12
Views
5
CrossRef citations to date
0
Altmetric
Original Article

Medical database security evaluation

Pages 283-292 | Received 01 Nov 1992, Published online: 12 Jul 2009

References

  • Campbell J. A research and development program for trusted distribute DBMSs. Database Security IV, C. Landwehr, S. Jajodia. North‐Holland, Amsterdam 1991; 381–394
  • DoD. Department of Defence Trusted Computer System Evaluation Criteria. 1985, DoD 5200.28‐STD
  • National Computer Security Center. Draft trusted DBMS interpretation of the DoD trusted computer system evaluation criteria. USA 1989
  • Information Technology Evaluation Criteria (ITSEC). Brussels June, 1991, Version 1.2, EEC Document
  • Biskup J. Medical database security. Data Protection and Confidentiality in Health Informatics. IOS Press. 1991; 214–230, EEC/DGXII
  • Lunt T. Security in database systems. Computers and Security Journal 1992; 7(1)
  • Pangalos G. Security in medical database systems. 1992, EEC, SEISMED project report, No. INT/S.3/92
  • Fugini M. Secure database development methodologies. Database Security, I: Status and Prospects, C. Landwehr. North Holland, Amsterdam 1991; 103–129
  • Ting T. Application information security semantics: A case of mental health delivery. Database Security III, D. L. Spooner, C. Landwehr. North Holland, Amsterdam 1990; 1–12
  • Hinke T. DBMS trusted computing base taxonomy. Database Security III: Status and Prospects. North Holland, Amsterdam 1990; 97–108
  • National Computer Security Center. Trusted network interpretation of the trusted computer system evaluation criteria. USA 1987, NCSC‐TG‐005
  • Information Technology Security Evaluation Manual (ITSEM). April, 1992, Draft V0.2, EEC Draft Document
  • Marel J. V., Barker A. B. User Access Rights in an Integrated Hospital Information System. IFIP‐IMIA, North Holland 1988
  • Biskup J. (1990) Medical database security. Proceedings of GI‐20, Jahrestagung II, Stuttgart, October, 1990. Springer Verlag, Amsterdam, 212–221
  • Biskup J. A general framework for database security. Proceedings of EUROSICS (European Symposium on Research in Computer Security), ToulouseFrance, 1990; 35–41
  • Bisklp J. Analysis of the privacy model for the information system Doris. Database Security II: Status and Prospects, C. Landwehr. North Holland, Amsterdam 1989; 123–140

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.