Conferences

Search results

    TitleConferenceSpeaker(s)
    Can I access your data? Privacy Management in mHealthHealthSec '10David Kotz, Dartmouth College, ISTS
    Using Trusted Sensors to Monitor Patients' HabitsHealthSec '10Alec Wolman, Stefan Saroiu, Victor Bahl
    Practical Health Information Exchange using a Personally Controlled Health RecordHealthSec '10Ben Adida, Isaac S. Kohane, Kenneth D. Mandl, Childrens Hospital Boston, Harvard Medical School
    Policy Management for E-Health RecordsHealthSec '10Maritza Johnson, Steven M. Bellovin
    Technology Companies Are Best Positioned to Offer Health Record TrustsHealthSec '10Shirley Gaw, Umesh Shankar
    Dr. Jekyll or Mr. Hyde: Information Security in the Ecosystem of HealthcareHealthSec '10Joseph Cooley, Sean W. Smith
    Privacy Challenges in Patient-centric Health Information SystemsHealthSec '10Anupam Datta, Nipun Dave, John Mitchell, Helen Nissenbaum, Divya Sharma
    Privacy Challenges for Wireless Medical DevicesHealthSec '10Brent Lagesse
    Insulin Pump System SecurityHealthSec '10Nathanael Paul, David C. Klonoff
    On Usable Authentication for Wireless Body Area NetworksHealthSec '10Cory Cornelius
    A Risk Management Framework for Health Care Data AnonymizationHealthSec '10Tyrone Grandison, Murat Kantarcioglu
    On Resolving the Privacy Debate in Deidentified NeuroimagesHealthSec '10Nakeisha L. Schimke, Mary Kuehler, John Hale
    Securing Medical Research Data with a Rights Management SystemHealthSec '10Mohammad Jafari, Reihaneh Safavi-Naini, Chad Saunders, Nicholas Paul Sheppard
    Beefing Up a Health-Data Ecosystem: Struggles and Successes from Microsoft HealthVaultHealthSec '10Jim O'Leary, Microsoft Health Solutions Group, University of Washington
    Using the Wave Protocol to Represent Individuals' Health RecordsHealthSec '10Shirley Gaw, Umesh Shankar
    EBAM: Experience-Based Access Management for HealthcareHealthSec '10Carl Gunter, David Liebovitz, Bradley Malin
    Fine-grained Sharing of Health Records using XSPA Profile for XACML—An Extended AbstractHealthSec '10A. Al-Faresi, B. Yu, K. Moidu, A. Stavrou, Technology , D. Wijesekera, National Institute of Standards, George Mason University, A. Singhal
    An Anonymous Health Care SystemHealthSec '10Melissa Chase, Kristin Lauter
    Keynote AddressEVT/WOTE '10Donetta Davidson
    Efficient User-Guided Ballot Image VerificationEVT/WOTE '10Arel Cordero, Theron Ji, Alan Tsai, Keaton Mowery, David Wagner
    OpenScan: A Fully Transparent Optical Scan Voting SystemEVT/WOTE '10Kai Wang, Eric Rescorla, Hovav Shacham, Serge Belongie
    On the Use of Financial Data as a Random BeaconEVT/WOTE '10Jeremy Clark, Urs Hengartner
    Queuing and Elections: Long Lines, DREs and Paper BallotsEVT/WOTE '10William A. Edelstein, Arthur D. Edelstein
    Determining the Causes of AccuVote Optical Scan Voting Terminal Memory Card FailuresEVT/WOTE '10Tigran Antonyan, Nicolas Nicolaou, Alexander A. Shvartsman, Therese Smith
    Modeling and Analyzing Faults to Improve Election Process RobustnessEVT/WOTE '10Borislava I. Simidchieva, Sophie J. Engle, Michael Clifford, Alicia Clay Jones, Sean Peisert, Matt Bishop, Lori A. Clarke, Leon J. Osterweil

Pages