메뉴 건너뛰기




Volumn 47, Issue 5, 2008, Pages 409-416

Model-based security analysis of the German Health Card architecture

Author keywords

German Health Card; Health information systems; Model based development; Security; UMLsec

Indexed keywords

ACCESS TO INFORMATION; ARTICLE; COMPUTER LANGUAGE; COMPUTER PROGRAM; COMPUTER SECURITY; CONFIDENTIALITY; ELECTRONIC DATA INTERCHANGE; ELECTRONIC MEDICAL RECORD; GERMANY; HEALTH INSURANCE; HUMAN; INFORMATION TECHNOLOGY; MEDICAL INFORMATION SYSTEM; PATIENT INFORMATION; PRESCRIPTION; PRIORITY JOURNAL; PROCESS MODEL; SMART CARD;

EID: 55049118116     PISSN: 00261270     EISSN: None     Source Type: Journal    
DOI: 10.3414/ME9122     Document Type: Article
Times cited : (21)

References (27)
  • 2
    • 55049114454 scopus 로고    scopus 로고
    • Jürjens J, Rumm R. Security analysis of complex telematics systems at the hand of the electronic health card: Experimental results. 2007. http://mcs.open.ac.uk/jj2924/umlsectool/applications/healthcard
    • Jürjens J, Rumm R. Security analysis of complex telematics systems at the hand of the electronic health card: Experimental results. 2007. http://mcs.open.ac.uk/jj2924/umlsectool/applications/healthcard
  • 3
    • 34548787238 scopus 로고    scopus 로고
    • Model-based security engineering of distributed information systems using UMLsec
    • Minneapolis. IEEE Computer Society;
    • Best B, Jürjens J, Nuseibeh B. Model-based security engineering of distributed information systems using UMLsec. 29th International Conference on Software Engineering (ICSE 2007), Minneapolis. IEEE Computer Society; 2007. pp 581-590.
    • (2007) 29th International Conference on Software Engineering (ICSE , pp. 581-590
    • Best, B.1    Jürjens, J.2    Nuseibeh, B.3
  • 5
    • 24344438696 scopus 로고    scopus 로고
    • Secure software development by example
    • Apvrille A, Pourzandi M. Secure software development by example. IEEE Security & Privacy 2005; 3, 4: 10-17.
    • (2005) IEEE Security & Privacy , vol.3 , Issue.4 , pp. 10-17
    • Apvrille, A.1    Pourzandi, M.2
  • 6
    • 33749391615 scopus 로고    scopus 로고
    • Model-based security engineering for real
    • 14th Intern Symposium on Formal Methods FM
    • Jürjens J. Model-based security engineering for real. 14th Intern Symposium on Formal Methods (FM 2006). LNCS 2006; 4085: 600-606.
    • (2006) LNCS , vol.4085 , pp. 600-606
    • Jürjens, J.1
  • 8
    • 33846828667 scopus 로고    scopus 로고
    • A model-driven approach for the German health telematics architectural framework and security infrastructure
    • Blobel B, Pharow P. A model-driven approach for the German health telematics architectural framework and security infrastructure. International Journal of Medical Informatics 2007; 76, 2-3: 169-175.
    • (2007) International Journal of Medical Informatics , vol.76
    • Blobel, B.1    Pharow, P.2
  • 11
    • 55049109759 scopus 로고    scopus 로고
    • Model-driven security engineering for trust management in SECTET
    • Alam M, Hafner M, Breu R. Model-driven security engineering for trust management in SECTET. Journal of Software 2007; 2, 1: 47-59.
    • (2007) Journal of Software , vol.2 , Issue.1 , pp. 47-59
    • Alam, M.1    Hafner, M.2    Breu, R.3
  • 12
    • 55049085563 scopus 로고    scopus 로고
    • Agreiter B, Alam M, Hafner M, Seifert J-P, Zhang X. Model driven configuration of secure operating systems for mobile applications in healthcare. In: Sztipanovits et al. [10].
    • Agreiter B, Alam M, Hafner M, Seifert J-P, Zhang X. Model driven configuration of secure operating systems for mobile applications in healthcare. In: Sztipanovits et al. [10].
  • 15
    • 55049142401 scopus 로고    scopus 로고
    • Mathe J, Duncavage S, Werner J, Malin B, Ledeczi A, and Sztipanovits J. Implementing a model-based design environment for clinical information systems. In: Sztipanovits et al. [10].
    • Mathe J, Duncavage S, Werner J, Malin B, Ledeczi A, and Sztipanovits J. Implementing a model-based design environment for clinical information systems. In: Sztipanovits et al. [10].
  • 16
    • 55049084625 scopus 로고    scopus 로고
    • Gesetz zur Modemisierung der gesetzlichen Krankenversicherung (GKV-Modemisierungsgesetz/GMG). Germany, Bundesgesetzblatt 2003; I: 2190.
    • Gesetz zur Modemisierung der gesetzlichen Krankenversicherung (GKV-Modemisierungsgesetz/GMG). Germany, Bundesgesetzblatt 2003; I: 2190.
  • 17
    • 55049095114 scopus 로고    scopus 로고
    • Bundesdatenschutzgesetz (BDSG). Germany, Bundesgesetzblatt 2007; I: 201 and 1977; I: 66.
    • Bundesdatenschutzgesetz (BDSG). Germany, Bundesgesetzblatt 2007; I: 201 and 1977; I: 66.
  • 18
    • 55049096985 scopus 로고    scopus 로고
    • Bundesministerium des Innern. Standards und Architekturen fur E-Government-Anwendungen SAGA Version 4.0, Germany, Mar. 2008
    • Bundesministerium des Innern. Standards und Architekturen fur E-Government-Anwendungen (SAGA Version 4.0). Germany, Mar. 2008.
  • 19
    • 55049132229 scopus 로고    scopus 로고
    • Bundesamt für Sicherheit in der Informationstechnik, Germany, Available at
    • Bundesamt für Sicherheit in der Informationstechnik, IT Sicherheit auf Basis der Common Criteria - ein Leiffaden. Germany, 2005. Available at http://www.bsi.bund.de/cc/cc_leitf.pdf
    • (2005) IT Sicherheit auf Basis der Common Criteria - ein Leiffaden
  • 20
    • 55049138562 scopus 로고    scopus 로고
    • Gesetz über Rahmenbedingungen für elektronische Signaturen (Signaturgesetz/SigG). Germany, Bundesgesetzblatt 2001; I: 876 and 2007; I: 179, 185.
    • Gesetz über Rahmenbedingungen für elektronische Signaturen (Signaturgesetz/SigG). Germany, Bundesgesetzblatt 2001; I: 876 and 2007; I: 179, 185.
  • 21
    • 55049137940 scopus 로고    scopus 로고
    • Verordnung zur elektronischen Signatur (Signaturverordnung/SigV). Germany, Bundesgesetzblatt 2001; I: 3074 and 2007; I: 2631, 2671.
    • Verordnung zur elektronischen Signatur (Signaturverordnung/SigV). Germany, Bundesgesetzblatt 2001; I: 3074 and 2007; I: 2631, 2671.
  • 22
    • 55049112358 scopus 로고    scopus 로고
    • eHealth card - bIT4Health architecture. http://www.dimdi.de/static/en/ ehealth. 2007.
    • eHealth card - bIT4Health architecture. http://www.dimdi.de/static/en/ ehealth. 2007.
  • 24
    • 33244457785 scopus 로고    scopus 로고
    • Sound methods and effective tools for model-based security engineering with UML
    • St. Louis. ACM
    • Jürjens J. Sound methods and effective tools for model-based security engineering with UML. 27th Int. Conf. on Softw. Engineering (ICSE 2005), St. Louis. ACM 2005. pp 322-331.
    • (2005) 27th Int. Conf. on Softw. Engineering (ICSE , pp. 322-331
    • Jürjens, J.1
  • 25
    • 35348959376 scopus 로고    scopus 로고
    • Jürjens J, Shabalin P. Tools for secure systems development with UML. Intern. Journal on Software Tools for Technology Transfer 2007; 9: 527-544. Invited submission to the special issue for FASE 2004/05.
    • Jürjens J, Shabalin P. Tools for secure systems development with UML. Intern. Journal on Software Tools for Technology Transfer 2007; 9: 527-544. Invited submission to the special issue for FASE 2004/05.
  • 26
    • 55049098914 scopus 로고    scopus 로고
    • UMLsee tool. 2001-08. http://mes.open.ac.uk/jj2924/umlsectool.
    • UMLsee tool. 2001-08. http://mes.open.ac.uk/jj2924/umlsectool.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.