23
Views
4
CrossRef citations to date
0
Altmetric
Original Article

Design and implementation of secure medical database systems

Pages 265-277 | Received 01 Mar 1994, Published online: 12 Jul 2009

References

  • Data protection and confidentiality in health informatics report. AIM working conference, Brussels, 21–23 March, 1990
  • Campbell J. A. A research and development program for trusted distribute DBMSs. Database Security IV, S. Jajodia. North-Holland. 1991
  • Database Security IV, S. Jajodia, C. Lanowehr. North-Holland. 1991
  • Lunt T. Research Directions in Database Systems. Springer-Verlag, Berlin 1992
  • Pangalos G. Security in medical database systems, EEC. 1992, SEISMED project report, No. INT/S. 3/92
  • Lincol T., Essin D. The computer based patient record. Database Security V: Status and Prospects, C. Landwehr, S. Jajodia. North-Holland. 1992
  • Biskup J. Medical database security. Data Protection and Confidentiality in Health Informatics. IOS Press. 1991, the Commission of European Communities EEC/DGXII ed.
  • Database Security III, D. Spooner, C. Landwehr. North-Holland. 1990
  • Biskup J. Analysis of the privacy model for the information system DORIS. Database Security II: Status and Prospects. North-Holland. 1989
  • Eugini M. Secure database development methodologies. Database Security II: Status and Prospects. North-Holland. 1989
  • DoD, Department of Defence. 1985, Trusted Computer System Evaluation Criteria, DoD 5200.28-STD
  • Information Technology Evaluation Criteria (ITSEC). Brussels June, 1991, Version 1.2, EEC Document
  • Lunt T. Security in database systems. Computers and Security Journal 1990; 7(1)13–18
  • Pangalos G. Analysis and design of hospital database systems. Information Age 1990; 123(4)
  • National Computer Security Centre. Draft trusted DBMS interpretation of the DoD trusted computer system evaluation criteria. USA 1989
  • National Computer Security Centre. Trusted network interpretation of the trusted computer system evaluation criteria. USA 1987, NCSC-TG-005
  • Information Technology Security Evaluation Manual (ITSEM). April, 1992, Draft V0.2, EEC Draft Document
  • Database Security II: Status and Prospectus, C. Landwehr. North-Holland. 1989
  • Landwehr C. E. Minutes of IFIP-TC11 1986 meeting. 1986. Montecarlo December, 1986
  • Hosmer H. Designing multilevel secure distributed databases. Database Security IV. North-Holland. 1992; 1–19
  • Dwyer P., Je Latis G., Thuraisingham B. Multilevel security in database management systems. Computers and Security 1987; 6(3)252–261
  • Akl S. Views for multilevel database security. IEEE Transactions on S/W England 1987; 13(2)
  • Hartson H. Database security—system architectures. Information Systems 1981; 6(1)1–22
  • Leyeson J. Safety analysis using Petri nets. IEEE Transactions on S/W England 1987; 13(3)
  • Ting T. Application information security semantics: A case of mental health delivery. Research Directions in Database Systems. Springer-Verlag, Berlin 1992

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.