메뉴 건너뛰기




Volumn 5, Issue , 2011, Pages 4104-4111

A threat tree for health information security and privacy

Author keywords

Health information privacy; Information security; Risk assessment; Threat modeling

Indexed keywords

DATA ATTRIBUTES; HEALTH INFORMATIONS; POTENTIAL CONTROL; SECURITY AND PRIVACY; THREAT MODELING;

EID: 84870361597     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (8)

References (11)
  • 7
    • 77957605604 scopus 로고    scopus 로고
    • Security threats categories in healthcare information systems
    • Samy, G. N., Ahmad, R., and Ismail, Z. (2010) Security threats categories in healthcare information systems, Health Informatics Journal, 16, 3, 201-209.
    • (2010) Health Informatics Journal , vol.16 , Issue.3 , pp. 201-209
    • Samy, G.N.1    Ahmad, R.2    Ismail, Z.3
  • 8
    • 84871349133 scopus 로고    scopus 로고
    • Negative exposure
    • retrieved from
    • Shepherd, A. (2010) Negative exposure, For the Record, 22, 11, 10-13; retrieved from http://www.fortherecordmag.com/archives/060710p10.shtml.
    • (2010) For the Record , vol.22 , Issue.11 , pp. 10-13
    • Shepherd, A.1
  • 9
    • 1842829828 scopus 로고    scopus 로고
    • Risk Management Guide for Information Technology Systems, Recommendations of the National Institute of Standards and Technology
    • Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg, MD
    • Stoneburner, G., Goguen, A., and Feringa, A. (2002) Risk Management Guide for Information Technology Systems, Recommendations of the National Institute of Standards and Technology, Special Publication 800-30, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg, MD.
    • (2002) Special Publication 800-30
    • Stoneburner, G.1    Goguen, A.2    Feringa, A.3
  • 11


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.