-
1
-
-
81155136708
-
-
BodyMedia [Online], Available
-
BodyMedia [Online]. Available: http://www.bodymedia.com/
-
-
-
-
2
-
-
81155154604
-
-
Cybersecurity for networked medical devices containing offthe- shelf (OTS) software [Online]. Available:
-
Cybersecurity for networked medical devices containing offthe- shelf (OTS) software [Online]. Available: http://www.fda. gov/cdrh/comp/guidance/1553. html
-
-
-
-
3
-
-
81155136711
-
-
Medical devices "plug-n-play" interoperability program [Online]. Available
-
Medical devices "plug-n-play" interoperability program [Online]. Available: http://mdpnp.org/
-
-
-
-
4
-
-
81155136713
-
-
Medtronics Inc. [Online], Available
-
Medtronics Inc. [Online]. Available: http://www.medtronic.com/your- health/bradycardia/device/
-
-
-
-
5
-
-
84912554678
-
Challenges of implementing cyber-physical security solutions in body area networks
-
Apr
-
A. Banerjee, K. Venkatasubramanian, and S. K. S. Gupta, "Challenges of implementing cyber-physical security solutions in body area networks ," in Proc. Int. Conf. Body Area Networks (BodyNets 2009), Apr. 2009, pp. 1-8.
-
(2009)
Proc. Int. Conf. Body Area Networks (BodyNets 2009)
, pp. 1-8
-
-
Banerjee, A.1
Venkatasubramanian, K.2
Gupta, S.K.S.3
-
8
-
-
33749416259
-
Usability for medical devices
-
DOI 10.1109/PSES.2005.1529517, 1529517, 2005 IEEE Symposium on Product Safety Engineering
-
S. Braun, "Usability for medical devices ," in Proc. 2005 IEEE Symp. Product Safety Engineering, Oct. 2005, pp. 16-22 . (Pubitemid 44499834)
-
(2005)
2005 IEEE Symposium on Product Safety Engineering
, vol.2005
, pp. 16-22
-
-
Braun, S.1
-
9
-
-
0025386404
-
A logic of authentication
-
M. Burrows and R. Needham, "A logic of authentication ," ACM Trans. Comput. Syst., vol. 8, no. 1, pp. 18-36, 1990 .
-
(1990)
ACM Trans. Comput. Syst.
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Needham, R.2
-
10
-
-
33645994181
-
Ensuring patient safety in wireless medical device networks
-
Apr
-
V. Cehlot and E. B. Sloane, "Ensuring patient safety in wireless medical device networks ," Computer, vol. 39, no. 4, pp. 54-60, Apr. 2006 .
-
(2006)
Computer
, vol.39
, Issue.4
, pp. 54-60
-
-
Cehlot, V.1
Sloane, E.B.2
-
11
-
-
38049001489
-
Modeling of man-inthe-middle attack in the wireless networks
-
(WiCom'07), Sept. 2007
-
Z. Chen, S. Guo, K. Zheng, and Y. Yang, "Modeling of man-inthe-middle attack in the wireless networks ," in Proc. Int. Conf. Wireless Communications, Networking and Mobile Computing, 2007 (WiCom'07), Sept. 2007, pp. 2255-2258 .
-
(2007)
Proc. Int. Conf. Wireless Communications, Networking and Mobile Computing
, pp. 2255-2258
-
-
Chen, Z.1
Guo, S.2
Zheng, K.3
Yang, Y.4
-
12
-
-
4043138710
-
Medical and information technologies converge
-
DOI 10.1109/MEMB.2004.1317983
-
T. Cohen, "Medical and information technologies converge ," IEEE Eng. Med. Biol. Mag., vol. 23, no. 3, pp. 59-65, May-June 2004. (Pubitemid 39078915)
-
(2004)
IEEE Engineering in Medicine and Biology Magazine
, vol.23
, Issue.3
, pp. 59-65
-
-
Cohen, T.1
-
13
-
-
33751024861
-
A logic for constraint-based security protocol analysis
-
DOI 10.1109/SP.2006.3, 1624009, Proceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006
-
R. Corin and A. Saptawijaya, "A logic for constraint-based security protocol analysis ," in Proc. IEEE Symp. Security and Privacy, May 2006, pp. 155-168 . (Pubitemid 44753720)
-
(2006)
Proceedings - IEEE Symposium on Security and Privacy
, vol.2006
, pp. 155-168
-
-
Corin, R.1
Saptawijaya, A.2
Etalle, S.3
-
14
-
-
24944493383
-
-
Carnegie-Mellon Univ., Pittsburgh, PA, CMU/SEI-2004-TR-004 (ESC-TR-2004-004), Apr.
-
E. Morris, L. Levine, C. Meyers, D. Plakosh, and P. Place, "Systems of systems interoperability ," Carnegie-Mellon Univ., Pittsburgh, PA, CMU/SEI-2004-TR-004 (ESC-TR-2004-004), Apr. 2004 .
-
(2004)
Systems of systems interoperability
-
-
Morris, E.1
Levine, L.2
Meyers, C.3
Plakosh, D.4
Place, P.5
-
15
-
-
0031676397
-
Strand spaces: Why is a security protocol correct?
-
F. J. T. Fabrega, J. C. Herzog, and J. D. Guttman, "Strand spaces: Why is a security protocol correct? ," in Proc. 17th IEEE Symp. Security and Privacy, 1998, pp. 1-12 .
-
(1998)
Proc. 17th IEEE Symp. Security and Privacy
, pp. 1-12
-
-
Fabrega, F.J.T.1
Herzog, J.C.2
Guttman, J.D.3
-
17
-
-
7044274523
-
Security: A new clinical engineering paradigm
-
July-Aug
-
S. L. Grimes, "Security: A new clinical engineering paradigm ," IEEE Eng. Med. Biol. Mag., vol. 23, no. 4, pp. 80-82, July-Aug. 2004.
-
(2004)
IEEE Eng. Med. Biol. Mag.
, vol.23
, Issue.4
, pp. 80-82
-
-
Grimes, S.L.1
-
18
-
-
33750321755
-
Criticality aware access control model for pervasive applications
-
S. K. S. Gupta, T. Mukherjee, and K. Venkatasubramanian, "Criticality aware access control model for pervasive applications ," in Proc. 4th IEEE Conf. Pervasive Computing (PerCom), Mar. 2006, pp. 257-261 .
-
(2006)
Proc. 4th IEEE Conf. Pervasive Computing (PerCom), Mar.
, pp. 257-261
-
-
Gupta, S.K.S.1
Mukherjee, T.2
Venkatasubramanian, K.3
-
19
-
-
38349178199
-
Security and privacy for implantable medical devices
-
D. Halperin, T. Heydt-Benjamin, K. Fu, T. Kohno, and W. Maisel, "Security and privacy for implantable medical devices ," IEEE Pervasive Comput., vol. 7, no. 1, pp. 30-39, 2008 .
-
(2008)
IEEE Pervasive Comput.
, vol.7
, Issue.1
, pp. 30-39
-
-
Halperin, D.1
Heydt-Benjamin, T.2
Fu, K.3
Kohno, T.4
Maisel, W.5
-
20
-
-
2142821517
-
The Health Insurance Portability and Accountability Act privacy rule: A practical guide for researchers
-
P. P. Gunn, A. M. Fremont, M. Bottrell, L. R. Shugarman, J. Galegher, and T. Bikson, "The Health Insurance Portability and Accountability Act privacy rule: A practical guide for researchers," Med. Care, vol. 42, no. 4, pp. 321-327.
-
Med. Care
, vol.42
, Issue.4
, pp. 321-327
-
-
Gunn, P.P.1
Fremont, A.M.2
Bottrell, M.3
Shugarman, L.R.4
Galegher, J.5
Bikson, T.6
-
21
-
-
38449083694
-
Accessibility and usability guidelines for mobile devices in home health monitoring
-
Jan
-
R. Hubert, "Accessibility and usability guidelines for mobile devices in home health monitoring ," SIGACCESS Access. Comput., no. 84, pp. 26-29, Jan. 2006 .
-
(2006)
SIGACCESS Access. Comput.
, Issue.84
, pp. 26-29
-
-
Hubert, R.1
-
22
-
-
0141571131
-
Using usability heuristics to evaluate patient safety of medical devices
-
DOI 10.1016/S1532-0464(03)00060-1
-
J. Zhang, T. R. Johnson, V. L. Patel, D. L. Paigec, and T. Kubose, "Using usability heuristics to evaluate patient safety of medical devices," J. Biomed. Inform., vol. 36, no. 12, pp. 23-30, Feb.- Apr. 2003. (Pubitemid 37206388)
-
(2003)
Journal of Biomedical Informatics
, vol.36
, Issue.1-2
, pp. 23-30
-
-
Zhang, J.1
Johnson, T.R.2
Patel, V.L.3
Paige, D.L.4
Kubose, T.5
-
23
-
-
34247491209
-
A formal approach to pre-market review for medical device software
-
DOI 10.1109/COMPSAC.2006.9, 4020075, Proceedings - 30th Annual International Computer Software and Applications Conference, COMPSAC 2006
-
R. Jetley, S. P. Iyer, P. L. Jones, and W. Spees, "A formal approach to pre-market review for medical device software ," in Proc. 30th Annu. Int. Computer Software and Applications Conf. (COMPSAC'06), Washington, DC, 2006, pp. 169-177 . (Pubitemid 46661646)
-
(2006)
Proceedings - International Computer Software and Applications Conference
, vol.1
, pp. 169-177
-
-
Jetley, R.1
Purushothaman Iyer, S.2
Jones, P.L.3
Spees, W.4
-
24
-
-
57449088257
-
Static analysis of medical device software using codesonar
-
R. P. Jetley, P. L. Jones, and P. Anderson, "Static analysis of medical device software using codesonar ," in Proc. 2008 Workshop Static Analysis (SAW'08), 2008, pp. 22-29 .
-
(2008)
Proc. 2008 Workshop Static Analysis (SAW'08)
, pp. 22-29
-
-
Jetley, R.P.1
Jones, P.L.2
Anderson, P.3
-
25
-
-
84942426861
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
May
-
C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures ," in Proc. IEEE 38th Int. Conf. Communication, May 2003, pp. 113-127 .
-
(2003)
Proc. IEEE 38th Int. Conf. Communication
, pp. 113-127
-
-
Karlof, C.1
Wagner, D.2
-
26
-
-
79959884874
-
Message-In-A-Bottle: User-friendly and secure key deployment for sensor nodes
-
Oct
-
C. Kuo, M. Luk, R. Negi, and A. Perrig, "Message-in-a-bottle: User-friendly and secure key deployment for sensor nodes ," in Proc. ACM Conf. Embedded Networked Sensor System (SenSys'07), Oct. 2007, pp. 233-246 .
-
(2007)
Proc. ACM Conf. Embedded Networked Sensor System (SenSys'07)
, pp. 233-246
-
-
Kuo, C.1
Luk, M.2
Negi, R.3
Perrig, A.4
-
29
-
-
84944878354
-
-
Boca Raton, FL: CRC, Oct.
-
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography. Boca Raton, FL: CRC, Oct. 1996 .
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
30
-
-
40649108378
-
Emerging technologies: Wireless communication systems for implantable medical devices
-
DOI 10.1109/EMB.2008.915488
-
D. Panescu, "Emerging technologies [wireless communication systems for implantable medical devices] ," IEEE Eng. Med. Biol. Mag., vol. 27, no. 2, pp. 96-101, Mar.-Apr. 2008 . (Pubitemid 351374193)
-
(2008)
IEEE Engineering in Medicine and Biology Magazine
, vol.27
, Issue.2
, pp. 96-101
-
-
Panescu, D.1
-
31
-
-
0036738266
-
SPINS: Security protocol for sensor networks
-
Sept
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and D. Tygar, "SPINS: Security protocol for sensor networks ," Wireless Netw., vol. 8, no. 5, pp. 521-534, Sept. 2002 .
-
(2002)
Wireless Netw.
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, D.5
-
32
-
-
2442687789
-
Information assurance in biomedical informatics systems
-
DOI 10.1109/MEMB.2004.1297181
-
C. D. Schou, J. Frost, and W. V. Maconachy, "Information assurance in biomedical informatics systems ," IEEE Eng. Med. Biol. Mag., vol. 23, no. 1, pp. 110-118, Jan.-Feb. 2004 . (Pubitemid 38667852)
-
(2004)
IEEE Engineering in Medicine and Biology Magazine
, vol.23
, Issue.1
, pp. 110-118
-
-
Schou, C.D.1
Frost, J.2
Maconachy, W.V.3
-
33
-
-
2442701417
-
The case for integrating public health informatics networks
-
DOI 10.1109/MEMB.2004.1297178
-
N. L. Snee and K. A. McCormick, "The case for integrating public health informatics networks ," IEEE Eng. Med. Biol. Mag., vol. 23, no. 1, pp. 81-88, Jan.-Feb. 2004 . (Pubitemid 38667849)
-
(2004)
IEEE Engineering in Medicine and Biology Magazine
, vol.23
, Issue.1
, pp. 81-88
-
-
Snee, N.L.1
McCormick, K.A.2
-
34
-
-
0001831930
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
F. Stajano and R. Anderson, "The resurrecting duckling: Security issues for ad-hoc wireless networks ," in Proc. 7th Int. Workshop Security Protocols, 1999, pp. 172-194 .
-
(1999)
Proc. 7th Int. Workshop Security Protocols
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.2
-
36
-
-
78650759211
-
Plethysmogram- based secure inter-sensor communication in body area networks
-
Nov
-
K. Venkatasubramanian, A. Banerjee, and S. K. S. Gupta, "Plethysmogram- based secure inter-sensor communication in body area networks ," in Proc. IEEE Military Communications Conf., Nov. 2008, pp. 1-7.
-
(2008)
Proc. IEEE Military Communications Conf.
, pp. 1-7
-
-
Venkatasubramanian, K.1
Banerjee, A.2
Gupta, S.K.S.3
-
37
-
-
76849098534
-
Pska: Usable and secure key agreement scheme for body area networks
-
(Special Issue on Wireless Health), Jan
-
K. Venkatasubramanian, A. Banerjee, and S. K. S. Gupta, "Pska: Usable and secure key agreement scheme for body area networks ," IEEE Trans. Inform. Technol. Biomed. (Special Issue on Wireless Health), vol. 14, no. 1, pp. 60-68, Jan. 2010 .
-
(2010)
IEEE Trans. Inform. Technol. Biomed.
, vol.14
, Issue.1
, pp. 60-68
-
-
Venkatasubramanian, K.1
Banerjee, A.2
Gupta, S.K.S.3
-
38
-
-
77954990804
-
Physiological value based efficient usable security solutions for body sensor networks
-
K. Venkatasubramanian and S. K. S. Gupta, "Physiological value based efficient usable security solutions for body sensor networks ," ACM Trans. Sensor Networks, vol. 6, no. 4, pp. 1-36, 2010 .
-
(2010)
ACM Trans. Sensor Networks
, vol.6
, Issue.4
, pp. 1-36
-
-
Venkatasubramanian, K.1
Gupta, S.K.S.2
-
39
-
-
81155136703
-
Caac- An adaptive and proactive access control approach for emergencies for smart infrastructures
-
(Special Issue on Adaptive Security), to be published
-
K. Venkatasubramanian, T. Mukherjee, and S. K. S. Gupta, "Caac- An adaptive and proactive access control approach for emergencies for smart infrastructures ," ACM Trans. Autonom. Adaptive Syst. (Special Issue on Adaptive Security), to be published .
-
ACM Trans. Autonom. Adaptive Syst.
-
-
Venkatasubramanian, K.1
Mukherjee, T.2
Gupta, S.K.S.3
-
40
-
-
33847120377
-
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
-
DOI 10.1145/1218556.1218559
-
S. Zhu, S. Setia, and S. Jajodia, "LEAP+: Efficient security mechanisms for large-scale distributed sensor networks ," ACM Trans. Sensor Networks, vol. 2, no. 4, pp. 500-528, Nov. 2006 . (Pubitemid 46278640)
-
(2006)
ACM Transactions on Sensor Networks
, vol.2
, Issue.4
, pp. 500-528
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
|