Abstract
The medical device vigilance system (MDVS) is a Europe-wide system concerned with the exchange of information, generated from the process of investigating a medical device incident, among various authorized parties. Due to the sensitivity of the exchanged information, security is of primary importance. In order to address the security requirements of the MDVS, a communication protocol is proposed that is provably secure and practical for implementation. In addition, a scenario for the operation of the MDVS network based on this protocol is presented.
Keywords
Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Blundo, С., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U. and Yung, M. (1993) Perfectly-secure key distribution for dynamic conferences. Advances in Cryptology-Crypto’ 92, Lecture Notes in Computer Science #740, (ed. E. Brickell), Springer-Verlag, 471–487.
Burmester, M. and Desmedt, Y. (1995) A Secure and Efficient Conference Key Distribution System. Advances in Cryptology-Eurocrypt’ 94, (ed. A. De Santis), Springer-Verlag, 275–286.
Chrissikopoulos, V. and Peppes, D. (1995) A Practical Conference Key Distribution System. Information Security–the Next Decade, Proceedings of IF1P/SEC’95, The 11th Inter. Information Security Conf., (eds. J. Eloff and S. Solms), 168–175.
Commission of the European Communities (1993) Guidelines on a Medical Devices Vigilance System., Directorate-General, Industry, Brussels.
Council Directive 90/385/EEC. (1990) Official Journal of the European Communities L 189.
Council Directive 93/42/EEC. (1993) Official Journal of the European Communities L 169, 36.
Diffie, W. and Heilman, M. (1976) New directions in cryptography. IEEE Trans. Inform. Theory, IT-22, 644–654.
EEC/DGXII, (1991) Data Protection and Confidentiality in health informatics, IOS press.
EUROMEDIES (EUROpean MEdical Device Information Exchange System) (1995) concerted action. Project number A2122. AIM Programme Intermediate report.
Fischer, M. and Wright, R. (1992) Multiparty secret key exchange using a random deal of cards. Advances in Cryptology-Crypto’ 91, Lecture Notes in Computer Science #576, (ed. J. Feigenbaum), Springer-Verlag, 141–155.
Ingemarsson, I., Tang, D. and Wong, C. (1982) A conference key distribution system. IEEE Trans. Inform. Theory, 28, 714–720.
ISO/IEC 7492–2 (1989) Information Technology - Open Systems Interconnection - Basic Reference Model - Part 2: Security Architecture.
Janson, P. and Molva, R. (1991) Security in open networks and distributed systems, Computer Networks and ISND Systems, 22, 323–346.
Koyama, K. and Ohta, K. (1988) Identity-based conference key distribution systems. Advances in Cryptology-Crypto’ 87, Lecture Notes in Computer Science #293, (ed. C. Pomerance), Springer-Verlag, 175–185.
Matsumoto, T., Takashima, Y. and Imai, H. (1986) On Seeking Smart Public Key Distribution Systems. The Transactions, of the IECE of Japan, E69 (2), 99–106.
Okamoto, E. and Tanaka, K. (1989) Key distribution system based on identification information. IEEE J. Selected Areas Commun., SAC-7, 481–485.
Olnes, J. (1993) EDIFACT security made simple-the EDIMED approach, Computers & Security, 12, 765–774.
Pfitzmann, A. and Pfitzmann, B. (1991) Security in Medical Networks. Data protection and Confidentiality in health informatics, IOS press, 231–248.
Pramataris, K., Giaglis, G., Papamichail, G., Doukidis, G. and Pallikarakis, N. (1995) The Potential of EDI in Health: The EUROMEDIES case, Proceedings of Health Telematics 95 [To appear].
Tsujii, S. and Itoh, T. (1989) An ID-based cryptosystem based on the discrete logarithm. IEEE J. Selected Areas Commun., SAC-8, 467–473.
U.S. Department of Commerce (1977), National Bureau of Standards, Data Encryption Standard, FIPS Publication 46.
Williamson, J. and Draper, J. (1991) EDI Security–Today and Tomorrow. Information Security, (eds. D. Lindsay and W. Price), IFIP, 361–374.
Yacobi, Y. (1991) A key Distribution Paradox. Advances in Cryptology-Crypto’ 90, Lecture Notes in Computer Science #537, (eds. A.J. Menezes and S.A. Vanstone), Springer- Verlag, 268–273.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1996 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Vassilacopoulos, G., Chrissikopoulos, V., Peppes, D. (1996). Security Enforcement in a European Medical Device Vigilance System Network. In: Katsikas, S.K., Gritzalis, D. (eds) Information Systems Security. SEC 1996. IFIP Advances in Information and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-1-5041-2919-0_32
Download citation
DOI: https://doi.org/10.1007/978-1-5041-2919-0_32
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-5041-2921-3
Online ISBN: 978-1-5041-2919-0
eBook Packages: Springer Book Archive