[Next]
[Up] [Previous]
Next:
The Four Building Blocks of Security
Protecting Privacy and Information Integrity of Computerized Medical Information
Kevin S. McCurley
Sandia National Laboratories
The Four Building Blocks of Security
The Ultimate Architecture for Computerized Medical Records
Data has to follow the people using it
The importance of universal networks
Technology Tools for Securing Health Information
Access Control and User Authentication
Passwords
Biometric user authentication
Tokens and Badges for User Authentication
One-time passwords
Network Authentication: Kerberos
The Role of Firewalls
Data authentication
Digital Signatures
Biometric User Authentication vs. Data Authentication
Tokens dumb and smart
Key Management
Key Management Issues for Public Key Cryptography
The Real Importance of Key Escrow
Audit Trails
Digital Notary Timestamp Services
Evaluation and Design of Appropriate Security
What are the risks?
What are the Threats?
What will security cost?
What Barriers Remain?
Some Legal Issues
National Policy on Information Security Technologies
Who is the customer?
Summary
References
About this document ...
Kevin S. McCurley
Sat Mar 11 16:00:15 MST 1995