Skip to main content

HealthePeople Security Architecture

  • Chapter
Book cover Person-Centered Health Records

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • CEN ENV 13608. 2000. Health informatics: Security for healthcare communication—Part 1: Concepts and terminology.

    Google Scholar 

  • Damianou N, Dulay N, Lupu E, Sloman M. 2000. Ponder: a language for specifying security and management policies for distributed systems. The language specification, version 2.3. Imperial College Research Report DoC 2000/1. London: Imperial College.

    Google Scholar 

  • Ferraiolo DF, Sandhu R, Gavrila S, Kuhn DR, Chandramouli R. 2001. Proposed NIST standard for role-based access control. ACM Trans Inform Sys Security 4(3):224–274.

    Article  Google Scholar 

  • International Organization for Standardization (ISO). 2004. ISO CD 22857 Health informatics: guidelines on data protection to facilitate trans-border flows of personal health information. Available from: http://www.medis.or.jp/iso/tc215wg4.html. Accessed 2003 January 10.

    Google Scholar 

  • ISO 7498-2. 1989. International Standards Organization: Information processing systems, Open Systems Interconnection, Basic Reference Model—Part 2: Security Architecture. Note: ISO 7498-2 is superseded by ISO/IEC 10745 (ITU-T X.803), ISO/IEC 13594-IT-Lower layers security (ITU-T X.802) and ISO/IEC 10181-1 (ITU-T X.810).

    Google Scholar 

  • Neumann G, Strembeck M. 2002. A scenario-driven role engineering process for functional RBAC roles. Available from: http://wi.wu-wien.ac.at/home/mark/publications/sacmat02.pdf. Accessed 2004 May 12.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer Science+Business Media, Inc.

About this chapter

Cite this chapter

Blobel, B., Davis, J.M. (2005). HealthePeople Security Architecture. In: Demetriades, J.E., Christopherson, G.A., Kolodner, R.M. (eds) Person-Centered Health Records. Health Informatics. Springer, New York, NY. https://doi.org/10.1007/0-387-27375-1_11

Download citation

  • DOI: https://doi.org/10.1007/0-387-27375-1_11

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-0-387-23282-9

  • Online ISBN: 978-0-387-27375-4

  • eBook Packages: MedicineMedicine (R0)

Publish with us

Policies and ethics