Abstract
In line with the development of advanced computer systems, powerful information technologies, namely in the field of data bases and communication, allow for sharing data and programs, for handling complex data structures, and for accessing system functions via remotely located terminals, possibly serving a large number of users simultaneously.36,37
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
ANSI/X3/SPARC. Study Group on Data Base Management Systems. Interim Report. Am Natl Stand Inst CBEMA, 1975.
Boehm BW, Brown JR, Kaspar H, et al: Characteristics of Software Quality. Amsterdam, North-Holland, 1978.
Botting R: Novel security techniques for on-line systems. Commun ACM 29, 1986; 5: 416–417.
Bowen JB: A survey of standards and proposed metrics for software quality testing. IEEE Comput Mag 1979, pp 37–42.
Bracchi G, Lockemann PC (eds): Information Systems Methodology. Lecture Notes in Computer Science 65, Berlin, Springer, 1978, pp 1–38, 367-379.
Brodie ML: Data Abstraction, Databases and Conceptual Modelling, in 6th Conf on Very Large Data Bases, Montreal, 1980, pp 105–110.
Chamberlin DD, Gray JM, Traiger IL: Views, Authorization and Locking in a Relational Data Base System. IBM Research Report, RJ 1486, San José, California, 1974.
Champine GA: Distributed Computer Systems-Impact on Management, Design and Analysis. Amsterdam, North-Holland, 1980, pp 16–18.
Chen PP: The Entity-Relationship Model. ACM Trans Database Syst 1976; 1: 9–36.
CODASYL Programming Language Committee: Data Base Task Group (DBTG) Report. New York, Assoc Comput Machin 1971.
Codd EF: A relational model of data for large shared data banks. Commun ACM 1970; 13: 377–387.
Codd EF: Extending the relational model to capture more meaning. ACM Trans Database Syst 4, 1979; 4: 397–434.
Collen MF (ed): Hospital Computer Systems. New York, John Wiley & Sons, 1974, pp 457–753.
Date CJ: An Introduction to Database Systems, ed 2. Reading, Mass, Addison-Wesley, 1977, pp 51–69.
Denert E, Hesse W, Neumaier H: S/E/TEC—An Environment for the Production of Reliable Software, in Duijvestijn AJW, Lockemann PC (eds): Trends in Information Processing Systems. Lecture Notes in Computer Science 123. Berlin, Springer, 1981, pp 65–84.
Denning DE, Denning PJ: Data Security. Comput Surv 1979; 11: 227–249.
Duijvestijn AJW, Lockemann PC (eds): Trends in Information Processing Systems. Lecture Notes in Computer Science 123. Berlin, Springer, 1981, pp 16–121.
Feldmann U, Reichertz PL, Sauter K: On the Selectivity of the Identification Number in the Patient Data Base of the Medical System Hannover. Methods Inf Med 1980; 19: 28–36.
Griesser G (ed): Realisation of Data Protection in Health Information Systems. Amsterdam, North-Holland, 1977.
Griesser G, Bakker A, Danielsson J, et al (eds): Data Protection in Health Information Systems-Considerations and Guidelines. Amsterdam, North-Holland, 1980, pp 57–129.
Haskett JA: Pass-algorithms: A user-validation schema based on knowledge of secret algorithms. Commun ACM 27, 1984; 8: 777–781.
Hoffmann LJ: Modern Methods for Computer Security and Privacy. Englewood Cliffs, NJ, Prentice-Hall, 1977.
Hsiao DK, Kerr DS, Madnick SE: Privacy and Security of Data Communication and Data Bases. Proc 4th Int Conf on Very Large Data Bases. 1978, pp 55–67.
Jensen RW, Tonies CC: Software Engineering. Englewood Cliffs, NJ, Prentice Hall, 1979.
Klonk J, Sauter K: Steps towards a methodology for database design, in Lindberg DAB, Kaihara S (eds): MEDINFO 80. Amsterdam, North-Holland, 1980, pp 470- 474.
Lai J, Chi-Sang HD, Covvey KC, et al: The Quality Control of Data in a Clinical Database System-The Patient Identification Problem. Proc Fifth Annual Symposium on Computer Applications in Medical Care. New York, IEEE, 1981, pp 847–851.
Leavitt HJ: Applying organizational change in industry: Structural, technological and humanistic approaches, in March JG (ed): Handbook of Organizations. Chicago, Rand McNally, 1965, pp 45–56.
Lucas HC Jr, Land FF, Lincoln TJ et al (eds): The Information Systems Environment. Amsterdam, North-Holland, 1980, pp 173–331.
Martin J: Security, Accuracy and Privacy in Computer Systems. Englewood Cliffs, NJ, Prentice-Hall, 1973, pp 204–242.
Merkle RC: Secure communications over insecure channels. Commun ACM 1978; 21: 294–299.
National Bureau of Standards (US): Data Encryption Standard. FIPS 46. US Government Printing Office, 1970.
Reichertz PL: The challenge of medical informatics-Delusions or new perspectives? in O’Moore RR, Barber B, Reichertz DL, et al (eds): Medical Informatics Europe 82, Berlin, Springer, 1982, pp 909–924.
Ross DT: Structured Analysis: A language for communicating ideas. IEEE Trans SE 1977; 3: 16–34.
Sauter K: Structure and functions of the patient data bank in the medical system Hannover, in Günther A, Levrat B, Lipps H (eds): Int Comput Sympos 1973. Amsterdam, North-Holland, 1974, pp 585–589.
Sauter K: Data Protection by Software Techniques with Special Regard to Problems Created by Multi-User Access, in Griesser G (ed): Realisation of Data Protection in Health Information Systems. Amsterdam, North-Holland, 1977, pp 97–105.
Sauter K: Data Security in Health Information Systems by Applying Software Techniques. Methods Inf Med 1979; 18: 214–222.
Sauter K, Klonk J, Rienhoff O: Integrity problems within a database-supported patient information system, in Barber B, Grémy F, Ueberla K, et al (eds): Proc Med Inf Berlin. Lecture Notes in Medical Informatics 5, Berlin, Springer, 1979, pp 570–579.
Sauter K: Distributed health information systems, in van Bemmel JH, Ball MJ, Wigertz O (eds): MEDINFO 83, Amsterdam, North-Holland, 1983, pp 1122–1126.
Sauter K: Information Systems Methodology Related to Data Protection, in Griesser G, Jardel JP, Kenny DJ et al (eds): Data Protection in Health Information Systems—Where do we stand? Amsterdam, North-Holland, 1983, pp 91–101.
Sauter K, Hedderich J: Methodological aspects of information management with special regard to disease registries and hospital care statistics, in Eimeren W., Engelbrecht R, Flagle CD (eds): Proc Third Int Conf on System Science in Health Care. Berlin, Springer, 1984, pp 743–746.
Sauter K, Hedderich J, Appel M: Experiences with large database-supported disease registries with special regard to integrity control, in Salamon R, Blum B, J0rgensen M (eds): MEDINFO 86. Amsterdam, North-Holland, 1986, pp 1133–1135.
Schneider H-J (ed): Formal Models and Practical Tools for Information Systems Design. Amsterdam, North-Holland, 1979, pp 1–231.
Shannon RH (ed): Hospital Information Systems. Amsterdam, North-Holland, 1979.
Tanenbaum AS: Network Protocols. Comput Surv 1981; 13: 453–489.
Teichroew D, Hershey EA: PLS/PSA: A computer-aided technique for structured documentation and analysis of information processing systems. IEEE Trans SE 1977; 3: 41–48.
Wagner G, Newcombe HB: Record linkage. Its methodology and application in medical data processing. Methods Inf Med 1970; 9: 121–138.
Wasserman AI: USE: A Methodology for the Design and Development of Interactive Information Systems, in Schneider H-J (ed): Formal Models and Practical Tools for Information Systems Design. Amsterdam, North-Holland, 1979, pp 31–50.
Zimmermann H : OSI Reference Model: The ISO model architecture for open systems interconnection. IEEE Trans Commun 1980; COM-28, 425–432.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1989 Springer-Verlag New York Inc.
About this chapter
Cite this chapter
Sauter, K. (1989). Data Protection in Hospital Information Systems: 2. Software Methods and Techniques. In: Orthner, H.F., Blum, B.I. (eds) Implementing Health Care Information Systems. Computers and Medicine. Springer, New York, NY. https://doi.org/10.1007/978-1-4612-3488-3_16
Download citation
DOI: https://doi.org/10.1007/978-1-4612-3488-3_16
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4612-8122-1
Online ISBN: 978-1-4612-3488-3
eBook Packages: Springer Book Archive