Biblio

Export 4 results:
Filters: Author is David Liebovitz  [Clear All Filters]
2023
Xu X, Hao Q, Yang Z, Li B, Liebovitz D, Wang G, Gunter CA.  2023.  How to Cover up Anomalous Accesses to Electronic Health Records. 32nd USENIX Security Symposium (USENIX Security 23). :229--246.
2013
Duffy E, Nyemba S, Gunter CA, Liebovitz D, Malin B.  2013.  Requirements and Design for an Extensible Toolkit for Analyzing EMR Audit Logs. 2013 USENIX Workshop on Health Information Technologies (HealthTech 13).
2011
Zhang W, Gunter CA, Liebovitz D, Tian J.  2011.  Role Prediction Using Electronic Medical Record System Audits. 2nd USENIX Workshop on Health Security and Privacy (HealthSec 11).
2010
Gunter C, Liebovitz D, Malin B.  2010.  EBAM: Experience-Based Access Management for Healthcare. 1st USENIX Workshop on Health Security and Privacy (HealthSec 10).