HealthSec '12 | Development of a System Framework for Implementation of an Enhanced Role-Based Access Control Model to Support Collaborative Processes | |
HealthSec '12 | Neuroimage Data Sets: Rethinking Privacy Policies | |
HealthSec '12 | Who Wears Me? Bioimpedance as a Passive Biometric | |
HealthSec '12 | Information Security of Patient-Centred Services Utilising the German Nationwide Health Information Technology Infrastructure | |
HealthSec '12 | Protecting Web-based Patient Portal for the Security and Privacy of Electronic Medical Records | |
HealthSec '12 | Secure Logging and Auditing in Electronic Health Records Systems: What Can We Learn from the Payment Card Industry | |
HealthSec '12 | Body Area Network Security: Robust Key Establishment Using Human Body Channel | |
HealthSec '12 | Tragedy of Anticommons in Digital Right Management of Medical Records | |
HealthSec '12 | Security Risks, Low-tech User Interfaces, and Implantable Medical Devices: A Case Study with Insulin Pump Infusion Systems | |
HealthSec '12 | Accountings of Relationships | |
HealthSec '12 | On XACML’s Adequacy to Specify and to Enforce HIPAA | |
HealthSec '12 | An Analysis of HIPAA Breach Data | |
HealthSec '12 | Access Control Hygiene and the Empathy Gap in Medical IT | |
HealthSec '12 | Vis-à-vis Cryptography: Private and Trustworthy In-Person Certifications | |
HealthSec '12 | Enabling Robust Information Accountability in E-healthcare Systems | |
HealthSec '11 | Who Does the Autopsy? Criminal Implications of Implantable Medical Devices | Marc Goodman |
HealthSec '11 | A Research Roadmap for Healthcare IT Security Inspired by the PCAST Health Information Technology Report | Matthew D. Green, Aviel D. Rubin |
HealthSec '11 | Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices | Steve Hanna, Rolf Rolles, Andrés Molina-Markham, Pongsin Poosankam, Jeremiah Blocki, Kevin Fu, Dawn Song |
HealthSec '11 | Providing an Additional Factor for Patient Identification Based on Digital Fingerprint | Guy C. Hembroff, Xinli Wang, Sead Muftic |
HealthSec '11 | Context-Aware Anomaly Detection for Electronic Medical Record Systems | Xiaowei Li, Yuan Xue, You Chen, Bradley Malin |
HealthSec '11 | Role Prediction Using Electronic Medical Record System Audits | Wen Zhang, Carl A. Gunter, David Liebovitz, Jian Tian |
HealthSec '11 | Audit Mechanisms for Privacy Protection in Healthcare Environments | Jeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha |
HealthSec '11 | Quickshear Defacing for Neuroimages | Nakeisha Schimke, John Hale |
HealthSec '11 | Adaptive Security and Privacy for mHealth Sensing | Shrirang Mare, Jacob Sorber, David Kotz, Denise Anthony, Timothy Stablein, Minho Shin, Cory Cornelius, David Kotz, Jacob Sorber, Aarathi Prasad |
HealthSec '11 | Controlled Dissemination of Electronic Medical Records | Guido van 't Noordende |