-
1
-
-
1842526990
-
A security architecture for interconnecting health information systems
-
Gritzalis D., and Lambrinoudakis C. A security architecture for interconnecting health information systems. Int. J. Med. Inform. 73 (2004) 305-309
-
(2004)
Int. J. Med. Inform.
, vol.73
, pp. 305-309
-
-
Gritzalis, D.1
Lambrinoudakis, C.2
-
2
-
-
1842474926
-
Authorization and access control for electronic health record systems
-
Blobel B. Authorization and access control for electronic health record systems. Int. J. Med. Inform. 73 (2004) 251-257
-
(2004)
Int. J. Med. Inform.
, vol.73
, pp. 251-257
-
-
Blobel, B.1
-
4
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest R., Shamir A., and Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Com. ACM 21 2 (1978) 120-126
-
(1978)
Com. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
5
-
-
28444492781
-
-
RSA Press
-
Atreya M., Hammond B., Paine S., Starrett P., Wu S., et al. Digital Signatures (2002), RSA Press
-
(2002)
Digital Signatures
-
-
Atreya, M.1
Hammond, B.2
Paine, S.3
Starrett, P.4
Wu, S.5
-
7
-
-
0034969582
-
An integrated architecture for deploying a virtual private medical network over the Web
-
Gritzalis S., Gritzalis D., Moulinos K., and Iliadis J. An integrated architecture for deploying a virtual private medical network over the Web. Med. Inform. Internet Med. 26 1 (2001) 49-72
-
(2001)
Med. Inform. Internet Med.
, vol.26
, Issue.1
, pp. 49-72
-
-
Gritzalis, S.1
Gritzalis, D.2
Moulinos, K.3
Iliadis, J.4
-
8
-
-
25844502437
-
Technical guidelines for enhancing privacy and data protection in modern electronic medical environments
-
Gritzalis S., Lambrinoudakis C., Lekkas D., and Deftereos S. Technical guidelines for enhancing privacy and data protection in modern electronic medical environments. IEEE Trans. Inform. Technol. BioMed. 9 3 (2005) 413-423
-
(2005)
IEEE Trans. Inform. Technol. BioMed.
, vol.9
, Issue.3
, pp. 413-423
-
-
Gritzalis, S.1
Lambrinoudakis, C.2
Lekkas, D.3
Deftereos, S.4
-
9
-
-
33947692931
-
-
D. Pinkas, J. Ross, N. Pope, Long term electronic signatures, IETF Request For Comments, No. 3126, 2001, available at http://www.ietf.org/rfc/rfc3126.txt (date last accessed: 3/20/2006).
-
-
-
-
10
-
-
33947691837
-
-
C. Wallace, S. Chokhani, Trusted Archiving, Orion Security Solutions, 2003, available at http://middleware.internet2.edu/pki04/proceedings/trusted_archiving.pdf (date last accessed: 3/20/2006).
-
-
-
-
11
-
-
0042378467
-
Towards a framework for evaluating certificate status information mechanisms
-
Iliadis J., Gritzalis S., Spinellis D., De Cock D., Preneel B., and Gritzalis D. Towards a framework for evaluating certificate status information mechanisms. Comput. Commun. 26 16 (2003) 1839-1850
-
(2003)
Comput. Commun.
, vol.26
, Issue.16
, pp. 1839-1850
-
-
Iliadis, J.1
Gritzalis, S.2
Spinellis, D.3
De Cock, D.4
Preneel, B.5
Gritzalis, D.6
-
12
-
-
0035387149
-
Secure digital archiving of high-value data
-
Wright T. Secure digital archiving of high-value data. BT Technol. J. 19 3 (2001) 60-66
-
(2001)
BT Technol. J.
, vol.19
, Issue.3
, pp. 60-66
-
-
Wright, T.1
-
13
-
-
3042721014
-
A metadata approach to preservation of digital resources: the University of North Texas libraries' experience
-
Alemneh D., Hastings S., and Hartman C. A metadata approach to preservation of digital resources: the University of North Texas libraries' experience. First Monday J. 7 8 (2002)
-
(2002)
First Monday J.
, vol.7
, Issue.8
-
-
Alemneh, D.1
Hastings, S.2
Hartman, C.3
-
15
-
-
0041376599
-
Establishing and managing trust within the public key infrastructure
-
Lekkas D. Establishing and managing trust within the public key infrastructure. Comput. Commun. 26 16 (2003) 1815-1825
-
(2003)
Comput. Commun.
, vol.26
, Issue.16
, pp. 1815-1825
-
-
Lekkas, D.1
-
16
-
-
0035426894
-
Risking trust in a public key infrastructure: old techniques of managing risk applied to new technology
-
Fernandes A. Risking trust in a public key infrastructure: old techniques of managing risk applied to new technology. Decis. Support Syst. 31 (2001) 303-322
-
(2001)
Decis. Support Syst.
, vol.31
, pp. 303-322
-
-
Fernandes, A.1
-
17
-
-
0034159709
-
Achieving interoperability in a multiple-security policies environment
-
Kokolakis S., and Kiountouzis E. Achieving interoperability in a multiple-security policies environment. Comput. Secur. 19 3 (2000) 267-281
-
(2000)
Comput. Secur.
, vol.19
, Issue.3
, pp. 267-281
-
-
Kokolakis, S.1
Kiountouzis, E.2
-
18
-
-
33947636835
-
-
M. Bartel, J. Boyer, B. Fox, B. LaMacchia, E. Simon, XML-Signature Syntax and Processing, W3C Recommendation, 2002, available at http://www.w3.org/TR/xmldsig-core/ (date last accessed: 3/20/2006).
-
-
-
|