@inproceedings {287302, author = {Xiaojun Xu and Qingying Hao and Zhuolin Yang and Bo Li and David Liebovitz and Gang Wang and Carl A. Gunter}, title = {How to Cover up Anomalous Accesses to Electronic Health Records}, booktitle = {32nd USENIX Security Symposium (USENIX Security 23)}, year = {2023}, isbn = {978-1-939133-37-3}, address = {Anaheim, CA}, pages = {229--246}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/xu-xiaojun}, publisher = {USENIX Association}, month = aug } @inproceedings {179220, author = {Eric Duffy and Steve Nyemba and Carl A. Gunter and David Liebovitz and Bradley Malin}, title = {Requirements and Design for an Extensible Toolkit for Analyzing {EMR} Audit Logs}, booktitle = {2013 USENIX Workshop on Health Information Technologies (HealthTech 13)}, year = {2013}, address = {Washington, D.C.}, url = {https://www.usenix.org/conference/healthtech13/workshop-program/presentation/duffy}, publisher = {USENIX Association}, month = aug } @inproceedings {266569, author = {Wen Zhang and Carl A. Gunter and David Liebovitz and Jian Tian}, title = {Role Prediction Using Electronic Medical Record System Audits}, booktitle = {2nd USENIX Workshop on Health Security and Privacy (HealthSec 11)}, year = {2011}, address = {San Francisco, CA}, url = {https://www.usenix.org/conference/healthsec11/role-prediction-using-electronic-medical-record-system-audits}, publisher = {USENIX Association}, month = aug } @inproceedings {267242, author = {Carl Gunter and David Liebovitz and Bradley Malin}, title = {{EBAM}: {Experience-Based} Access Management for Healthcare}, booktitle = {1st USENIX Workshop on Health Security and Privacy (HealthSec 10)}, year = {2010}, address = {Washington, DC}, url = {https://www.usenix.org/conference/healthsec10/ebam-experience-based-access-management-healthcare}, publisher = {USENIX Association}, month = aug }