Methods of Information in Medicine, Table of Contents Methods Inf Med 1993; 32(05): 357DOI: 10.1055/s-0038-1634958 Editorial Commentary Schattauer GmbH Access to Medical Databases; Theory and Practice A. R. Bakker 1 BAZIS Foundation, Leiden, The Netherlands › Author AffiliationsRecommend Article Abstract Buy Article Response to: Pangalos GJ: Medical database security policies. Meth Inform Med 1993; 32: 349-56. Full Text References REFERENCES 1 Pangalos GJ. Medical database security policies. Meth Inform Med 1993; 32: 349-56. 2 Griesser GG. et al. Data Protection in Health Information Systems, Considerations and Guidelines. Proc IFIP Working Conference. Amsterdam: North-Holland; 1980 3 Leguit FL, Gravendeel C. A large database, a variety of users, how to control authorization and the presentation of data. In: Lind-berg DAB, Reichertz PL. eds. Lecture Notes in Medical Informatics . (Vol 24). Heidelberg: Springer Verlag; 1984: 182-7.