6
Views
3
CrossRef citations to date
0
Altmetric
Original Article

A front end authorization mechanism for hospital information systems

&
Pages 93-103 | Received 01 Jan 1996, Published online: 12 Jul 2009

References

  • Biskup J. Medical database security. Data Protection and Confidentiality in Health Informatics CEC DG XIII/F AIM. IOS Press, Amsterdam 1991; 214–230
  • Eichinger S., Pernul G. (1992) Design environment for a hospital information system: meeting the data security challenge. 1992, K. C. Lun, P. Degoulet, T. E. Piemme, O. Rienhoff. Elsevier Science Publishers B.V. (North-Holland), Amsterdam, 1582–1588, Medinfo 92
  • Notargiacomo L., Graubart D. Health delivery: the problem solved?. Database Security, IV: Status and Prospects, S. Jajodia, C. E. Landwehr. North-Holland, Amsterdam 1991; 13–26
  • Pangalos G., Gritzalis D., Khair M., Bozios L. (1995) Improving the security of medical database systems. Proceedings of the IFIP TC11 International Conference on Information Security, IFIP/Sec' 95. 1995, J. H. P. Eloff, S. H. von Solms. Chapman-Hall, London, 11–25
  • Castano S., Fugini M., Martella G., Samarati P. Database Security. ACM Press, New York 1995
  • Fugini M. Secure database development methodologies. Database Security: Status and Prospects, C E. Landwehr. North-Holland, Amsterdam 1988; 103–129
  • Ting T. A user-role based data security approach. Database Security: Status and Prospects, C. E. Landwehr. North-Holland, Amsterdam 1988; 187–208
  • INGRES/SQL Reference Manual for the UNIX and VMS Operating Systems, Release 6.4. December, 1991
  • Bertino E., Weigard H. An approach to authorization modelling in object-oriented database systems. Data and Knowledge Engineering 1994; 12: 1–29
  • Lochovsky F., Woo C. Role-based security in database management systems. Database Security: Status and Prospects, C. E. Landwehr. North-Holland, Amsterdam 1988; 209–222
  • Mohammed I., Dilts D. Design for dynamic user-role-based security. Computers and Security 1994; 13: 661–671
  • Wood C., Fernandez E. B., Summers R. C. Data base security: requirements, policies and models. IBM Systems Journal 1980; 19(2)229–252
  • Ceri S., Gottlob G., Wiederhold G. Interfacing Relational Databases and Prolog Efficiently. Expert Database Systems, L. Kerschberg. Benjamin Cummings Publishing Co, California 1987; 207–223
  • Farris C., Singleton P. (1989) Combining Prolog with an RDBMS for applications in software configuration management. Proceedings of the Working Conference on Data and Knowledge Base Integration. 1989, S. Deen, G. Thomas. Pitman, London, 169–180
  • Chakravarthy S. Architectures and monitoring techniques for active databases: An evaluation. Data and Knowledge Engineering 1995; 16: 1–26
  • Steinke G. Design aspects of access control in a knowledge base system. Computers and Security 1991; 10: 612–625

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.