Data Protection in Hospital Information Systems: 2. Software Methods and Techniques

  • Karl Sauter
Part of the Computers and Medicine book series (C+M)

Abstract

In line with the development of advanced computer systems, powerful information technologies, namely in the field of data bases and communication, allow for sharing data and programs, for handling complex data structures, and for accessing system functions via remotely located terminals, possibly serving a large number of users simultaneously.36,37

Keywords

Manifold Europe Decen Guaran 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    ANSI/X3/SPARC. Study Group on Data Base Management Systems. Interim Report. Am Natl Stand Inst CBEMA, 1975.Google Scholar
  2. 2.
    Boehm BW, Brown JR, Kaspar H, et al: Characteristics of Software Quality. Amsterdam, North-Holland, 1978.Google Scholar
  3. 3.
    Botting R: Novel security techniques for on-line systems. Commun ACM 29, 1986; 5: 416–417.CrossRefGoogle Scholar
  4. 4.
    Bowen JB: A survey of standards and proposed metrics for software quality testing. IEEE Comput Mag 1979, pp 37–42.Google Scholar
  5. 5.
    Bracchi G, Lockemann PC (eds): Information Systems Methodology. Lecture Notes in Computer Science 65, Berlin, Springer, 1978, pp 1–38, 367-379.Google Scholar
  6. 6.
    Brodie ML: Data Abstraction, Databases and Conceptual Modelling, in 6th Conf on Very Large Data Bases, Montreal, 1980, pp 105–110.Google Scholar
  7. 7.
    Chamberlin DD, Gray JM, Traiger IL: Views, Authorization and Locking in a Relational Data Base System. IBM Research Report, RJ 1486, San José, California, 1974.Google Scholar
  8. 8.
    Champine GA: Distributed Computer Systems-Impact on Management, Design and Analysis. Amsterdam, North-Holland, 1980, pp 16–18.Google Scholar
  9. 9.
    Chen PP: The Entity-Relationship Model. ACM Trans Database Syst 1976; 1: 9–36.CrossRefGoogle Scholar
  10. 10.
    CODASYL Programming Language Committee: Data Base Task Group (DBTG) Report. New York, Assoc Comput Machin 1971.Google Scholar
  11. 11.
    Codd EF: A relational model of data for large shared data banks. Commun ACM 1970; 13: 377–387.CrossRefGoogle Scholar
  12. 12.
    Codd EF: Extending the relational model to capture more meaning. ACM Trans Database Syst 4, 1979; 4: 397–434.CrossRefGoogle Scholar
  13. 13.
    Collen MF (ed): Hospital Computer Systems. New York, John Wiley & Sons, 1974, pp 457–753.Google Scholar
  14. 14.
    Date CJ: An Introduction to Database Systems, ed 2. Reading, Mass, Addison-Wesley, 1977, pp 51–69.Google Scholar
  15. 15.
    Denert E, Hesse W, Neumaier H: S/E/TEC—An Environment for the Production of Reliable Software, in Duijvestijn AJW, Lockemann PC (eds): Trends in Information Processing Systems. Lecture Notes in Computer Science 123. Berlin, Springer, 1981, pp 65–84.Google Scholar
  16. 16.
    Denning DE, Denning PJ: Data Security. Comput Surv 1979; 11: 227–249.CrossRefGoogle Scholar
  17. 17.
    Duijvestijn AJW, Lockemann PC (eds): Trends in Information Processing Systems. Lecture Notes in Computer Science 123. Berlin, Springer, 1981, pp 16–121.Google Scholar
  18. 18.
    Feldmann U, Reichertz PL, Sauter K: On the Selectivity of the Identification Number in the Patient Data Base of the Medical System Hannover. Methods Inf Med 1980; 19: 28–36.PubMedGoogle Scholar
  19. 19.
    Griesser G (ed): Realisation of Data Protection in Health Information Systems. Amsterdam, North-Holland, 1977.Google Scholar
  20. 20.
    Griesser G, Bakker A, Danielsson J, et al (eds): Data Protection in Health Information Systems-Considerations and Guidelines. Amsterdam, North-Holland, 1980, pp 57–129.Google Scholar
  21. 21.
    Haskett JA: Pass-algorithms: A user-validation schema based on knowledge of secret algorithms. Commun ACM 27, 1984; 8: 777–781.CrossRefGoogle Scholar
  22. 22.
    Hoffmann LJ: Modern Methods for Computer Security and Privacy. Englewood Cliffs, NJ, Prentice-Hall, 1977.Google Scholar
  23. 23.
    Hsiao DK, Kerr DS, Madnick SE: Privacy and Security of Data Communication and Data Bases. Proc 4th Int Conf on Very Large Data Bases. 1978, pp 55–67.Google Scholar
  24. 24.
    Jensen RW, Tonies CC: Software Engineering. Englewood Cliffs, NJ, Prentice Hall, 1979.Google Scholar
  25. 25.
    Klonk J, Sauter K: Steps towards a methodology for database design, in Lindberg DAB, Kaihara S (eds): MEDINFO 80. Amsterdam, North-Holland, 1980, pp 470- 474.Google Scholar
  26. 26.
    Lai J, Chi-Sang HD, Covvey KC, et al: The Quality Control of Data in a Clinical Database System-The Patient Identification Problem. Proc Fifth Annual Symposium on Computer Applications in Medical Care. New York, IEEE, 1981, pp 847–851.Google Scholar
  27. 27.
    Leavitt HJ: Applying organizational change in industry: Structural, technological and humanistic approaches, in March JG (ed): Handbook of Organizations. Chicago, Rand McNally, 1965, pp 45–56.Google Scholar
  28. 28.
    Lucas HC Jr, Land FF, Lincoln TJ et al (eds): The Information Systems Environment. Amsterdam, North-Holland, 1980, pp 173–331.Google Scholar
  29. 29.
    Martin J: Security, Accuracy and Privacy in Computer Systems. Englewood Cliffs, NJ, Prentice-Hall, 1973, pp 204–242.Google Scholar
  30. 30.
    Merkle RC: Secure communications over insecure channels. Commun ACM 1978; 21: 294–299.CrossRefGoogle Scholar
  31. 31.
    National Bureau of Standards (US): Data Encryption Standard. FIPS 46. US Government Printing Office, 1970.Google Scholar
  32. 32.
    Reichertz PL: The challenge of medical informatics-Delusions or new perspectives? in O’Moore RR, Barber B, Reichertz DL, et al (eds): Medical Informatics Europe 82, Berlin, Springer, 1982, pp 909–924.Google Scholar
  33. 33.
    Ross DT: Structured Analysis: A language for communicating ideas. IEEE Trans SE 1977; 3: 16–34.Google Scholar
  34. 34.
    Sauter K: Structure and functions of the patient data bank in the medical system Hannover, in Günther A, Levrat B, Lipps H (eds): Int Comput Sympos 1973. Amsterdam, North-Holland, 1974, pp 585–589.Google Scholar
  35. 35.
    Sauter K: Data Protection by Software Techniques with Special Regard to Problems Created by Multi-User Access, in Griesser G (ed): Realisation of Data Protection in Health Information Systems. Amsterdam, North-Holland, 1977, pp 97–105.Google Scholar
  36. 36.
    Sauter K: Data Security in Health Information Systems by Applying Software Techniques. Methods Inf Med 1979; 18: 214–222.PubMedGoogle Scholar
  37. 37.
    Sauter K, Klonk J, Rienhoff O: Integrity problems within a database-supported patient information system, in Barber B, Grémy F, Ueberla K, et al (eds): Proc Med Inf Berlin. Lecture Notes in Medical Informatics 5, Berlin, Springer, 1979, pp 570–579.Google Scholar
  38. 38.
    Sauter K: Distributed health information systems, in van Bemmel JH, Ball MJ, Wigertz O (eds): MEDINFO 83, Amsterdam, North-Holland, 1983, pp 1122–1126.Google Scholar
  39. 39.
    Sauter K: Information Systems Methodology Related to Data Protection, in Griesser G, Jardel JP, Kenny DJ et al (eds): Data Protection in Health Information Systems—Where do we stand? Amsterdam, North-Holland, 1983, pp 91–101.Google Scholar
  40. 40.
    Sauter K, Hedderich J: Methodological aspects of information management with special regard to disease registries and hospital care statistics, in Eimeren W., Engelbrecht R, Flagle CD (eds): Proc Third Int Conf on System Science in Health Care. Berlin, Springer, 1984, pp 743–746.Google Scholar
  41. 41.
    Sauter K, Hedderich J, Appel M: Experiences with large database-supported disease registries with special regard to integrity control, in Salamon R, Blum B, J0rgensen M (eds): MEDINFO 86. Amsterdam, North-Holland, 1986, pp 1133–1135.Google Scholar
  42. 42.
    Schneider H-J (ed): Formal Models and Practical Tools for Information Systems Design. Amsterdam, North-Holland, 1979, pp 1–231.Google Scholar
  43. 43.
    Shannon RH (ed): Hospital Information Systems. Amsterdam, North-Holland, 1979.Google Scholar
  44. 44.
    Tanenbaum AS: Network Protocols. Comput Surv 1981; 13: 453–489.CrossRefGoogle Scholar
  45. 45.
    Teichroew D, Hershey EA: PLS/PSA: A computer-aided technique for structured documentation and analysis of information processing systems. IEEE Trans SE 1977; 3: 41–48.Google Scholar
  46. 46.
    Wagner G, Newcombe HB: Record linkage. Its methodology and application in medical data processing. Methods Inf Med 1970; 9: 121–138.PubMedGoogle Scholar
  47. 47.
    Wasserman AI: USE: A Methodology for the Design and Development of Interactive Information Systems, in Schneider H-J (ed): Formal Models and Practical Tools for Information Systems Design. Amsterdam, North-Holland, 1979, pp 31–50.Google Scholar
  48. 48.
    Zimmermann H : OSI Reference Model: The ISO model architecture for open systems interconnection. IEEE Trans Commun 1980; COM-28, 425–432.CrossRefGoogle Scholar

Copyright information

© Springer-Verlag New York Inc. 1989

Authors and Affiliations

  • Karl Sauter

There are no affiliations available

Personalised recommendations