Abstract
In an ideal environment, physicians and others involved in cancer research and patient care would have easy access to needed information. Common sense, the Health Information Portability and Accountability Act (HIPAA), and related regulations demand that we defend such information from inappropriate modification and retrieval, thus protecting patient safety, the integrity of study results, and the privacy of patient health records. The challenge is deciding which information to protect, what kinds of protection to establish for each type of information, and who should have access to or permission to modify the data. Only when we establish such policies can we apply technical measures to provide appropriate safeguards.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Blaze M, Feigenbaum J, Ioannidis J, Keromytis A. September 1999. The Key Note Trust Management System Version 2. Internet Engineering Task Force (IETF) RFC 2704. http://www.rfc-editor.org
Comité Consulatif International Téléphonique et Télégraphique (CCITT). December 1988. Recommendation X.509: The Directory Authentication Framework. http://www.webopedia.internet.com/Standards/Standards_Organizations
Cheswick W, Bellovin S. 1994. Firewalls and Internet Security: Repelling the Wily Hacker. Reading, MA: Addison-Wesley.
Dierks T, Allen C. January 1999. The TLS Protocol Version 1.0. Internet Engineering Task Force (IETF) RFC 2246. http://www.rfc-editor.org
Diffie W, Hellman ME. 1976. New Directions in Cryptogtaphy. IEEE Transaction on Information Theory 22(6):644–654.
Kent S, Atkinson R. November 1998. Security Architecture for the Internet Protocol. Internet Engineering Task Force (IETF) RFC 2401. http://www.rfceditor.org
Neuman BC, Ts’o T. 1994. Kerberos: An Authentication Service for Computer Networks. IEEE Communications 32(9):33–38.
Proctor PE. 2000. The Practical Intrusion Detection Handbook. Upper Saddle River, NJ: Prentice Hall.
Ryutov T, Neuman C. January 2000. Representation and Evaluation of Security Policies for Distributed System Services. In Proceedings of the DARPA Information Survivability Conference and Exposition. Hilton Head, SC.
Wahl M, Howes T, Kille S. December 1997. Lightweight Directory Access Protocol (v3). Internet Engineering Task Force (IETF) RFC 2251. http://www.rfceditor.org
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer Science+Business Media New York
About this chapter
Cite this chapter
Neuman, C. (2002). Security and Privacy. In: Silva, J.S., et al. Cancer Informatics. Health Informatics. Springer, New York, NY. https://doi.org/10.1007/978-1-4613-0063-2_7
Download citation
DOI: https://doi.org/10.1007/978-1-4613-0063-2_7
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4612-6547-4
Online ISBN: 978-1-4613-0063-2
eBook Packages: Springer Book Archive