Security enforcement in a European medical device vigilance system network (English)
- New search for: Vassilacopoulos, G.
- New search for: Chrissikopoulos, V.
- New search for: Peppes, D.
- New search for: Vassilacopoulos, G.
- New search for: Chrissikopoulos, V.
- New search for: Peppes, D.
In:
Facing the Information Society of the 21st Century, IFIP SEC, IFIP SEC, Information Systems Security, 1996
;
377-386
;
1996
-
ISBN:
- Conference paper / Print
-
Title:Security enforcement in a European medical device vigilance system network
-
Additional title:Sicherheitaspekte in einem medizinischen Kommunikationsnetz
-
Contributors:
-
Published in:
-
Publisher:
- New search for: Chapman & Hall
-
Place of publication:London
-
Publication date:1996
-
Size:10 Seiten, 3 Bilder, 1 Tabelle, 23 Quellen
-
ISBN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
A practical solution to the complex human issues of information security designHitchings, J. / International Federation for Information Processing et al. | 1996
- 13
-
The use of business process models for security design in organisationsHolbein, R. / Teufel, S. / Bauknecht, K. / International Federation for Information Processing et al. | 1996
- 23
-
An analyst's view of IS SecurityKiountouzis, E. A. / Kokolakis, S. A. / International Federation for Information Processing et al. | 1996
- 39
-
Location management strategies increasing privacy in mobile communicationKesdogan, D. / Federrath, H. / Jerichow, A. / Pfitzmann, A. / International Federation for Information Processing et al. | 1996
- 49
-
ID-based authentication for mobile conference callWang, S.-J. / Chin, L.-P. / Chang, J.-F. / Tsai, Y.-R. / International Federation for Information Processing et al. | 1996
- 61
-
New security paradigms: orthodoxy and heresyHosmer, H. H. / International Federation for Information Processing et al. | 1996
- 74
-
Security assurance in information systemsWilsher, R. G. / Kurth, H. / International Federation for Information Processing et al. | 1996
- 88
-
A framework for dealing with and specifying security requirements in information systemsDubois, E. / Wu, S. / International Federation for Information Processing et al. | 1996
- 100
-
The effects of time on integrity in information systemsList, W. / International Federation for Information Processing et al. | 1996
- 111
-
EPHOS security: procurement of secure open systemsPope, N. H. / Ross, J. G. / International Federation for Information Processing et al. | 1996
- 142
-
Delivery and installation of software: disputes and the burden of proofGolvers, L. / International Federation for Information Processing et al. | 1996
- 153
-
Information security on the electronic superhighwayVon Solms, S. H. / International Federation for Information Processing et al. | 1996
- 167
-
A taxonomy for analyzing hazards to information systemsBaskerville, R. / International Federation for Information Processing et al. | 1996
- 177
-
Models and tools for quantitative assessment of operational securityDacier, M. / Deswarte, Y. / Kaaniche, M. / International Federation for Information Processing et al. | 1996
- 187
-
Activating dynamic counter measures to reduce riskLabuschagne, L. / Eloff, J. H. P. / International Federation for Information Processing et al. | 1996
- 199
-
Distributed registration and key distribution (DiRK)Oppliger, R. / Albanese, A. / International Federation for Information Processing et al. | 1996
- 209
-
On the reconstruction of shared secretsHe, J. / Dawson, E. / International Federation for Information Processing et al. | 1996
- 219
-
A hierarchical threshold scheme with unique partial keysHassler, H. / Hassler, V. / Posch, R. / International Federation for Information Processing et al. | 1996
- 227
-
Efficient and probably secure key agreementAlexandris, N. / Burmester, M. / Chrissikopoulos, V. / Peppes, D. et al. | 1996
- 227
-
Efficient and provably secure key agreementAlexandris, N. / Burmester, M. / Chrissikopoulos, V. / Peppes, D. / International Federation for Information Processing et al. | 1996
- 237
-
Internetwork access control using public key certificatesPark, H. / Chow, R. / International Federation for Information Processing et al. | 1996
- 249
-
The security architecture of IRO-DBEssmayr, W. / Kastner, F. / Pernul, G. / Tjoa, A. M. / International Federation for Information Processing et al. | 1996
- 259
-
Securely executing multilevel transactionsJadodia, S. / Smith, K. P. / Blaustein, B. T. / Notargiacomo, L. / International Federation for Information Processing et al. | 1996
- 271
-
A decentralized temporal authorization modelBertino, E. / Bettini, C. / Ferrari, E. / Samarati, P. / International Federation for Information Processing et al. | 1996
- 283
-
Applications of keystroke analysis for improved login security and continuous user authenticationFurnell, S. M. / Morrissey, J. P. / Sanders, P. W. / Stockel, C. T. / International Federation for Information Processing et al. | 1996
- 295
-
MoFAC: a model for fine-grained access controlVon Solms, J. S. / Olivier, M. S. / Von Solms, S. H. / International Federation for Information Processing et al. | 1996
- 306
-
A discretionary security model for object oriented environmentsVan Rensburg, W. J. / Olivier, M. S. / International Federation for Information Processing et al. | 1996
- 319
-
Intention modelling: approximating computer user intentions for detection and prediction of intrusionsSpyrou, T. / Darzentas, J. / International Federation for Information Processing et al. | 1996
- 337
-
An attack detection system for secure computer systems - design of the ADSKantzavelou, I. / Patel, A. / International Federation for Information Processing et al. | 1996
- 351
-
IT security and privacy educationYngstroem, L. / International Federation for Information Processing et al. | 1996
- 365
-
A human approach to security management in health careJames, H. / Andronis, K. / Paul, W. / International Federation for Information Processing et al. | 1996
- 377
-
Security enforcement in a European medical device vigilance system networkVassilacopoulos, G. / Chrissikopoulos, V. / Peppes, D. / International Federation for Information Processing et al. | 1996
- 387
-
Design of secure medical database systemsPangalos, G. / Khair, M. / International Federation for Information Processing et al. | 1996
- 405
-
Evaluation of the security of distributed IT systems through ITSEC/ITSEM: experiences and findingsUttridge, I. / Bazzana, G. / Giunchi, M. / Deler, G. / International Federation for Information Processing et al. | 1996
- 417
-
SNMP-based network security management using a temporal database approachApostolopoulos, T. K. / Daskalou, V. C. / International Federation for Information Processing et al. | 1996
- 428
-
Security profile for interconnected open distributed systems with varying vulnerabilityNikitakos, N. / Gritzalis, S. / Georgiadis, P. / International Federation for Information Processing et al. | 1996
- 438
-
A model for the detection of the message stream delay attackO'Connell, S. / Patel, A. / International Federation for Information Processing et al. | 1996
- 452
-
Security model for distributed object framework and its applicability to CORBAVaradharajan, V. / Hardjono, T. / International Federation for Information Processing et al. | 1996
- 467
-
Software quality assurance: the underlying framework for achieving secure and reliable software systemsFrangos, S. A. / International Federation for Information Processing et al. | 1996
- 477
-
Configuration management - a basis of the high assurance software engineering processGast, T. / Keus, K. / International Federation for Information Processing et al. | 1996
- 480
-
Multi-purpose security module based on smart cardsDelacour, E. / International Federation for Information Processing et al. | 1996
- 482
-
An authentication service supporting domain-based access control policiesYialelis, N. / Sloman, M. / International Federation for Information Processing et al. | 1996
- 485
-
On security modelsEckert, C. / International Federation for Information Processing et al. | 1996
- 487
-
Risks on the way to the global information societyFischer-Huebner, S. / Schier, K. / International Federation for Information Processing et al. | 1996
- 489
-
Crypto Manager: an object oriented software library for cryptographic mechanismsBaldin, T. / Bleumer, G. / International Federation for Information Processing et al. | 1996
- 489
-
CryptoManager++Baldin, T. / Bleumer, G. et al. | 1996
- 492
-
Cryptographic key distribution and authentication protocols for secure group communicationHutchison, A. C. M. / Bauknecht, K. / International Federation for Information Processing et al. | 1996
- 494
-
A new hybrid encryption scheme for computer networksEl-Hadidi, M. T. / Hegazi, N. H. / Aslan, H. K. / International Federation for Information Processing et al. | 1996
- 496
-
From zero-knowledge to a practical authentication protocolMatyas, V. / International Federation for Information Processing et al. | 1996
-
Canada's computer crime laws: ten years of experienceKratz, M. P. J. / International Federation for Information Processing et al. | 1996