34
Views
1
CrossRef citations to date
0
Altmetric
Original Article

The use of checksums to ensure data integrity in the healthcare industry

, &
Pages 38-41 | Published online: 12 Nov 2013

References

  • Smoak C, Widel M, Truong S. Checksum please: a way to ensure data integrity. In: Proceedings of the Pharmaceutical SAS Users Group; 2012 May 13–16; San Francisco, CA, USA; Cary (NC): SAS Institute; 2012. Paper TA01.
  • Wang S. eCTD — a new standard for FDA electronic submission. In: Proceedings of the Pharmaceutical SAS Users Group; 2004 May 23–26; San Diego, CA, USA; Cary (NC): SAS Institute; 2004. Paper FC01.
  • Bairnsfather S. Progress toward standardization of submissions with the electronic common technical document and the evolving standardization of clinical data. In: Proceedings of the Pharmaceutical SAS Users Group; 2003 May 4–7, Miami, FL, USA; Cary (NC): SAS Institute; 2003.
  • Helton E, McNealy J, Halley PB. SAS® validation in the pharmaceutical industry. In: Proceedings of the Pharmaceutical SAS Users Group; 2003 May 4–7, Miami, FL, USA; Cary (NC): SAS Institute; 2003.
  • Truong S, Smoak C. Validating and migrating SAS® 9.13 to 9.2. In: Proceedings of the Western Users of SAS Software; 2010 Nov 3–5; San Diego, CA, USA; Cary (NC): SAS Institute; 2010.
  • Csont WC, Proskin HM. Taking a walk on the wildside: use of the PROC CDISC-SDTM 3.1 format. In: Proceedings of the Pharmaceutical SAS Users Group; 2007 Jun 3–6; Denver, CO, USA; Cary (NC): SAS Institute; 2007.
  • Baucom J. Pharmacogenomics: JMP right in! In: Proceedings of the Pharmaceutical SAS Users Group; 2009 Mar 22–25; Washington, DC, USA. Cary (NC): SAS Institute; 2009.
  • Grasse D, Nelson GS. Base SAS vs. data integration studio: understanding ETL and the SAS tools used to support it. In: Proceedings of the 31st SAS Users Group International; 2006 Mar 26–29; San Francisco, CA, USA; Cary (NC): SAS Institute; 2006. Paper 099-31.
  • Mehler G. Next generation data warehousing with SAS 9. In: Proceedings of the 29th SAS Users Group International; 2004 May 9–12; Montreal, Canada; Cary (NC): SAS Institute; 2004. Paper 115-29.
  • Rausch N. Stars and models: how to build and maintain star schemas using SAS® data integration server in SAS®9. In: Proceedings of the 31st SAS Users Group International; 2006 Mar 26–29; San Francisco, CA, USA; Cary (NC): SAS Institute; 2006. Paper 096-31.
  • Maddox JA, Fulenwider DO. Using the SAS system to analyze quality control data from data collection devices. In: Proceedings of the 15th SAS Users Group International; 1990 Apr 1–4; Nashville, TN, USA; Cary (NC): SAS Institute; 1990.
  • Kent P. Microcomputers and System 2000 DBMS. In: Proceedings of the 11th SAS Users Group International; 1986 Feb 9–11; Atlanta, GA, USA; Cary (NC): SAS Institute; 1986.
  • Hack-proof your passwords. Consumer Reports 2012; p. 19–21.
  • Wang X, Yu H. How to break MD5 and other hash functions. Lect Notes Comput Sci. 2005;3494:19–35.
  • Rivest RL. The MD5 message-digest algorithm. IETF RFC 1321. Fremont, CA: IETF; 1992.

Further Reading

  • Blair E. Using the SAS system for data collection under the VMS operating system. In: Proceedings of the 15th SAS Users Group International; 1990 Apr 1–4; Nashville, TN, USA; Cary (NC): SAS Institute; 1990. p. 888–895.
  • Jacobs CA. Installing and maintaining supervisor and product bundles in LPA/ELPA for MVS/XA and MVS/ESA sites. In: Proceedings of the 16th SAS Users Group International; 1991 Feb 17–20; New Orleans, LA, USA; Cary (NC): SAS Institute; 1991. p. 941–943.
  • Kahn D. The codebreakers: the story of secret writing. New York: Macmillan; 1967.
  • Kaminsky D. MD5 to be considered harmful someday. Cryptology ePrint Archive, Report 2004/357, 6 December 2004.
  • Klima V. Finding MD5 collisions — a toy for a notebook. Cryptology ePrint Archive, Report 2005/075, 5 March 2005.
  • Kolb D. Micro to host link: performance and setup. In: Proceedings of the 12th SAS Users Group International; 1987 Feb 8–11; Dallas, TX, USA; Cary (NC): SAS Institute; 1987. p. 463–471.
  • Laing J. Client/server setup and implementation: web and non-web environments. In: Proceedings of the 25th SAS Users Group International; 2000 Apr 9–12; Indianapolis, IN, USA; Cary (NC): SAS Institute; 2000. Paper 19-25.
  • LeSueur J. Minimizing development risk while maximizing warehouse performance on UNIX® systems. In: Proceedings of the 25th SAS Users Group International; 2000 Apr 9–12; Indianapolis, IN, USA; Cary (NC): SAS Institute; 2000. Paper 120-25.
  • Mangold A. Regulatory compliant validation and deployment of SAS programs with the Colibri server. In: Proceedings of the Pharmaceutical Users Software Exchange; 2005 October 10–12; Heidelberg, Germany; Cary (NC): SAS Institute; 2005. Paper RC01.
  • Mironov I. Hash functions: theory, attacks, and applications. Redmond (WA): Microsoft Research; 2005 Nov. Technical Report No. TR-2005-187.
  • Shannon CE. The communication theory of secrecy systems. Bell Syst Tech J. 1949;28:656.
  • Singh S. The code book: the science of secrecy from ancient Egypt to quantum cryptography. New York: Anchor; 2000.
  • Schneier, B. Applied cryptography, protocols, algorithms and source code in C. New York: John Wiley & Sons, Inc.; 1996.
  • Wang XY, Guo FD, Lai XJ, Yu HB. Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD. rump session of Crypto’04. Cryptology ePrint Archive, Report 2004/199, 2004.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.