Confidentiality of Electronic Health Data: Methods for Protecting Personally Identifiable Information. General

07/03/1996

Bacard A. The computer privacy handbook. Berkeley (CA): Peachpit Press; 1995.

Bowen J, Stavridou V. [Safety-critical systems. Formal methods are standards]. Genie Log Syst Expert 1993 Mar;30:37-64. (Fre).

Castano S. Database security. Reading (MA): Addison-Wesley; 1994.

Clark DD, Wilson DR. A comparison of commercial and military computer security policies. In: Proceedings of the 1987 IEEE Symposium on Security and Privacy; 1987 Apr 27-29; Oakland, CA. Washington: IEEE Computer Society Press; 1987. p. 184-94.

Gilbert DM. Sample statements of work for federal computer security services: for use in-house or contracting out. Lynch N, editor. Gaithersburg (MD): National Institute of Standards and Technology (US), Computer Systems Laboratory; 1991 Dec. Report No.: NIST Internal Report (NISTIR) 4749. Available from: NTIS, Springfield, VA; PB92-148261.

Guttman B, Roback EA. An introduction to computer security: the NIST handbook. Gaithersburg (MD): National Institute of Standards and Technology (US); 1995 Oct. Report No.: NIST Special Publication 800-12. 272 p. Available from: US GPO, Washington;SN003-003-03374-0.

National Institute of Standards and Technology (US); National Computer Security Center (US). 17th National Computer Security Conference; 1994 Oct 11-14; Baltimore, MD. [Ft. Meade (MD): National Computer Security Center]; 1995. 2 vols. Available from: National Security Agency, Publications Office, Ft. Meade, MD (410/766-8729).

National Institute of Standards and Technology (US), National Computer Security Center (US). 18th National Information Systems Security Conference); 1995 Oct 10-13; Baltimore. [Ft. Meade (MD): National Computer Security Center]; 1996. 2 vols. Available from: National Security Agency, Publications Office, Ft. Meade, MD (410/766-8729). Formerly the National Computer Security Conference.

Nazario NA, editor. General procedures for registering computer security objects. Gaithersburg (MD): National Institute of Standards and Technology (US), Computer Systems Laboratory; 1993 Dec. Report No.: NIST Internal Report (NISTIR) 5308. Available from: NTIS, Springfield, VA; PB94-134897.

Saltman RG, editor. Good security practices for electronic commerce, including electronic data interchange. Gaithersburg (MD): National Institute of Standards and Technology (US), Computer Systems Laboratory; 1993 Dec. Report No.: NIST Special Publication 800-9. Available from: NTIS, Springfield, VA;PB94-139045.

Saltman RG, editor. Workshop on Security Procedures for the Interchange of Electronic Documents: selected papers and results. Gaithersburg (MD): National Institute of Standards and Technology (US), Computer Security Laboratory; 1993 Aug. Report No.: NIST Internal Report (NISTIR) 5247. 128 p. Available from: NTIS, Springfield, VA; PB94101854.

SECURICOM 95. Proceedings of the 13th Worldwide Congress on Computer and Communications Security and Protection; 1995 Jun 8-9; Paris, France. Paris: Manifestations & Commun. Int.; 1995. 288 p.

United States, Congress, Office of Technology Assessment. Information security and privacy in network environments. Washington: U.S. Government Printing Office; 1994 Sep. Report No.: OTA-TCT-606. 244 p.

United States, Congress, Office of Technology Assessment. Issue update on information security and privacy in network environments. Washington: U.S. Government Printing Office; 1995 Jun. Report No.: OTA-BP-ITC-147. 142 p.