Next: About this document
Up: No Title
Previous: Conclusion
References
- 1
-
``Transaction Security System'', DG Abraham, GM Dolan, GP Double, JV Stevens,
in IBM Systems Journal v 30 no 2 (1991) pp 206-229
- 2
-
`Fast Software Encryption -- Fist International Workshop', R Anderson
(editor), Springer Lecture Notes in Computer Science no 809
- 3
-
``Why Cryptosystems Fail'', RJ Anderson, in Communications of the ACM vol
37 no 11 (November 1994) pp 32-40
- 4
-
``On Fibonacci Keystream Generators'', R Anderson, in `Fast Software
Encryption -- Second International Workshop', B Preneel (editor), Springer
Lecture Notes in Computer Science no 1008 pp 346-352
- 5
-
``Robustness principles for public key protocols'', RJ Anderson, RM Needham, in
Advances in Cryptology -- Crypto 95 Springer LNCS vol 963 pp 236-247
- 6
-
``NHS Network Security'', RJ Anderson, 30 May 1995
- 7
-
``NHS wide networking and patient confidentiality'', RJ Anderson, in
British Medical Journal v 310 no 6996 (1 July 1996) pp 5-6
- 8
-
`Security in Clinical Information Systems', RJ Anderson, published by the
British Medical Association, January 1996
- 9
-
``Clinical system security: interim guidelines'', RJ Anderson, in British
Medical Journal v 312 no 7023 (13 Jan 1996) pp 109-111
- 10
-
``Patient Confidentiality -- At Risk from NHS Wide Networking'', RJ Anderson,
in Proceedings of Healthcare 96
- 11
-
``A Security Policy Model for Clinical Information Systems'', in
Proceedings of the 1996 IEEE Symposium on Security and Privacy pp 30-43
- 12
-
``The Zergo Report -- Initial Comments'', RJ Anderson (May 1996)
- 13
-
``On the Reliability of Electronic Payment Systems'', RJ Anderson, SJ
Bezuidenhoudt, in IEEE Transactions on Software Engineering v 22 no 5
(May 1996) pp 294-301
- 14
-
``The GCHQ Protocol and its Problems'', RJ Anderson, MR Roe, to appear at
Eurocrypt 97; available from www.cl.cam.ac.uk/users/rja14
- 15
-
Discussion between B Beeby, R Anderson, G Kelly and J Williams, 20th November
1996
- 16
-
``A Fast New DES Implementation in Software'', E Biham, in Preproceedings
of the Fourth Fast Software Encryption Workshop (Technion, Haifa, 20-22
January 1997) pp 241-252
- 17
-
`Secure Computer Systems: Mathematical Foundations', DE Bell, LJ
LaPadula, Mitre Corporation report ESD-TR-73-278
- 18
-
`Cipher Systems', H Beker, F Piper, Northwood 1982
- 19
-
``Directed Acyclic Graphs, One-way Functions and Digital Signatures'', D
Bleichenbacher, UM Maurer, Advances in Cryptology -- Crypto 94
(Springer LNCS v 839) pp 75-82
- 20
-
`Draft guidance for the NHS on the confidentiality, use and disclosure of
personal health information', N Boyd, Department of Health, 10 August 1994
- 21
-
`Chipkarten im Gesundheitswesen', Bundesamt für Sicherheit in der
Informationstechnik, Bundesanzeiger 4 May 1995
- 22
-
``Optimizing a Fast Stream Cipher for VLIW, SIMD and Superscalar Processors'',
CSK Clapp, in Preproceedings of the Fourth Fast Software Encryption
Workshop (Technion, Haifa, 20-22 January 1997) pp 254-268
- 23
-
``Confidentiality of medical records: the patient's perspective'', D Carman,
N Britten, British Journal of General Practice v 45 (September 95) pp 485-488
- 24
-
`Securing Electronic Mail within HMG', CESG document T/3113TL/2776/11,
21st March 1996
- 25
-
``A Comparison of Commercial and Military Computer Security Policies'', D
Clark, D Wilson, in Proceedings of the 1987 IEEE Symposium on Security and
Privacy pp 184-194
- 26
-
``United States pushes key escrow, security in OECD'', in Computer Fraud
and Security Bulletin (Mar 96) pp 7-9
- 27
-
`Cryptography's Role in Securing the Information Society', K Dam, H Lin,
National Academy Press, Washington, D.C. 1996
- 28
-
`How to Keep a Clinical Confidence', B Darley, A Griew, K McLoughlin, J
Williams, HMSO 1994
- 29
-
`Keeping it Confidential -- Protecting business information', Department
of Trade and Industry, 1996
- 30
-
``New Directions in cryptography'', W Diffie, ME Hellman, in IEEE
Transactions on Information Theory v IT-22 no 6 (Nov 76) pp 644-654
- 31
-
``Exhaustive Cryptanalysis of the NBS Data Encryption Standard'', W Diffie, ME
Hellman, in Computer v 10 no 6 (June 77) pp 74-84
- 32
-
`Product Block Cipher for Data Security', WF Ehrsam, CHW Meyer, RL
Powers, JL Smith, WL Tuchman, US Patent 3,962,539 (8th June 1976)
- 33
-
``HMG's Unified Incident Reporting and Alert Scheme'', P Fleury, talk given at
`Information Security -- is IT Safe?', IEE, 27th June 1996
- 34
-
``The law and its impact on the way data security issues are addressed'', E
France, at Information Security -- is IT Safe?'', IEE, London, 27 June
1996
- 35
-
``Future frameworks for data and privacy protection'', E France, at
Liberty on the Line: Opportunities and Dangers of the Superhighway, 14th
November 1996
- 36
-
``Encryption Trials -- Aims, Objectives & Issues'', D Garwood, 1996
- 37
-
`Good Medical Practice', General Medical Council
- 38
-
`Confidentiality', General Medical Council
- 39
-
`A Strategy for Security of the Electronic Patient Record', A Griew, R
Currell, IHI, University of Wales, Aberystwyth, 14/3/95
- 40
-
P Gutman, personal communication, July 96
- 41
-
A Hassey, Talk at Personal Information workshop, Cambridge, June 96
- 42
-
N Hickson, Department of Trade and Industry, speaking at `Information
Security -- Is IT Safe?', IEE, Savoy Place, London, 27th June 1996
- 43
-
`Information Technology Security Evaluation Criteria', EU document
COM(90) 314 (6/91)
- 44
-
``GMSC and RCGP guidelines for the extraction and use of data from general
practitioner computer systems by organisations external to the practice'',
Appendix III in `Committee on Standards of Data Extraction from General
Practice Guidelines' Joint Computer Group of the GMSC and the RCGP, 1988
- 45
-
``A Proposed Architecture for Trusted Third Party Services'', N Jefferies, C
Mitchell, M Walker, in proceedings of Cryptography Policy and Algorithms
Conference, 3-5 July 1995, pp 67-81; published by Queensland University of
Technology
- 46
-
``A Proposed Architecture for Trusted Third Party Services'', N Jefferies, C
Mitchell, M Walker, in Cryptography: Policy and Algorithms, Springer LNCS
v 1029 pp 98-104; also appeared at the Public Key Infrastructure Invitational
Workshop at MITRE, Virginia, USA, in September 1995 and PKS '96 in Zürich on
1st October 1996
- 47
-
``Information and the NHS (for me or for them?), S Jenkins, in Personal
Information -- Security, Engineering and Ethics (21-22 June 1996),
preproceedings published by the Isaac Newton Institute, Cambridge, pp 1-21
- 48
-
`The Codebreakers', D Kahn, Macmillam 1967
- 49
-
`La Cryptographie Militaire', A Kerkhoffs, in Journal des Sciences
Militaires, 9th series, IX (Jan 1883) pp 5-38; (Feb 1883) pp 161-191
- 50
-
``Constructing digital signatures from a one-way function'', L Lamport,
SRI TR CSL 98 (1979)
- 51
-
Talk given by J Leach at meeting organised by `Scientists for Labour', 14th
November 1996
- 52
-
B Molteno, comments at BMA House, 13th June 1996
- 53
-
`Information Systems Security: Top level policy for the NHS`, IMG
document 2009 (b)
- 54
-
`NWN Threats and Vulnerabilities', 5 April 1995, IMG document NWNS/T1.22
- 55
-
`NHS-wide networking: data security policy', IMG document NWNS/T3.3
- 56
-
`NHS wide networking security architecture`, 3 April 1995, IMG document
NWNS/T1.21
- 57
-
Security Guide for IM&T Specialists', 3 April 1995, IMG document
NWNS/T5.11
- 58
-
`NHS/CCTA Internet Security Report' version 1.3
- 59
-
`NHS IS Reference Manual', December 1995
- 60
-
Press release, NHS Executive, 17th October 1996
- 61
-
NHS Wide Clearing System, Encryption Pilot Project, Project Board Minutes for
18/11/96
- 62
-
NHS Wide Clearing System, Encryption Pilot Project, Project Board Minutes for
29/1/97
- 63
-
``Announcing Development of a Federal Information Processing Standard for
Advanced Encryption Standard'', National Institute of Standards and Technology,
in Federal Register v 62 no 1 (Jan 2 1997) pp 93-94
- 64
-
``Managing Health Data Privacy and Security: a case study from New Zealand'', R
Neame, in Personal Information -- Security, Engineering and Ethics
(21-22 June 1996), preproceedings published by the Isaac Newton Institute,
Cambridge, pp 207-215
- 65
-
``Encryption and the Global Information Infrastructure: An Australian
Perspective'', S Orlowski, in proceedings of Cryptography Policy and
Algorithms Conference, op. cit., pp 31-39
- 66
-
``Euro-Clipper chip scheme proposed'', D Peachey, in Communications Week
no 151 (18 September 1995) pp 1, 81
- 67
-
``Providing Secure, Recoverable Email'', P Peterson, in Network Security
(Aug 96) pp 15-19
- 68
-
``GP Practice computer security survey'', RA Pitchford, S Kay, in Journal
of Informatics in Primary Care (September 95) pp 6-12
- 69
-
``Move to Strengthen Information Security'', Press Association, 06/10 1808
- 70
-
``UK to license information encryption services'', Reuter RTf 06/10 1355,
London, June 10th
- 71
-
``Institutionell-organisatorische Gestaltung informationstechnischer
Sicherungsinfrostrukturen'', A Roßnagel, in Datenschutz und
Datensicherheit (5/95) pp 259-269
- 72
-
``For Sale: your secret medical records for £150'', L Rogers, D Leppard,
Sunday Times 26/11/95 pp 1-2
- 73
-
R Rogers, in discussion at BMA house, 2nd May 1996
- 74
-
``Keynote Address'', AW Saunders, in Information Security -- is IT
Safe?, IEE, London, 27 June 1996
- 75
-
``CESG Recommendations for Secure Electronic Mail -- A Statement by Andrew
Saunders, Director CESG'', available at
http://www.cesg.gov.uk/cesghtml/news/25_2_97.htm
- 76
-
``The Blowfish Encryption Algorithm'', B Schneier, Dr. Dobbs Journal v 20
no 4 (Apr 94) pp 38 - 40
- 77
-
`Applied Cryptography', B Schneier, second edition, Wiley 1995
- 78
-
``The History of Subliminal Channels'', GJ Simmons, in Information
Hiding (proceedings of first international workshop), Springer Lecture Notes
in Computer Science v 1174 pp 237-256
- 79
-
``Proposal for a Council Decision -- in the field of security of information
systems, concerning the establishment of a Europe-wide network of Trusted Third
Party Services (ETS)'', SOGIS (Senior Officials' Group, Information Security)
23/11/95
- 80
-
`Medical Ethics Today -- Its Practice and Philosophy', A Sommerville,
BMA 1993
- 81
-
`Project Initiation Document -- Tees Security Pilot', Issue 1 draft 3,
Syntegra, 23rd October 1996
- 82
-
Letter from Ian Taylor MP MBE to the writer, 16 December 1996
- 83
-
``EC plans encryption rules in bid to police information superhighway'', J
Thorel, in Nature v 377 no 6547 (28/9/95) p 275
- 84
-
Urteil im Zivilprozess Winter/Dresdner Bank AG, Amtsgericht Darmstadt, 24.
Februar 1989, Geschäftsnummer 36 C 4386/87, Richter Jerschenkowski
- 85
-
``The use of encryption and related services with the NHSnet'', Zergo Ltd.,
published as NHSE IMG document number E5254, April 1996
- 86
-
``Zergo's response to `The Zergo report -- initial comments' by Dr Ross
Anderson'', Zergo Ltd., 17th May 1996
Ross Anderson
Mon Oct 6 12:47:34 BST 1997