- A theoretical approach to the use of CPGs. The Guideline. Fall 1995, 1-2.
- ANSI/HISB, Inventory of Healthcare Information Standards, January 1997.
- BANKS, N., 1996, Constructing algorithm flowcharts for clinical performance management, International Journal on Health Care, 8, 395-400.
- CCTA Risk Analysis and Management Methodology (CRAMM, ver. 3.0), Central Computer and Telecommunication Agency, United Kingdom, 1997.
- CEN, TC-251, Secure User Identification for Healthcare: Identification and Authentication by Passwords: Management and Security, prENV 12251, June 1995.
- CEN, TC-251, Security Categorisation and Protection for Healthcare Information Systems, Draft prENV, October 1996.
- CEN, TC-251, Standards in Healthcare Informatics and Telematics, Ver. 2.0, April 1996.
- CEN, TC-251, Vital Signs Information Representation, December 1997.
- Commission of the European Communities, Glossary of information systems security, INFOSEC Programme, Project S-2001, 1993.
- Commission of the European Communities, Risk analysis methods database, INFOSEC Programme, Project 82014, 1993.
- DUBOIS, E., Wu, S., 1996, A framework for dealing with and specifying security requirements in information systems. In Proceedings of the 12th IFIP Information Security Conference, D. Gritzalis and S. Katsikas (eds.), (London: Chapman & Hall) pp. 88-99.
- ELOFF, J., LABUSCHAGNE, L. and BADENHORST, K., 1993, A comparative framework for risk analysis methods, Computers and Security, 12, 597-603.
- European Parliament Directive 95/46: 'On the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of such Data', Official Journal of the EC, L281/31-50, November 1995.
- GRITZALIS D., 1998, Enhancing security and improving interoperability in Healthcare information systems, Medical Informatics, 23, 309-324.
- GRITZALIS, S., ILIADIS, J., GRITZALIS, D., SPINELLIS, D. and KATSIKAS, S., 1999, Developing secure Web-based medical applications, Medical Informatics, 24, 75-90.
- ISO/IEC/JTCI Information Technology-Security Techniques-Guidelines for the Management of IT Security, GMITS, ISO/IEC DTR13335, 1996.
- KOKOLAKIS, S., GRITZALIS, D. and KATSIKAS, S., Draft standard for High Level Security Policies for Healthcare Establishments, European Commission, ISIS/MEDSEC Project, September 1998.
- LASKE, C., 1996, Legal issues in medical informatics: a bird's eye view. In: B. Barber, et al. (eds.). Towards Security in Medical Telematics. (The Netherlands: IOS Press).
- PARKER, D., 1995, A new framework for information security to avoid information anarchy. In Proceedings of the 11th IFIP Conference on Information Security, J. Ellof and S. von Solms (eds.), (London: Chapman & Hall) pp. 155-164.
- REYNOLDS, J., and CHANDRAMOULI, R., Bole-Based Access Control Protection Profile, Ver. 1.0, July 1998.
- THE SEISMED CONSORTIUM (eds.), 1996, Data Security for Health Care, Volumes I-III. (The Netherlands: IOS Press).
- SPINELLIS, D., KOKOLAKIS S., and GRITZALIS S., 1999, Security requirements, risks and recommendations for small enterprise and home-office environments, Information Management and Computer Security, 7, 23-34.
A data protection scheme for a remote vital signs monitoring healthcare service
Reprints and Corporate Permissions
Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?
To request a reprint or corporate permissions for this article, please click on the relevant link below:
Academic Permissions
Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?
Obtain permissions instantly via Rightslink by clicking on the button below:
If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.
Related research
People also read lists articles that other readers of this article have read.
Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.
Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.