. 222-240.
  • ZIMMERMANN, P., 1995, PGP Source Code and Internals (Cambridge, MA: MIT Press).
  • MILLEN, J., NEUMAN, C., SCHILLER, J., and SALTZER, J., 1987, Kerberos Authentication and Authorization System, Project Athena Technical Plan, Section E2.1 (Cambridge, MA: MIT Press).
  • KENT, S., 1993, Privacy Enhancement for Internet Electronic Mail: Part 2: Certificate Based Key Management, Request For Comments RFC 1422, http://www.ietf.org/.
  • TESTFIT-TTP & ELECTRONIC SIGNATURE TRIAL FOR INTER-MODAL TRANSPORT, 1995, DGXIII/ INFOSEC Project S2303, Final deliverable, http://www.cordis/lu/infosec/src/down.htm.
  • MASTER CARD, VISA, 1996, Secure Electronic Transaction Specification, Book! : Business Description, VISA Corporation.
  • MULLER, P., 1993. Functional model of trusted third party services. DGXIII/INFOSEC Project S2101 S03 deliverable, http://www.cordis/lu/infosec/src/down.htm.
  • CCITT, 1988, Recommendations X.500-X.521, Data Communication Networks Directory (Geneva: CCITT).
  • YEONG, W., HOWES, T., and Kille, S., 1995, Lightweight Directory Access Protocol, University of Michigan, ISODE Consortium, Request For Comments RFC 1777, http://www.ietf.org/.
  • CCITT BLUE BOOK, 1988, Recommendation X.509 and ISO 9594-8, Information Processing Systems-OSI-The Directory Authentication Framework (Geneva: CCITT).
  • RSA DATA SECURITY INC., 1995, S/MIME Implementation Guide, Interoperability Profile, Ver.1. (Massachusetts: RSA Inc.).
  • EUROPEAN COMMISSION , 1997, COM(97)503, Ensuring Security and Trust in Electronic Communication : Towards a European Framework for Digital Signatures and Encryption (Brussels : DG XIII).
  • COUNCIL OF EUROPE, 1981, Convention for the Protection of individuals with regard to automatic processing of personal data, Convention No. 108 (Strasbourg: CoE).
  • COUNCIL OF EUROPE, 1977. Council of Europe Recommendation R(97)5, On the Protection of Medical Data (Strasbourg: CoE).
  • RIVEST, R., 1992, The RC4 Encryption Algorithm (Massachusetts: RSA Inc.).
  • RIVEST, R., and DUSSE, S., 1992, The MD5 Message-Digest Algorithm, Request For Comments RFC 1321, http://www.ietf.org/.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.