Check out the new USENIX Web site. The Eternal Resource Locator: An Alternative Means of Establishing Trust on the World Wide Web
previous up next References
Previous: Availability Up: The Eternal Resource Locator: Next: About this document


`A Security Policy Model for Clinical Information Systems', RJ Anderson, in Proceedings of the 1996 IEEE Symposium on Security and Privacy pp 30-43

`Chipkarten im Gesundheitswesen', Bundesamt für Sicherheit in der Informationstechnik, Bundesanzeiger, 4 May 1995

`Binding Bit Patterns to real World Entities', B Christianson, JA Malcolm, in Security Protocols Workshop 97, Springer LNCS v 1361 pp 105-113

`New Directions in Cryptography', W Diffie and M Hellman, IEEE Trans. on Information Theory, IT-22, November 1976, pp 644-654

`How to Time-Stamp a Digital Document', S Haber, WS Stornetta, in Journal of Cryptology v 3 no 2 (1991) pp 99-112

`Daten aus der Psychotherapie - auch bei uns bald eine Ware?' A von Heydwolff, T Wenzel, Psychotherapie Forum v 5 no 1 pp 17-25

`Computers can be compatible with confidentiality' JS Horner, in Journal of the Royal College of Physicians of London v 31 no 3 (May/June 97) pp 310-312

`A Proposed Architecture for Trusted Third Party Services', N Jefferies, C Mitchell, M Walker, in Cryptography: Policy and Algorithms, Springer LNCS v 1029 pp 98-104

`Constructing digital signatures from one-way function', L Lamport, Technical Report SRI-CSL-98, SRI International, October 1979.

`A Digital Signature Based on a Conventional Encryption Function', RC Merkle, Proc. CRYPTO'87, LNCS 293, Springer Verlag, 1987, pp 369-378

`A Certified Digital Signature', RC Merkle, Proc. CRYPTO'89, LNCS 435, Springer Verlag, 1990, pp 218-238

Press release, NHS Executive, 17th October 1996

`HTML 3.2 References Specification - W3C Recommendation', Dave Ragget, January, 1997

Standard citation suppressed for legal reasons; it can be found easily as `The JET Report' using Web search engines.

`SDSI - A Simple Distributed Security Infrastructure', RL Rivest, B Lampson, at < cis/sdsi.html>, v1.0 presented at USENIX 96 and CRYPTO 96, April 30, 1996

`Institutionell-organisatorische Gestaltung informationstechnischer Sicherungsinfrostrukturen', A Roßnagel, in Datenschutz und Datensicherheit (5/95) pp 259-269

`Secure Hash Standard', National Institute of Standards and Technology, NIST FIPS PUB 180, U.S. Department of Commerce, May 1993

`Secure Books: Protecting the Distribution of Knowledge', R.J. Anderson, V. Matyáš Jr., F.A.P. Petitcolas, IE Buchan, R Hanka, in Security Protocols Workshop 97, Springer LNCS v 1361 pp 1-11

`Coherent Exchange of Healthcare Knowledge in Open Systems', IE Buchan, R Hanka, in Studies in Health Technology and Informatics, C.Pappas et al (Eds), Vol 43, Medical Informatics Europe 97, pp 821-824, IOS Press, 1997

`Information technology - Open Systems Interconnection - The directory: Authentication framework', ITU-T Recommendation X.509, November 1993; (June 1997 E)

`The use of encryption and related services with the NHSnet', Zergo Ltd., published as NHSE IMG document number E5254, April 1996

Fabien A.P. Petitcolas, Computer Laboratory, University of Cambridge