dc.contributor.author | Bourka, A | en |
dc.contributor.author | Polemi, N | en |
dc.contributor.author | Koutsouris, D | en |
dc.date.accessioned | 2014-03-01T11:44:28Z | |
dc.date.available | 2014-03-01T11:44:28Z | |
dc.date.issued | 2001 | en |
dc.identifier.issn | 15696332 | en |
dc.identifier.uri | https://dspace.lib.ntua.gr/xmlui/handle/123456789/36966 | |
dc.relation.uri | http://www.scopus.com/inward/record.url?eid=2-s2.0-0035236570&partnerID=40&md5=28e8f2babdea35b95067257beade3728 | en |
dc.relation.uri | http://www.scopus.com/inward/record.url?eid=2-s2.0-0035236570&partnerID=40&md5=28e8f2babdea35b95067257beade3728 | en |
dc.subject.other | computer security | en |
dc.subject.other | European Union | en |
dc.subject.other | health care delivery | en |
dc.subject.other | information system | en |
dc.subject.other | Internet | en |
dc.subject.other | review | en |
dc.subject.other | standard | en |
dc.subject.other | telemedicine | en |
dc.subject.other | Computer Security | en |
dc.subject.other | Delivery of Health Care | en |
dc.subject.other | European Union | en |
dc.subject.other | Information Systems | en |
dc.subject.other | Internet | en |
dc.subject.other | Telemedicine | en |
dc.title | An overview in healthcare information systems security. | en |
heal.type | other | en |
heal.publicationDate | 2001 | en |
heal.abstract | The scope of this paper is to present the current needs and trends in the field of healthcare systems security. The approach applied within the described review was based on three major steps. The first step was to define the point and ways of penetration and integration of security services in current healthcare related applications addressing technical, organisational and legal/regulatory issues. The second step was to specify and evaluate common security technologies applied in healthcare information systems pointing out gaps and efficient solutions, whereas the third was to draw conclusions for the present conditions and identify the future trends of healthcare information security. A number of EU RTD Projects were selected, categorised, analysed and comparatively evaluated in terms of security. The technical focus was on key security technologies, like Public Key Infrastructures (PKIs) based on Trusted Third Parties (TTPs) in conjunction with other state-of-the-art security components (programming tools, data representation formats, security standards and protocols, security policies and risk assessment techniques). The experience gained within this review will provide valuable input for future security applications in the healthcare sector, solving existing problems and addressing real user needs. | en |
heal.journalName | Medinfo | en |
dc.identifier.volume | 10 | en |
dc.identifier.issue | Pt 2 | en |
dc.identifier.spage | 1242 | en |
dc.identifier.epage | 1246 | en |
Αρχεία | Μέγεθος | Μορφότυπο | Προβολή |
---|---|---|---|
Δεν υπάρχουν αρχεία που σχετίζονται με αυτό το τεκμήριο. |