Considerations on the Effectiveness of Protection by Passwords

  • A. R. Bakker
  • C. P. Louwerse
Conference paper
Part of the Lecture Notes in Medical Informatics book series (LNMED, volume 25)


In health information systems in general a significant part of the stored data is of a confidential nature. An adequate protection is thus of vital importance. In most terminal based information systems the access protection is based on a password that the authorized user has to offer to the system when he tries to access it. In general there is a password for each individual user; two strategies can be distinguished:
  1. A.

    The system generates the passwords periodically.

  2. B.

    The user can choose his own password and ca]i be forced to change it periodically.



Normal User Health Information System Defence Strategy Security Risk Telephone Line 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 1985

Authors and Affiliations

  • A. R. Bakker
    • 1
  • C. P. Louwerse
    • 1
  1. 1.Bazis, Leiden University HospitalLeidenNetherlands

Personalised recommendations