Papers

Search results

    ConferenceTitleAuthor(s)
    HealthSec '12Development of a System Framework for Implementation of an Enhanced Role-Based Access Control Model to Support Collaborative Processes
    HealthSec '12Neuroimage Data Sets: Rethinking Privacy Policies
    HealthSec '12Who Wears Me? Bioimpedance as a Passive Biometric
    HealthSec '12Information Security of Patient-Centred Services Utilising the German Nationwide Health Information Technology Infrastructure
    HealthSec '12Protecting Web-based Patient Portal for the Security and Privacy of Electronic Medical Records
    HealthSec '12Secure Logging and Auditing in Electronic Health Records Systems: What Can We Learn from the Payment Card Industry
    HealthSec '12Body Area Network Security: Robust Key Establishment Using Human Body Channel
    HealthSec '12Tragedy of Anticommons in Digital Right Management of Medical Records
    HealthSec '12Security Risks, Low-tech User Interfaces, and Implantable Medical Devices: A Case Study with Insulin Pump Infusion Systems
    HealthSec '12Accountings of Relationships
    HealthSec '12On XACML’s Adequacy to Specify and to Enforce HIPAA
    HealthSec '12An Analysis of HIPAA Breach Data
    HealthSec '12Access Control Hygiene and the Empathy Gap in Medical IT
    HealthSec '12Vis-à-vis Cryptography: Private and Trustworthy In-Person Certifications
    HealthSec '12Enabling Robust Information Accountability in E-healthcare Systems
    HealthSec '11Implantable Medical Device Communication Security: Pattern vs. Signal EncryptionFei Hu, Qi Hao, Marcin Lukowiak
    HealthSec '11Exposing Privacy Concerns in mHealth
    HealthSec '11Persistent Security, Privacy, and Governance for Healthcare InformationW. Knox Carey, Jarl Nilsson, Steve Mitchell
    HealthSec '11Who Does the Autopsy? Criminal Implications of Implantable Medical DevicesMarc Goodman
    HealthSec '11A Research Roadmap for Healthcare IT Security Inspired by the PCAST Health Information Technology ReportMatthew D. Green, Aviel D. Rubin
    HealthSec '11Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical DevicesSteve Hanna, Rolf Rolles, Andrés Molina-Markham, Pongsin Poosankam, Jeremiah Blocki, Kevin Fu, Dawn Song
    HealthSec '11Providing an Additional Factor for Patient Identification Based on Digital FingerprintGuy C. Hembroff, Xinli Wang, Sead Muftic
    HealthSec '11Context-Aware Anomaly Detection for Electronic Medical Record SystemsXiaowei Li, Yuan Xue, You Chen, Bradley Malin
    HealthSec '11Role Prediction Using Electronic Medical Record System AuditsWen Zhang, Carl A. Gunter, David Liebovitz, Jian Tian
    HealthSec '11Audit Mechanisms for Privacy Protection in Healthcare EnvironmentsJeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha

Pages