Confidentiality of Electronic Health Data: Methods for Protecting Personally Identifiable Information. Network Security

07/03/1996

Bagwill R, Barkley J, Carnahan L, et al. Security in open systems. Gaithersburg (MD): National Institute of Standards and Technology (US), Computer Systems Laboratory; 1994 Jul. (NIST special publication; 800-7). Available from: US GPO, Washington; SN003-003-03276-0.

Bleumer G. Security for decentralized health information systems. Int J Biomed Comput 1994 Feb;35 Suppl:139- 45.

Campbell LA. How secure is the Internet for health care applications? Toward Electron Patient Rec 1995 Jun- Jul;4(1):1, 3-16.

Castagna R. The well-guarded LAN. PC Sources 1991 Sep;2(9):139-42.

Cheswick WR, Bellowin SM. Firewalls and Internet security: repelling the wily hacker. Reading (MA): Addison- Wesley Pub. Co., Inc.; 1994. 306 p.

Dayanim J. Disaster recovery: options for public and private networks. (includes related article on network recovery for integrated LAN/WAN networks). Telecommunications 1991 Dec; 25(12):48-52.

de Roulet D, Le HS, Scherrer JR. The technical conditions for an open architecture. Int J Biomed Comput 1994 Feb;35 Suppl:107-14.

Fernandez Del Val C. Medical network security and viruses. In: Commission of the European Communities DG XIII/F AIM. Data protection and confidentiality in health informatics: handling health data in Europe in the future. Washington: IOS Press; 1991. p. 271-84. (Studies in health technology and informatics; vol. 1).

Harwood R. Install the wall. DEC Prof 1994 Dec;13(12):44-5.

Howlett P, Powell T. United we stand (hospital network security). Br J Healthc Comput Inf Manag 1994 Oct;11(8):26-7.

Klimmins J, Dinkel C, Walters D. Telecommunications security guidelines for telecommunications management network. Gaithersburg (MD): National Institute of Standards and Technology (US); 1995 Oct. 37 p. (NIST special publication; 800-13). Available from: US GPO, Washington; SN003-003-03376-6.

Leon BJ, Narayanan R. Network management information for system control. In: Proceedings of GLOBECOM '93. IEEE Global Telecommunications Conference; 1993 Nov 29 - Dec 2; Houston, TX. Vol. 3. New York: IEEE; 1993. p. 1553-7.

McWilliams S. How Boston's Beth Israel Hospital copes with security on the Internet. IS Anal 1994 Dec;33(12):12-6.

Moehr JR, McDaniel JG. Security precautions for networked computers. Dimens Health Serv 1991 Apr;68(3):21- 4.

National Institute of Standards and Technology (US), Computer Systems Laboratory. Standard security label for information transfer. Gaithersburg (MD): The Institute; 1994 Sep. (Federal information processing standards; FIPS PUB 188). Available from: NTIS, Springfield, VA.

Pfitzmann A, Pfitzmann B. Security in medical networks. In: Commission of the European Communities DG XIII/F AIM. Data protection and confidentiality in health informatics: handling health data in Europe in the future. Washington: IOS Press; 1991. p. 231-48. (Studies in health technology and informatics; vol. 1).

Private Branch Exchange (PBX) security guidelines. Gaithersburg (MD): National Institute of Standards and Technology (US), Computer Systems Laboratory; 1993 Sep. Report No.: NIST GCR 93-635. Available from: NTIS, Springfield, VA; PB94-100880.

Rotenberg M. Communications privacy: implications for network design. Commun ACM 1993 Aug;36(8):61- 9.

Vaughan-Nichols S. Safety nets and Unix networks. Comput Shopp 1991 Dec;11(12):770-2.

Wack JP, Carnahan LJ. Keeping your site comfortably secure: an introduction to Internet firewalls. Gaithersburg (MD): National Institute of Standards and Technology (US), Computer Systems Laboratory; 1994 Dec. (NIST special publication; 800-10). Available from: US GPO, Washington; SN003-03313-8.