References
- Campbell J. A research and development program for trusted distribute DBMSs. Database Security IV, C. Landwehr, S. Jajodia. North‐Holland, Amsterdam 1991; 381–394
- DoD. Department of Defence Trusted Computer System Evaluation Criteria. 1985, DoD 5200.28‐STD
- National Computer Security Center. Draft trusted DBMS interpretation of the DoD trusted computer system evaluation criteria. USA 1989
- Information Technology Evaluation Criteria (ITSEC). Brussels June, 1991, Version 1.2, EEC Document
- Biskup J. Medical database security. Data Protection and Confidentiality in Health Informatics. IOS Press. 1991; 214–230, EEC/DGXII
- Lunt T. Security in database systems. Computers and Security Journal 1992; 7(1)
- Pangalos G. Security in medical database systems. 1992, EEC, SEISMED project report, No. INT/S.3/92
- Fugini M. Secure database development methodologies. Database Security, I: Status and Prospects, C. Landwehr. North Holland, Amsterdam 1991; 103–129
- Ting T. Application information security semantics: A case of mental health delivery. Database Security III, D. L. Spooner, C. Landwehr. North Holland, Amsterdam 1990; 1–12
- Hinke T. DBMS trusted computing base taxonomy. Database Security III: Status and Prospects. North Holland, Amsterdam 1990; 97–108
- National Computer Security Center. Trusted network interpretation of the trusted computer system evaluation criteria. USA 1987, NCSC‐TG‐005
- Information Technology Security Evaluation Manual (ITSEM). April, 1992, Draft V0.2, EEC Draft Document
- Marel J. V., Barker A. B. User Access Rights in an Integrated Hospital Information System. IFIP‐IMIA, North Holland 1988
- Biskup J. (1990) Medical database security. Proceedings of GI‐20, Jahrestagung II, Stuttgart, October, 1990. Springer Verlag, Amsterdam, 212–221
- Biskup J. A general framework for database security. Proceedings of EUROSICS (European Symposium on Research in Computer Security), ToulouseFrance, 1990; 35–41
- Bisklp J. Analysis of the privacy model for the information system Doris. Database Security II: Status and Prospects, C. Landwehr. North Holland, Amsterdam 1989; 123–140