Skip to main content

Specification and Realization of Protection Problems as Applied to the Erlangen Cancer Registry

  • Conference paper
Datenschutz und Datensicherung im Wandel der Informationstechnologien

Part of the book series: Informatik-Fachberichte ((INFORMATIK,volume 113))

  • 32 Accesses

Abstract

The development of reliable software requires formal models as a basis for the specification process. This paper presents the use of a formal model suitable for the specification of protection problems.

The Erlangen Cancer Registry is a centralized collection of personal data of several participating hospitals. As these data are stored in a data base, a reconstruction of terms is presented first. It is then shown how the protection problem of the Cancer Registry is specified and how the protection mechanisms to solve the problem are realized.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Friedl, A.: “Eine Methode zur Konstruktion zuverlässiger Software-Systeme für den Einsatz im Produktionsbereich”, Dissertation, Universität Erlangen-Nürn-berg, 1984

    Google Scholar 

  2. Gotzhein, R., Handtrack, D., Horbach, L.: “Aufgaben, Aufbau und Funktionen des klinischen Krebsregisters Erlangen”, Verhandlungen der Deutschen Gesellschaft für innere Medizin, pp. 1724-1726, J. F. Bergmann Verlag München, 1984

    Google Scholar 

  3. Harrison, M. A., Ruzzo, W. L., Ulimann, J. D.: “Protection in Operating Systems”, Communications of the ACM, Vol. 19, 8 (1976), pp. 461–471

    Article  MATH  Google Scholar 

  4. Harrison, M. A., Ruzzo, W. L.: “Monotonic Protection Systems”, Foundations of Secure Computation, Academic Press, New York 1978, pp. 337–366

    Google Scholar 

  5. Horbach, L.: “Privacy and Data Protection in Medicine”, Lecture Notes in Computer Science edit. by G. Goos and J. Hartmanis 149 Cryptography, Proceed. Workshop on Cryptography, Burg Feuerstein, Germany, March 29 — April 2, 1982, pp. 228-232, edit. by Th. Beth

    Google Scholar 

  6. Reitenspieß, M.: “Sprachkonstrukte zur Spezifikation und korrekten Implementation von Schutzproblemen”, Arbeitsberichte des IMMD Bd. 16, Nr. 8, Universität Erlangen-Nürnberg, 1984

    Google Scholar 

  7. Wedekind, H.: “Datenbanksysteme I”, Bibliographisches Institut, Zürich 1981

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1985 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gotzhein, R., Horbach, L. (1985). Specification and Realization of Protection Problems as Applied to the Erlangen Cancer Registry. In: Spies, P.P. (eds) Datenschutz und Datensicherung im Wandel der Informationstechnologien. Informatik-Fachberichte, vol 113. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-70865-7_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-70865-7_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-16036-6

  • Online ISBN: 978-3-642-70865-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics