메뉴 건너뛰기




Volumn , Issue , 2011, Pages 41-50

Measuring privacy compliance with process specifications

Author keywords

[No Author keywords available]

Indexed keywords

HEALTH CARE;

EID: 84859033160     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/Metrisec.2011.10     Document Type: Conference Paper
Times cited : (12)

References (30)
  • 2
    • 0034198281 scopus 로고    scopus 로고
    • Improving the delivery ofcare and reducing healthcare costs with the digitization of information
    • R. Noffsinger and S. Chin, "Improving the delivery ofcare and reducing healthcare costs with the digitization of information," J. of Healthcare Information Management, vol. 14, pp. 23-30, 2000.
    • (2000) J. of Healthcare Information Management , vol.14 , pp. 23-30
    • Noffsinger, R.1    Chin, S.2
  • 3
    • 84855308630 scopus 로고    scopus 로고
    • [Online]. Available
    • "2009 Annual Study: Global Cost of a Data Breach," 2010. [Online]. Available: http://www.securityprivacyandthelaw.com/uploads/ file/Ponemonn COBn 2009n GL.pdf
    • (2010) 2009 Annual Study: Global Cost of A Data Breach
  • 4
    • 56349121964 scopus 로고    scopus 로고
    • Towards the development ofprivacy-aware systems
    • P. Guarda and N. Zannone, "Towards the development ofprivacy-aware systems," Inf. Softw. Technol., vol. 51, no. 2, pp. 337-350, 2009.
    • (2009) Inf. Softw. Technol. , vol.51 , Issue.2 , pp. 337-350
    • Guarda, P.1    Zannone, N.2
  • 6
    • 70350600124 scopus 로고    scopus 로고
    • A Formalization of HIPAA for a Medical Messaging System
    • Proc. of Int. Conf. on Trust, Privacy and Security in Digital Business, ser. Springer
    • P. E. Lam, J. C. Mitchell, and S. Sundaram, "A Formalization of HIPAA for a Medical Messaging System," in Proc. of Int. Conf. on Trust, Privacy and Security in Digital Business, ser. LNCS, vol. 5695. Springer, 2009, pp. 73-85.
    • (2009) LNCS , vol.5695 , pp. 73-85
    • Lam, P.E.1    Mitchell, J.C.2    Sundaram, S.3
  • 8
    • 60349103393 scopus 로고    scopus 로고
    • Run-time enforcement ofnonsafety policies
    • J. Ligatti, L. Bauer, and D. Walker, "Run-time enforcement ofnonsafety policies," ACM Trans. Inf. Syst. Secur., vol. 12, no. 3, pp. 1-41, 2009.
    • (2009) ACM Trans. Inf. Syst. Secur. , vol.12 , Issue.3 , pp. 1-41
    • Ligatti, J.1    Bauer, L.2    Walker, D.3
  • 11
    • 84881225236 scopus 로고    scopus 로고
    • Enforceable security policies
    • F. B. Schneider, "Enforceable security policies," ACM Trans. Inf. Syst. Secur., vol. 3, no. 1, pp. 30-50, 2000.
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.3 , Issue.1 , pp. 30-50
    • Schneider, F.B.1
  • 12
    • 50249144000 scopus 로고    scopus 로고
    • Regulating exceptions in healthcare using policy spaces
    • Proc. of Conf. on Data and Applications Security, ser. Springer
    • C. A. Ardagna, S. D. C. di Vimercati, T. Grandison, S. Jajodia, and P. Samarati, "Regulating exceptions in healthcare using policy spaces,"in Proc. of Conf. on Data and Applications Security, ser. LNCS, vol. 5094. Springer, 2008, pp. 254-267.
    • (2008) LNCS , vol.5094 , pp. 254-267
    • Ardagna, C.A.1    Di Vimercati, S.D.C.2    Grandison, T.3    Jajodia, S.4    Samarati, P.5
  • 13
    • 33947628689 scopus 로고    scopus 로고
    • Comprehensive management of the access to the electronic patient record: Towards trans-institutional networks
    • DOI 10.1016/j.ijmedinf.2006.09.014, PII S138650560600219X
    • C. Lovis, S. Spahni, N. Cassoni, and A. Geissbuhler, "Comprehensive management ofthe access to the electronic patient record: Towards trans-institutional networks," Int. J. of Medical Informatics, vol. 76, pp. 466-470, 2007. (Pubitemid 46498975)
    • (2007) International Journal of Medical Informatics , vol.76 , Issue.5-6 , pp. 466-470
    • Lovis, C.1    Spahni, S.2    Cassoni, N.3    Geissbuhler, A.4
  • 15
    • 79551553839 scopus 로고    scopus 로고
    • Predictability of enforcement
    • Proc. of Int. Symp. on Engineering Secure Software and Systems, ser. Springer
    • N. Bielova and F. Massacci, "Predictability of enforcement," in Proc. of Int. Symp. on Engineering Secure Software and Systems, ser. LNCS, vol. 6542. Springer, 2011, pp. 73-86.
    • (2011) LNCS , vol.6542 , pp. 73-86
    • Bielova, N.1    Massacci, F.2
  • 16
    • 67649977014 scopus 로고    scopus 로고
    • Checking compliance of execution traces to business rules
    • Proc. of Workshop on Business Process Management, ser. Springer
    • F. Chesani, P. Mello, M. Montali, F. Riguzzi, M. Sebastianis, and S. Storari, "Checking compliance of execution traces to business rules,"in Proc. of Workshop on Business Process Management, ser. LNBIP, vol. 17. Springer, 2009, pp. 134-145.
    • (2009) LNBIP , vol.17 , pp. 134-145
    • Chesani, F.1    Mello, P.2    Montali, M.3    Riguzzi, F.4    Sebastianis, M.5    Storari, S.6
  • 17
    • 35748949584 scopus 로고    scopus 로고
    • Conformance checking of processes based on monitoring real behavior
    • DOI 10.1016/j.is.2007.07.001, PII S030643790700049X
    • A. Rozinat and W. M. P. van der Aalst, "Conformance checking ofprocesses based on monitoring real behavior," Inf. Syst., vol. 33, no. 1, pp. 64-95, 2008. (Pubitemid 350051578)
    • (2008) Information Systems , vol.33 , Issue.1 , pp. 64-95
    • Rozinat, A.1    Van Der Aalst, W.M.P.2
  • 19
    • 34548805858 scopus 로고    scopus 로고
    • t-Closeness: Privacy Beyond k-Anonymity and l- Diversity
    • IEEE Computer Society
    • N. Li and T. Li, "t-Closeness: Privacy Beyond k-Anonymity and l- Diversity," in Proc. of IEEE Int. Conf. on Data Engineering. IEEE Computer Society, 2007, pp. 106-115.
    • (2007) Proc. of IEEE Int. Conf. on Data Engineering , pp. 106-115
    • Li, N.1    Li, T.2
  • 20
    • 33746335051 scopus 로고    scopus 로고
    • Differential privacy
    • Proc. of Int. Coll. on Automata, Languages and Programming, ser. Springer
    • C. Dwork, "Differential privacy," in Proc. of Int. Coll. on Automata, Languages and Programming, ser. LNCS, vol. 4052. Springer, 2006, pp. 1-12.
    • (2006) LNCS , vol.4052 , pp. 1-12
    • Dwork, C.1
  • 21
    • 34249899908 scopus 로고    scopus 로고
    • A static analysis for quantifying information flow in a simple imperative language
    • D. Clark, S. Hunt, and P. Malacaria, "A static analysis for quantifying information flow in a simple imperative language," J. Comput. Secur., vol. 15, no. 3, pp. 321-371, 2007. (Pubitemid 46868450)
    • (2007) Journal of Computer Security , vol.15 , Issue.3 , pp. 321-371
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 22
    • 45749109040 scopus 로고    scopus 로고
    • Formal analysis of BPMN via a translation into COWS
    • Proc. of COORDINATION, ser. Springer
    • D. Prandi, P. Quaglia, and N. Zannone, "Formal analysis of BPMN via a translation into COWS," in Proc. of COORDINATION, ser. LNCS, vol. 5052. Springer, 2008, pp. 249-263.
    • (2008) LNCS , vol.5052 , pp. 249-263
    • Prandi, D.1    Quaglia, P.2    Zannone, N.3
  • 23
    • 33645694894 scopus 로고    scopus 로고
    • A semantic-based user privacy protection framework for web services
    • Proc. of Workshop on Intelligent Techniques for Web Personalization, ser. Springer
    • A. Tumer, A. Dogac, and I. H. Toroslu, "A semantic-based user privacy protection framework for web services," in Proc. of Workshop on Intelligent Techniques for Web Personalization, ser. LNCS, vol. 3169. Springer, 2003, pp. 289-305.
    • (2003) LNCS , vol.3169 , pp. 289-305
    • Tumer, A.1    Dogac, A.2    Toroslu, I.H.3
  • 24
    • 36049032185 scopus 로고    scopus 로고
    • Hierarchical hippocratic databases with minimal disclosure for virtual organizations
    • F. Massacci, J. Mylopoulos, and N. Zannone, "Hierarchical hippocratic databases with minimal disclosure for virtual organizations," VLDB J., vol. 15, no. 4, pp. 370-387, 2006.
    • (2006) VLDB J. , vol.15 , Issue.4 , pp. 370-387
    • Massacci, F.1    Mylopoulos, J.2    Zannone, N.3
  • 25
    • 34547398934 scopus 로고    scopus 로고
    • A Combination-based Semantic Similarity Measure using Multiple Information Sources
    • IEEE Computer Society
    • H. Nguyen and H. Al-Mubaid, "A Combination-based Semantic Similarity Measure using Multiple Information Sources," in Proc. of Int. Conf. on Information Reuse and Integration. IEEE Computer Society, 2006, pp. 617-621.
    • (2006) Proc. of Int. Conf. on Information Reuse and Integration , pp. 617-621
    • Nguyen, H.1    Al-Mubaid, H.2
  • 26
    • 38949150028 scopus 로고    scopus 로고
    • Semantic Similarity between Concepts from Different OWL Ontologies
    • IEEE Computer Society
    • L. D. Ngan, T. M. Hang, and A. Goh, "Semantic Similarity between Concepts from Different OWL Ontologies," in Proc. of Int. Conf. on Industrial Informatics. IEEE Computer Society, 2006, pp. 618-623.
    • (2006) Proc. of Int. Conf. on Industrial Informatics , pp. 618-623
    • Ngan, L.D.1    Hang, T.M.2    Goh, A.3
  • 27
    • 84976702763 scopus 로고
    • WordNet: Alexical database for English
    • G. A. Miller, "WordNet: alexical database for English," Commun. ACM, vol. 38, no. 11, pp. 39-41, 1995.
    • (1995) Commun. ACM , vol.38 , Issue.11 , pp. 39-41
    • Miller, G.A.1
  • 28
    • 84950419860 scopus 로고
    • Advances inRecord-Linkage Methodology as Applied to Matching the 1985 Census of Tampa, Florida
    • M. A. Jaro, "Advances inRecord-Linkage Methodology as Applied to Matching the 1985 Census of Tampa, Florida," J. of Amer. Statistical Assoc., vol. 84, no. 406, pp. 414-420, 1989.
    • (1989) J. of Amer. Statistical Assoc. , vol.84 , Issue.406 , pp. 414-420
    • Jaro, M.A.1
  • 29
    • 0000600219 scopus 로고    scopus 로고
    • Solution to Plato's Problem: The Latent Semantic Analysis Theory of Acquisition, Induction and Representation of Knowledge
    • T. K. Landauer and S. T. Dumais, "Solution to Plato's Problem: The Latent Semantic Analysis Theory of Acquisition, Induction and Representation of Knowledge," Psychological Review, no. 104, 1997.
    • (1997) Psychological Review , Issue.104
    • Landauer, T.K.1    Dumais, S.T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.