Skip to main content

Security and Privacy

  • Chapter
Cancer Informatics

Part of the book series: Health Informatics ((HI))

  • 228 Accesses

Abstract

In an ideal environment, physicians and others involved in cancer research and patient care would have easy access to needed information. Common sense, the Health Information Portability and Accountability Act (HIPAA), and related regulations demand that we defend such information from inappropriate modification and retrieval, thus protecting patient safety, the integrity of study results, and the privacy of patient health records. The challenge is deciding which information to protect, what kinds of protection to establish for each type of information, and who should have access to or permission to modify the data. Only when we establish such policies can we apply technical measures to provide appropriate safeguards.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Blaze M, Feigenbaum J, Ioannidis J, Keromytis A. September 1999. The Key Note Trust Management System Version 2. Internet Engineering Task Force (IETF) RFC 2704. http://www.rfc-editor.org

    Google Scholar 

  • Comité Consulatif International Téléphonique et Télégraphique (CCITT). December 1988. Recommendation X.509: The Directory Authentication Framework. http://www.webopedia.internet.com/Standards/Standards_Organizations

    Google Scholar 

  • Cheswick W, Bellovin S. 1994. Firewalls and Internet Security: Repelling the Wily Hacker. Reading, MA: Addison-Wesley.

    Google Scholar 

  • Dierks T, Allen C. January 1999. The TLS Protocol Version 1.0. Internet Engineering Task Force (IETF) RFC 2246. http://www.rfc-editor.org

    Google Scholar 

  • Diffie W, Hellman ME. 1976. New Directions in Cryptogtaphy. IEEE Transaction on Information Theory 22(6):644–654.

    Article  Google Scholar 

  • Kent S, Atkinson R. November 1998. Security Architecture for the Internet Protocol. Internet Engineering Task Force (IETF) RFC 2401. http://www.rfceditor.org

    Google Scholar 

  • Neuman BC, Ts’o T. 1994. Kerberos: An Authentication Service for Computer Networks. IEEE Communications 32(9):33–38.

    Article  Google Scholar 

  • Proctor PE. 2000. The Practical Intrusion Detection Handbook. Upper Saddle River, NJ: Prentice Hall.

    Google Scholar 

  • Ryutov T, Neuman C. January 2000. Representation and Evaluation of Security Policies for Distributed System Services. In Proceedings of the DARPA Information Survivability Conference and Exposition. Hilton Head, SC.

    Google Scholar 

  • Wahl M, Howes T, Kille S. December 1997. Lightweight Directory Access Protocol (v3). Internet Engineering Task Force (IETF) RFC 2251. http://www.rfceditor.org

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer Science+Business Media New York

About this chapter

Cite this chapter

Neuman, C. (2002). Security and Privacy. In: Silva, J.S., et al. Cancer Informatics. Health Informatics. Springer, New York, NY. https://doi.org/10.1007/978-1-4613-0063-2_7

Download citation

  • DOI: https://doi.org/10.1007/978-1-4613-0063-2_7

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4612-6547-4

  • Online ISBN: 978-1-4613-0063-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics