Confidentiality of Electronic Health Data: Methods for Protecting Personally Identifiable Information. Software & Application DESIGN/PROTECTION

07/03/1996

Bassham LE, Polk WY. Security of SQL-based implementations of product data exchange using STEP. Gaithersburg (MD): National Institute of Standards and Technology (US), Computer Systems Laboratory; 1993 Oct. Report No.: NIST Internal Report (NISTIR) 5283. Available from: NTIS, Springfield, VA; PB94-139649.

Bassoe CF. [Data hygiene. Data security, prevention of wrong or useless information and high quality of communication]. Tidsskr Nor Laegeforen 1995 Jan 20;115(2):252-5. (Nor).

Baum-Waidner B, Bunz H, Capellaro C. SAMSON, security management in a health care scenario. In: Kugler HJ, Mullery A, Niebert N, editors. 2nd International Conference on Intelligence in Broadband Services and Networks; 1994 Sep 7-9; Aachen, Germany. Berlin: Springer-Verlag; 1994. p. 503-12.

Bennett PA. Safety standards in medical software. In: Commission of the European Communities DG XIII/F AIM. Data protection and confidentiality in health informatics: handling health data in Europe in the future. Washington: IOS Press; 1991. p. 197-213. (Studies in health technology and informatics; vol. 1).

Biskup J. Medical database security. In: Commission of the European Communities DG XIII/F AIM. Data protection and confidentiality in health informatics: handling health data in Europe in the future. Washington: IOS Press; 1991. p. 214-30. (Studies in health technology and informatics; vol. 1).

Cannataci JA. Data protection issues in database management and expert systems. In: Commission of the European Communities DG XIII/F AIM. Data protection and confidentiality in health informatics: handling health data in Europe in the future. Washington: IOS Press; 1991. p. 161-80. (Studies in health technology and informatics; vol. 1).

Davey J. Tools and techniques for the development of secure software. Int J Biomed Comput 1994 Feb;35 Suppl:173-8.

Eichinger S, Pernul G. Design environment for a hospital information system: meeting the data security challenge. In: Lun KC, Degoulet P, Piemme TE, Rienhoff O, editors. MEDINFO 92. Proceedings of the 7th World Congress on Medical Informatics; 1992 Sep 6-10; Geneva, Switzerland. Vol.2. Amsterdam: North-Holland; 1992. p. 1582- 8.

Filsinger J. Integrity and the audit of trusted database management systems. In: Database Security, 6: Status and Prospects. IFIP WG 11.3 workshop; 1992 Aug 19-21; Vancouver, BC, Canada. [Amsterdam?: North-Holland?]; 1993. p. 349-65. (IFIP transactions A (computer science and technology); vol. A-21).

Haber L. Prevention is the best medicine. (impact and prevention of computer viruses and the emergence of anti- virus software). MIDRANGE Syst 1992 Feb 4;5(3):68-70.

Kailey JB, editor. Validated products list 1995 No. 2. Vol. 1, Programming languages, database language SQL, graphics, POSIX, and computer security; Vol. 2, GOSIP. Gaithersburg (MD): National Institute of Standards and Technology (US), Computer Systems Laboratory; 1995 Apr. Report No: NIST Internal Report (NISTIR) 5629. Available from: NTIS, Springfield, VA; PB95-937301.

Kemmerer RA. A multi-level formal specification of a mental health care database. In: Jajodia S, Landwehr CE, editors. Database Security, 4: Status and Prospects. Results of the IFIP WG 11.3 workshop; 1990 Sep 18-21; Halifax, UK. Amsterdam: North-Holland; 1991. p. 27-51.

Morgan JD. Point of care and patient privacy: who is in control? Top Health Inf Manag 1994 May;14(4):36-43.

Pangalos G, Pomportsis A, Bozios L, Khair M. Development of secure medical database systems. In: Karagiannis D, editor.

Proceedings of DEXA 94; 1994 Sep 7-9; Athens, Greece. Berlin: Springer-Verlag; 1994. p. 680-9.

Polk WT, Bassham LE. A guide to the selection of anti-virus tools and techniques. Gaithersburg (MD): National Institute of Standards and Technology (US), Computer Systems Laboratory; 1992 Dec. (NIST special publication; 800-5). Available from: NTIS, Springfield, VA; PB93-152049.

Polk WT, Bassham LE. Security issues in the database language SQL. Gaithersburg (MD): National Institute of Standards and Technology (US), Computer Systems Laboratory; 1993 Aug. (NIST special publication; 800-8). Available from: US GPO, Washington; SN 003-003-03225-5.

Ting TC. Application information security semantics: a case of mental health delivery. In: Spooner DL, Landwehr C, editors. Database Security, 3: Status and Prospects. Results of the IFIP WG 11.3 workshop; 5-7 Sep 1989; Monterey, CA. Amsterdam: North-Holland; 1990. p. 1-12.

Ulirsch RC, Ashwood ER, Noce P. Security in the clinical laboratory. Guidelines for managing the information resource. Arch Pathol Lab Med 1990 Jan;114(1):89-93.

van Dorp HD, Dubbeldam JF. The AIM SEISMED guidelines for system development and design. Int J Biomed Comput 1994 Feb;35 Suppl:179-86.

Watt R. Security in VAX DSM Version 6.0. MUG Q 1991 Jun;21(3):106-11.

Weingarten J. Can confidential patient information be kept private in high-tech medicine? MD Comput 1992 Mar- Apr;9(2):79-82.