ГОСТ ISO/TS 22600-3—2013
Библиография
[1]HITSP Access Control Transaction Package V. 1.1.1 (September 27. 2007)
(2)BLOBEL B.. NORDBERG R., DAVIS J.M.. PHAROW P. Modelling privilege management and access
controlJ/International Journal of Medical Informatics? 75. 8 (2006). pp. 597—623
(3JISO/TS 13606:2009. Health Informatics — Electronic health record communication — Part 4: Security
(4)BLOBEL B. Assessment of Middleware Concepts Using a Generic Component Model.Z/Proceedings of the
Conference «Toward an Electronic Health Record Europe ‘97». pp. 221—228. October 20—23.1997. London
(5)ARLOW J.. NEUSTADT I. UML2 and the Unified Process. 2nd Edition. Upper Saddle River: Addison-Wesley:
2005
(6)BLOBEL B.. ROGER-FRANCE F. A Systematic Approach for Analysis and Design of Secure Health Information
Systems./ZInternatlonal Journal of Medical Informatics. 62 (3) (2001) pp. 51—78
(7)BLOBEL B. Analysts, Design and Implementation of Secure and Interoperable Distributed Health Information
Systems./Senes «Studies In Health Technology and Informatics» Vol. 89. IOS Press. Amsterdam 2002
(8)BLOBEL B. Concept representation in health informatics for enabling intelligent architectures. In: HASMAN, A..
HAUX. R.. VAN DER LEI, J.. DE CLERCQ, E.. ROGER-FRANCE. F. (Edrs.): Ubiquity: Technologies for better
health in aging societies, pp 285-291. Senes «Studies in Health Technology and Informatics». Vol. 124. IOS
Press. Amsterdam 2006
(9)BEALE T. Health Information Standards Manifesto. Rev. 2.0. Mooloolah: Deep Thought Informatics Pty Ltd.; 2001
(10) BODENREIDER O. The Unified Medical Language System. Tutorial Handouts. Geneva: MIE 2005
(11) Object Management Group:
http://VAVw.omg.org
[12| OASIS:
http://www.oasls-open.org
(13) CHADWICK D.W. et al. Role-Based Access Control with X.S09 Attribute Certificates. IEEE Internet Computing.
2003, pp. 62—69
(14) FERRAIOLO D.F.. SANDHU R.. GAVRILA S.. KUHN D.R.. CHANDRAMOULI R. Proposed NIST Standard for
Role-Based Access Control./ACM Transactions on Information and System Security. Vol. 4 No. 3. August 2001. pp.
224—274 France
(15) Health Level 7. Inc.: Role-Based Access Control (RBAC). 2007.
http://www.hl7.org
(16) KIRSCHNER B.A.. HACKER T.J.. ADAMSON W.A.. ATHEY B.D. Walden: A Scalable Solution for Grid Account
Management./Sth IEEE/ACM International Workshop on Grid Computing (GRID 04). 2004. pp. 102—109
(17) STOWE G. A Secure Network Node Approach to the Policy Decision Point in Distributed Access Control. Thesis.
Tech Report TR2004-502. Dartmouth College Department of Computer Science. 2004
(18) National Research Council. Computers at Risk: Safe Computing in the Information Age. National Academy Press.
1991. Washington. DC
(19) BOWEN P., HASH J.. WILSON M. Information Security Handbook. A Guide for Managers. NIST Special
Publication 800-100. NIST Computer Security Division. Gaithersburg. October 2006
(20) KENT K.. SOUPPAYA M. Guide to Computer Security Log Management. NIST Special Publication 800-92. NIST
Computer Security Division. Gaithersburg. September 2006
(21) Integrating the Healthcare Enterprise. Inc.: IHE IT Infrastructure Technical Framework. Vol. 1(ITITF-1) Integration
Profiles. Rev. 3.0. ACC/HIMSS/RSNA. 2006. p. 55
(22) DICOM: Digital Imaging and Communications in Medicine (DICOM) Supplement 95. Audit Trail Messages, Trial
Standard. 2004
(23) WELCH V. et al. X.509 Proxy Certificates for Dynamic Delegation. 3rd Annual PKI R&D Workshop. 2004
(24) FISCHER A. Electronic Document Authorization. Proceedings of the 13th National Computer Security Confe
rence. 1990
(25) ISO/1EC 2382-8:1998. Information technology — Vocabulary — Part 8: Security
(26) ISO 7498-2:1989. Information processing systems— Open Systems Interconnection — Basic Reference
Model — Part 2: Security Architecture
(27) ISO/IEC 9796 (all parts). Information technology — Security techniques — Digital signature schemes giving
message recovery
(28) ISO/IEC 9797 (all parts). Information technology — Security techniques— Message Authentication Codes
(MACs)
(29) ISO/IEC 9798 (all parts). Information lechnology — Security techniques — Entity authentication
(30) ISO/IEC 10181-1:1996. Information technology — Open Systems Interconnection — Security frameworks for
open systems: Overview
(31) ISO/IEC 10745. Information technology — Open Systems Interconnection — Upper layers security model
(32) ISO/IEC 10746 (all parts). Information technology — Open Distributed Processing — Reference Model
(33) ISO/IEC TR 13594. Information technology — Lower layers security
(34) ISO/IEC 11770-1:1996. Information technology — Security techniques — Key management — Part 1: Frame
work
(35) ISO 17090 (all parts). Health informatics — Public key Infrastructure
(36) ISO/TS 21091. Health Informatics — Directory services for secunty, communications and identification of profes
sionals and patients
55