-
1
-
-
80455156922
-
Information security and privacy in healthcare: Current state of research
-
Appari, A. and Johnson. M. E. (2010) Information security and privacy in healthcare: current state of research, International Journal of Internet and Enterprise Management, 6, 4, 279-314.
-
(2010)
International Journal of Internet and Enterprise Management
, vol.6
, Issue.4
, pp. 279-314
-
-
Appari, A.1
Johnson, M.E.2
-
2
-
-
78650942280
-
Beyond safe harbor: Automatic discovery of health information deidentification policy alternatives
-
in Tiffany Veinot (Ed.) November 10-12, 2010, Arlington, VA
-
st ACM International Health Informatics Symposium, November 10-12, 2010, Arlington, VA, 163-172.
-
(2010)
st ACM International Health Informatics Symposium
, pp. 163-172
-
-
Benitez, K.1
Loukides, G.2
Malin, B.3
-
4
-
-
84870344165
-
A threat taxonomy for mHealth privacy
-
in January 4, 2011, Bangalore, India
-
Kotz, D. (2011) A threat taxonomy for mHealth privacy, in Workshop on Networked Healthcare Technology (NetHealth), January 4, 2011, Bangalore, India.
-
(2011)
Workshop on Networked Healthcare Technology (NetHealth)
-
-
Kotz, D.1
-
5
-
-
77956287645
-
Threat analysis of online health information system
-
in Fillia Makedon, Ilias Maglogiannis, and Sarantos Kapidakis (Eds.) June 23-25, 2010, Samos, Greece, 31
-
Nematzadeh, A. and Camp, L. J. (2010) Threat analysis of online health information system, in Fillia Makedon, Ilias Maglogiannis, and Sarantos Kapidakis (Eds.) Proceedings of the 3rd International Conference on Pervasive Technologies Related to Assistive Environments (PETRA '10), June 23-25, 2010, Samos, Greece, 31, 1-7.
-
(2010)
Proceedings of the 3rd International Conference on Pervasive Technologies Related to Assistive Environments (PETRA '10)
, pp. 1-7
-
-
Nematzadeh, A.1
Camp, L.J.2
-
6
-
-
77953017028
-
A risk assessment model for voting systems using threat trees and Monte Carlo simulation
-
August 31, 2009, Atlanta, GA
-
Pardue, H., Landry, J., and Yasinsac, A. (2009) A risk assessment model for voting systems using threat trees and Monte Carlo simulation, " First International Workshop on Requirements Engineering for E-voting Systems (RE-Vote), August 31, 2009, Atlanta, GA.
-
(2009)
First International Workshop on Requirements Engineering for E-voting Systems (RE-Vote)
-
-
Pardue, H.1
Landry, J.2
Yasinsac, A.3
-
7
-
-
77957605604
-
Security threats categories in healthcare information systems
-
Samy, G. N., Ahmad, R., and Ismail, Z. (2010) Security threats categories in healthcare information systems, Health Informatics Journal, 16, 3, 201-209.
-
(2010)
Health Informatics Journal
, vol.16
, Issue.3
, pp. 201-209
-
-
Samy, G.N.1
Ahmad, R.2
Ismail, Z.3
-
8
-
-
84871349133
-
Negative exposure
-
retrieved from
-
Shepherd, A. (2010) Negative exposure, For the Record, 22, 11, 10-13; retrieved from http://www.fortherecordmag.com/archives/060710p10.shtml.
-
(2010)
For the Record
, vol.22
, Issue.11
, pp. 10-13
-
-
Shepherd, A.1
-
9
-
-
1842829828
-
Risk Management Guide for Information Technology Systems, Recommendations of the National Institute of Standards and Technology
-
Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg, MD
-
Stoneburner, G., Goguen, A., and Feringa, A. (2002) Risk Management Guide for Information Technology Systems, Recommendations of the National Institute of Standards and Technology, Special Publication 800-30, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg, MD.
-
(2002)
Special Publication 800-30
-
-
Stoneburner, G.1
Goguen, A.2
Feringa, A.3
-
10
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
Sweeney, L. (2002) k-anonymity: a model for protecting privacy, International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems, 10, 5, 557-570.
-
(2002)
International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
|