From: jdwilson@gold.chem.hawaii.edu (Jim Wilson (VA))
To: MJMISKI@macc.wisc.edu (Matthew J Miszewski)
Message Hash: da14d1f77f35a76ff103ab6455d516c178e9c5512cd0240dc58415cad14572f5
Message ID: <9311261629.AA05385@gold.chem.hawaii.edu>
Reply To: <23112601070888@vms2.macc.wisc.edu>
UTC Datetime: 1993-11-26 16:33:54 UTC
Raw Date: Fri, 26 Nov 93 08:33:54 PST
From: jdwilson@gold.chem.hawaii.edu (Jim Wilson (VA))
Date: Fri, 26 Nov 93 08:33:54 PST
To: MJMISKI@macc.wisc.edu (Matthew J Miszewski)
Subject: Re: Health Security
In-Reply-To: <23112601070888@vms2.macc.wisc.edu>
Message-ID: <9311261629.AA05385@gold.chem.hawaii.edu>
MIME-Version: 1.0
Content-Type: text/plain
>
> I realize that this is of marginal crypto import, but I need as much info
> as possible on Hospital Information Systems and security. Especially
> on CICS and AIX systems. Do any cryptographic protocols exist yet to
> protect huge interactive medical databases?
>
> Please send responses in mail.
>
> --Matt
> ______________________________________________________________________________
> In defense of liberty, encrypt for all purposes, civil and professional.
> In defense of privacy, encrypt all correspondence, personal and professional.
> In defense of sanity, do not encrypt your dry cleaning invoice!
>
> ++++++++--------mjmiski@macc.wisc.edu (c)1993
>
What specifically are you asking about? Are you talking about encrypted
password protection or encryption of part or all of the databases?
-Jim
Return to November 1993
Return to “Matthew J Miszewski <MJMISKI@macc.wisc.edu>”