1. Health care management and information systems security: awareness, training or education;Katsikas;Int. J. Med. Informatics,2000
2. Department of Health and Human Services (USA), The HCFA Internet Communications Security and Appropriate Use Policy and Guidelines, Health Care Financing Administration, Office of Information Services, Security and Standards Group, February 1999, http://www.hcfa.gov/security/isecplcy.htm.
3. ITU-T Recommendation X.509. Information Technology: Open Systems Interconnection—The Directory: Public Key and Attribute Certificate Frameworks, 2000, ISO/IEC 9594-8:2001.
4. I. Mavridis, C.K. Georgiadis, G. Pangalos, M. Khair, Using Digital Certificates for Access Control in Clinical Intranet Applications, book edition of J. Technol. Health Care, vol. 8, Nos. 3, 4 (2000), ISSN 0928-7329, IOS Press, pp. 173–174.
5. R.K. Thomas, Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments, in: Proceedings of the Second ACM Workshop on Role-Based Access Control (RBAC 97), Fairfax, VA, USA, 6–7 November, 1997, pp. 13–19.