An overview in healthcare information systems security.

DSpace/Manakin Repository

Show simple item record

dc.contributor.author Bourka, A en
dc.contributor.author Polemi, N en
dc.contributor.author Koutsouris, D en
dc.date.accessioned 2014-03-01T11:44:28Z
dc.date.available 2014-03-01T11:44:28Z
dc.date.issued 2001 en
dc.identifier.issn 15696332 en
dc.identifier.uri https://dspace.lib.ntua.gr/xmlui/handle/123456789/36966
dc.relation.uri http://www.scopus.com/inward/record.url?eid=2-s2.0-0035236570&partnerID=40&md5=28e8f2babdea35b95067257beade3728 en
dc.relation.uri http://www.scopus.com/inward/record.url?eid=2-s2.0-0035236570&partnerID=40&md5=28e8f2babdea35b95067257beade3728 en
dc.subject.other computer security en
dc.subject.other European Union en
dc.subject.other health care delivery en
dc.subject.other information system en
dc.subject.other Internet en
dc.subject.other review en
dc.subject.other standard en
dc.subject.other telemedicine en
dc.subject.other Computer Security en
dc.subject.other Delivery of Health Care en
dc.subject.other European Union en
dc.subject.other Information Systems en
dc.subject.other Internet en
dc.subject.other Telemedicine en
dc.title An overview in healthcare information systems security. en
heal.type other en
heal.publicationDate 2001 en
heal.abstract The scope of this paper is to present the current needs and trends in the field of healthcare systems security. The approach applied within the described review was based on three major steps. The first step was to define the point and ways of penetration and integration of security services in current healthcare related applications addressing technical, organisational and legal/regulatory issues. The second step was to specify and evaluate common security technologies applied in healthcare information systems pointing out gaps and efficient solutions, whereas the third was to draw conclusions for the present conditions and identify the future trends of healthcare information security. A number of EU RTD Projects were selected, categorised, analysed and comparatively evaluated in terms of security. The technical focus was on key security technologies, like Public Key Infrastructures (PKIs) based on Trusted Third Parties (TTPs) in conjunction with other state-of-the-art security components (programming tools, data representation formats, security standards and protocols, security policies and risk assessment techniques). The experience gained within this review will provide valuable input for future security applications in the healthcare sector, solving existing problems and addressing real user needs. en
heal.journalName Medinfo en
dc.identifier.volume 10 en
dc.identifier.issue Pt 2 en
dc.identifier.spage 1242 en
dc.identifier.epage 1246 en

Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record