메뉴 건너뛰기




Volumn 41, Issue 1, 1996, Pages 39-46

Security considerations for present and future medical databases

Author keywords

Database management; Medical databases; Security

Indexed keywords

DATABASE SYSTEMS; HOSPITAL DATA PROCESSING; SECURITY OF DATA; SYSTEMS ANALYSIS;

EID: 16344367731     PISSN: 00207101     EISSN: None     Source Type: Journal    
DOI: 10.1016/0020-7101(95)01154-4     Document Type: Article
Times cited : (11)

References (16)
  • 2
    • 0027087123 scopus 로고
    • Protecting the privacy of patient information in clinical networks: Regulatory effectiveness analysis
    • Brannigan VM: Protecting the privacy of patient information in clinical networks: regulatory effectiveness analysis, Ann NY Acad Sci, (1992) 190-201.
    • (1992) Ann NY Acad Sci , pp. 190-201
    • Brannigan, V.M.1
  • 3
    • 15844364090 scopus 로고
    • Personal communication
    • Lindsay P: Personal communication, 1995.
    • (1995)
    • Lindsay, P.1
  • 6
  • 7
    • 0012092778 scopus 로고
    • Secret sharing schemes arising from latin squares
    • Cooper J, Donovan D and Seberry J: Secret sharing schemes arising from latin squares, Bull ICA, 1994.
    • (1994) Bull ICA
    • Cooper, J.1    Donovan, D.2    Seberry, J.3
  • 10
    • 85030195497 scopus 로고
    • A Model of Statistical Database Compromise Incorporating Supplementary Knowledge
    • Sydney
    • Miller M: A Model of Statistical Database Compromise Incorporating Supplementary Knowledge, Proceedings DBIS'91, Sydney, 1991, pp. 258-267.
    • (1991) Proceedings DBIS'91 , pp. 258-267
    • Miller, M.1
  • 11
    • 15844406057 scopus 로고
    • Relative compromise of statistical databases
    • Miller M and Seberry J: Relative compromise of statistical databases, Aust Comput J, 21(2) (1989) 56-61.
    • (1989) Aust Comput J , vol.21 , Issue.2 , pp. 56-61
    • Miller, M.1    Seberry, J.2
  • 12
    • 0042220876 scopus 로고
    • Application of symmetric chains to an optimization problem in the security of statistical databases
    • Miller M, Roberts I and Simpson J: Application of symmetric chains to an optimization problem in the security of statistical databases, Bull ICA, 2 (1991) 47-58.
    • (1991) Bull ICA , vol.2 , pp. 47-58
    • Miller, M.1    Roberts, I.2    Simpson, J.3
  • 13
    • 15844418157 scopus 로고
    • Audit Expert and statistical database security
    • Eds: B Srinivasan and J Zeleznikow, World Scientific, Singapore
    • Miller M and Seberry J: Audit Expert and statistical database security. In Databases in the 1990s (Eds: B Srinivasan and J Zeleznikow), World Scientific, Singapore, 1990, pp. 149-174.
    • (1990) Databases in the 1990s , pp. 149-174
    • Miller, M.1    Seberry, J.2
  • 14
    • 0020205885 scopus 로고
    • Auditing and inference control in statistical databases
    • Chin FY and Oszoyoglu G: Auditing and inference control in statistical databases, IEEE Trans Softw Eng, SE-8(6) (1982) 574-582.
    • (1982) IEEE Trans Softw Eng , vol.SE-8 , Issue.6 , pp. 574-582
    • Chin, F.Y.1    Oszoyoglu, G.2
  • 15
    • 0023670513 scopus 로고
    • An evaluation of two new inference control methods
    • Chin YH and Peng WL: An evaluation of two new inference control methods, IEEE Trans Softw Eng, 13(12) (1987) 1329-1339.
    • (1987) IEEE Trans Softw Eng , vol.13 , Issue.12 , pp. 1329-1339
    • Chin, Y.H.1    Peng, W.L.2
  • 16
    • 33645672800 scopus 로고
    • Prevention of relative compromise in statistical databases using Audit Expert
    • Miller M, Roberts I and Simpson J: Prevention of relative compromise in statistical databases using Audit Expert, Bull ICA, 10 (1994).
    • (1994) Bull ICA , vol.10
    • Miller, M.1    Roberts, I.2    Simpson, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.