References
- Data protection and confidentiality in health informatics report. AIM working conference, Brussels, 21–23 March, 1990
- Campbell J. A. A research and development program for trusted distribute DBMSs. Database Security IV, S. Jajodia. North-Holland. 1991
- Database Security IV, S. Jajodia, C. Lanowehr. North-Holland. 1991
- Lunt T. Research Directions in Database Systems. Springer-Verlag, Berlin 1992
- Pangalos G. Security in medical database systems, EEC. 1992, SEISMED project report, No. INT/S. 3/92
- Lincol T., Essin D. The computer based patient record. Database Security V: Status and Prospects, C. Landwehr, S. Jajodia. North-Holland. 1992
- Biskup J. Medical database security. Data Protection and Confidentiality in Health Informatics. IOS Press. 1991, the Commission of European Communities EEC/DGXII ed.
- Database Security III, D. Spooner, C. Landwehr. North-Holland. 1990
- Biskup J. Analysis of the privacy model for the information system DORIS. Database Security II: Status and Prospects. North-Holland. 1989
- Eugini M. Secure database development methodologies. Database Security II: Status and Prospects. North-Holland. 1989
- DoD, Department of Defence. 1985, Trusted Computer System Evaluation Criteria, DoD 5200.28-STD
- Information Technology Evaluation Criteria (ITSEC). Brussels June, 1991, Version 1.2, EEC Document
- Lunt T. Security in database systems. Computers and Security Journal 1990; 7(1)13–18
- Pangalos G. Analysis and design of hospital database systems. Information Age 1990; 123(4)
- National Computer Security Centre. Draft trusted DBMS interpretation of the DoD trusted computer system evaluation criteria. USA 1989
- National Computer Security Centre. Trusted network interpretation of the trusted computer system evaluation criteria. USA 1987, NCSC-TG-005
- Information Technology Security Evaluation Manual (ITSEM). April, 1992, Draft V0.2, EEC Draft Document
- Database Security II: Status and Prospectus, C. Landwehr. North-Holland. 1989
- Landwehr C. E. Minutes of IFIP-TC11 1986 meeting. 1986. Montecarlo December, 1986
- Hosmer H. Designing multilevel secure distributed databases. Database Security IV. North-Holland. 1992; 1–19
- Dwyer P., Je Latis G., Thuraisingham B. Multilevel security in database management systems. Computers and Security 1987; 6(3)252–261
- Akl S. Views for multilevel database security. IEEE Transactions on S/W England 1987; 13(2)
- Hartson H. Database security—system architectures. Information Systems 1981; 6(1)1–22
- Leyeson J. Safety analysis using Petri nets. IEEE Transactions on S/W England 1987; 13(3)
- Ting T. Application information security semantics: A case of mental health delivery. Research Directions in Database Systems. Springer-Verlag, Berlin 1992