-
1
-
-
33745005507
-
Challenges associated with privacy in health care industry: Implementation of HIPAA and the security rules
-
Choi YB, Capitan KE, Krause JS, Streeper MM (2006) Challenges associated with privacy in health care industry: implementation of HIPAA and the security rules. J Med Syst 30(1):57-64
-
(2006)
J Med Syst
, vol.30
, Issue.1
, pp. 57-64
-
-
Choi, Y.B.1
Capitan, K.E.2
Krause, J.S.3
Streeper, M.M.4
-
2
-
-
46449113799
-
Electronic health records in ambulatory care-a national survey of physicians
-
DesRoches CM, Campbell EG, Rao SR, Donelan K, Ferris TG, Jha A, Kaushal R, Levy DE, Rosenbaum S, Shields AE, Blumenthal D (2008) Electronic health records in ambulatory care-a national survey of physicians. N Engl J Med 359(1): 50-60
-
(2008)
N Engl J Med
, vol.359
, Issue.1
, pp. 50-60
-
-
Desroches, C.M.1
Campbell, E.G.2
Rao, S.R.3
Donelan, K.4
Ferris, T.G.5
Jha, A.6
Kaushal, R.7
Levy, D.E.8
Rosenbaum, S.9
Shields, A.E.10
Blumenthal, D.11
-
6
-
-
40449096076
-
Analyzing regulatory rules for privacy and security requirements
-
Breaux TD, Antón AI (2008) Analyzing regulatory rules for privacy and security requirements. IEEE Trans Softw Eng 34(1):5-20
-
(2008)
IEEE Trans Softw Eng
, vol.34
, Issue.1
, pp. 5-20
-
-
Breaux, T.D.1
Antón, A.I.2
-
10
-
-
0003706051
-
-
Garner BA (ed), 8th edn. Thompson West
-
Garner BA (ed) (2004) Black's law dictionary, 8th edn. Thompson West
-
(2004)
Black's Law Dictionary
-
-
-
15
-
-
17744386721
-
Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation
-
Massacci F, Prest M, Zannone N (2005) Using a security requirements engineering methodology in practice: the compliance with the Italian data protection legislation. Comput Stand Interfaces 27(5):445-455
-
(2005)
Comput Stand Interfaces
, vol.27
, Issue.5
, pp. 445-455
-
-
Massacci, F.1
Prest, M.2
Zannone, N.3
-
16
-
-
0003152468
-
Deriving goals from a use-case based requirements specification
-
Carter R, Dagnino A, Dempster J, Siege D (2001) Deriving goals from a use-case based requirements specification. Requirements Eng 6(1):63-73
-
(2001)
Requirements Eng
, vol.6
, Issue.1
, pp. 63-73
-
-
Carter, R.1
Dagnino, A.2
Dempster, J.3
Siege, D.4
-
18
-
-
37249000278
-
Scenario support for effective requirements
-
Alspaugh TA, Antón AI (2008) Scenario support for effective requirements. Inf Softw Technol 50(3):198-220
-
(2008)
Inf Softw Technol
, vol.50
, Issue.3
, pp. 198-220
-
-
Alspaugh, T.A.1
Antón, A.I.2
-
21
-
-
0032178650
-
CREWS-SAVRE: Scenarios for acquiring and validating requirements
-
Maiden NAM (1998) CREWS-SAVRE: scenarios for acquiring and validating requirements. Autom Softw Eng 5(4):419-446
-
(1998)
Autom Softw Eng
, vol.5
, Issue.4
, pp. 419-446
-
-
Maiden, N.A.M.1
-
24
-
-
0141509901
-
Precluding incongruous behavior by aligning software requirements with security and privacy policies
-
Earp JB, Carter RA (2003) Precluding incongruous behavior by aligning software requirements with security and privacy policies. Inf Softw Technol 45(14):967-977
-
(2003)
Inf Softw Technol
, vol.45
, Issue.14
, pp. 967-977
-
-
Earp, J.B.1
Carter, R.A.2
-
29
-
-
0034833312
-
-
In: Proceedings of the fifth IEEE international symposium on requirements engineering
-
Allenby K, Kelly T (2001) Deriving safety requirements using scenarios. In: Proceedings of the fifth IEEE international symposium on requirements engineering, pp 228-235
-
(2001)
Deriving Safety Requirements Using Scenarios
, pp. 228-235
-
-
Allenby, K.1
Kelly, T.2
|