-
1
-
-
84891790375
-
Think a privacy breach couldn't happen at your facility?
-
Amatayakul, M. 2009. Think a privacy breach couldn't happen at your facility? Hospital Financial Manage. 12, 61-65.
-
(2009)
Hospital Financial Manage.
, vol.12
, pp. 61-65
-
-
Amatayakul, M.1
-
2
-
-
80455156922
-
Information security and privacy in healthcare: Current state of research
-
Appari, A. and Johnson, M. 2011. Information security and privacy in healthcare: Current state of research. Int. J. Internet Enterprise Manage. 6, 279-314.
-
(2011)
Int. J. Internet Enterprise Manage.
, vol.6
, pp. 279-314
-
-
Appari, A.1
Johnson, M.2
-
4
-
-
1542327773
-
Some unintended consequences of information technology in health care: The nature of patient care information system-related errors
-
DOI 10.1197/jamia.M1471
-
Ash, J. S., Berg, M., and Coiera, E. 2004. Some unintended consequences of information technology in health care: The nature of patient care information system-related errors. J. Amer. Med. Informatics Assoc. 11, 2, 104-112. (Pubitemid 38327498)
-
(2004)
Journal of the American Medical Informatics Association
, vol.11
, Issue.2
, pp. 104-112
-
-
Ash, J.S.1
Berg, M.2
Coiera, E.3
-
5
-
-
77951135204
-
The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online
-
Bansal, G., Zahedi, F., and Gefen, D. 2010. The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Syst. 49, 138-150.
-
(2010)
Decision Support Syst.
, vol.49
, pp. 138-150
-
-
Bansal, G.1
Zahedi, F.2
Gefen, D.3
-
6
-
-
38049042929
-
Towards improved privacy policy coverage in healthcare using policy refinement
-
Bhatti, R. and Grandison, T. 2007. Towards improved privacy policy coverage in healthcare using policy refinement. In Proceedings of the Secure Data Management Workshop 4721, 158-173.
-
(2007)
Proceedings of the Secure Data Management Workshop
, vol.4721
, pp. 158-173
-
-
Bhatti, R.1
Grandison, T.2
-
7
-
-
1842474926
-
Authorisation and access control for electronic health record systems
-
DOI 10.1016/j.ijmedinf.2003.11.018, PII S1386505603001916
-
Blobel, B. 2004. Authorisation and access control for electronic health record systems. Int. J. Med. Informatics 73, 3, 251-257. (Pubitemid 38452939)
-
(2004)
International Journal of Medical Informatics
, vol.73
, Issue.3
, pp. 251-257
-
-
Blobel, B.1
-
8
-
-
70449396545
-
Review article: Effectiveness of patient care teams and the role of clinical expertise and coordination: A literature review
-
Bosch, M., Faber, M. J., Cruijsberg, J., Voerman, G. E., Leatherman, S., Grol, R. P., Hulscher, M., and Wensing, M. 2009. Review article: Effectiveness of patient care teams and the role of clinical expertise and coordination: A literature review. Med. Care Res. and Rev. 66, 6 Suppl., 5S-35S.
-
(2009)
Med. Care Res. and Rev.
, vol.66
, Issue.6 SUPPL.
-
-
Bosch, M.1
Faber, M.J.2
Cruijsberg, J.3
Voerman, G.E.4
Leatherman, S.5
Grol, R.P.6
Hulscher, M.7
Wensing, M.8
-
9
-
-
79959638566
-
Using statistical and machine learning to help institutions detect suspicious access to electronic health records
-
Boxwala, A. A., Kim, J., Grillo, J. M., and Ohno-Machado, L. 2011. Using statistical and machine learning to help institutions detect suspicious access to electronic health records. J. Amer. Med. Informatics Assoc. 18, 498-505.
-
(2011)
J. Amer. Med. Informatics Assoc.
, vol.18
, pp. 498-505
-
-
Boxwala, A.A.1
Kim, J.2
Grillo, J.M.3
Ohno-Machado, L.4
-
10
-
-
77956911344
-
Health information technology: Laying the infrastructure for national health reform
-
Buntin, M. B., Jain, S. H., and Blumenthal, D. 2010. Health information technology: Laying the infrastructure for national health reform. Health Affairs 29, 6, 1214-1219.
-
(2010)
Health Affairs
, vol.29
, Issue.6
, pp. 1214-1219
-
-
Buntin, M.B.1
Jain, S.H.2
Blumenthal, D.3
-
11
-
-
33747884715
-
Types of unintended consequences related to computerized provider order entry
-
DOI 10.1197/jamia.M2042, PII S1067502706001101
-
Campbell, E. M., Sittig, D. F., Ash, J. S., Guappone, K. P., and Dykstra, R. H. 2006. Types of unintended consequences related to computerized provider order entry. J. Amer. Med. Informatics Assoc. 13, 5, 547-556. (Pubitemid 44292018)
-
(2006)
Journal of the American Medical Informatics Association
, vol.13
, Issue.5
, pp. 547-556
-
-
Campbell, E.M.1
Sittig, D.F.2
Ash, J.S.3
Guappone, K.P.4
Dykstra, R.H.5
-
12
-
-
0032501663
-
Integrated care pathways increase use of guidelines
-
Campbell, H., Hotchkiss, R., Bradshaw, N., and Porteous, M. 1998. Integrated care pathways increase use of guidelines. British Med. J. 316, 133-137.
-
(1998)
British Med. J.
, vol.316
, pp. 133-137
-
-
Campbell, H.1
Hotchkiss, R.2
Bradshaw, N.3
Porteous, M.4
-
13
-
-
18944385964
-
The value of intrusion detection systems in information technology security architecture
-
DOI 10.1287/isre.1050.0041
-
Cavusoglu, H., Mishra, B., and Raghunathan, S. 2005. The value of intrusion detection systems in information technology security architecture. Inform. Syst. Res. 16, 1, 28-46. (Pubitemid 40701107)
-
(2005)
Information Systems Research
, vol.16
, Issue.1
, pp. 28-46
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
14
-
-
33646822781
-
Systematic review: Impact of health information technology on quality, efficiency, and costs of medical care
-
Chaudhry, B., Wang, J., Wu, S., Maglione, M., Mojica, W., Roth, E., Morton, S. C., and Shekelle, P. G. 2006. Systematic review: Impact of health information technology on quality, efficiency, and costs of medical care. Ann. Intern. Med. 144, 10, 742-752. (Pubitemid 46780634)
-
(2006)
Annals of Internal Medicine
, vol.144
, Issue.10
, pp. 742-752
-
-
Chaudhry, B.1
Wang, J.2
Wu, S.3
Maglione, M.4
Mojica, W.5
Roth, E.6
Morton, S.C.7
Shekelle, P.G.8
-
15
-
-
13544269338
-
Application of SVM and ANN for intrusion detection
-
DOI 10.1016/j.cor.2004.03.019, PII S0305054804000711, Application of Neural Networks
-
Chen, W.-H., Hsu, S.-H., and Shen, H.-P. 2005. Application of SVM and ANN for intrusion detection. Comput. Op. Res. 32, 2617-2634. (Pubitemid 40219764)
-
(2005)
Computers and Operations Research
, vol.32
, Issue.10
, pp. 2617-2634
-
-
Chen, W.-H.1
Hsu, S.-H.2
Shen, H.-P.3
-
18
-
-
84871892207
-
Specializing network analysis to detect anomalous insider actions
-
Chen, Y., Nyemba, S., Zhang, W., and Malin, B. 2012b. Specializing network analysis to detect anomalous insider actions. Security Informatics 1, 5, 1-24.
-
(2012)
Security Informatics
, vol.1
, Issue.5
, pp. 1-24
-
-
Chen, Y.1
Nyemba, S.2
Zhang, W.3
Malin, B.4
-
19
-
-
33845700071
-
Continuous auditing with a multi-agent system
-
DOI 10.1016/j.dss.2006.08.002, PII S0167923606001175, Decision Support Systems in Emerging Economies
-
Chou, C., Du, T., and Lai, V. S. 2007. Continuous auditing with a multi-agent system. Decis. Supp. Syst. 42, 2274-2292. (Pubitemid 44969948)
-
(2007)
Decision Support Systems
, vol.42
, Issue.4
, pp. 2274-2292
-
-
Chou, C.L.-y.1
Du, T.2
Lai, V.S.3
-
20
-
-
33744467431
-
Compliance with HIPAA security standards in US Hospitals
-
Davis, D. and Having, K. 2006. Compliance with HIPAA security standards in U.S. hospitals. J. Healthcare Inform. Manage. 20, 108-115.
-
(2006)
J. Healthcare Inform. Manage
, vol.20
, pp. 108-115
-
-
Davis, D.1
Having, K.2
-
21
-
-
77950962201
-
A guide to California's breaches: First year of state reporting requirement reveals common privacy violations
-
Dimick, C. 2010. A guide to California's breaches: First year of state reporting requirement reveals common privacy violations. J. Amer. Health Inform. Manage. Assoc. 81, 34-36.
-
(2010)
J. Amer. Health Inform. Manage. Assoc.
, vol.81
, pp. 34-36
-
-
Dimick, C.1
-
23
-
-
84871865576
-
Explaining accesses to electronic medical records using diagnosis information
-
Fabbri, D. and LeFevre, K. 2013. Explaining accesses to electronic medical records using diagnosis information. J. Amer. Med. Informatics Assoc. 20, 1, 52-60.
-
(2013)
J. Amer. Med. Informatics Assoc.
, vol.20
, Issue.1
, pp. 52-60
-
-
Fabbri, D.1
Lefevre, K.2
-
24
-
-
33845638417
-
How to break access control in a controlled manner
-
Ferreira, A., Correia, R. J. C., Antunes, L., Farinha, P., Oliveira-Palhares, E., Chadwick, D. W., and da Costa Pereira, A. 2006. How to break access control in a controlled manner. In Proceedings of 19th IEEE International Symposium on Computer-Based Medical Systems. 847-854.
-
(2006)
Proceedings of 19th IEEE International Symposium on Computer-Based Medical Systems
, pp. 847-854
-
-
Ferreira, A.1
Correia, R.J.C.2
Antunes, L.3
Farinha, P.4
Oliveira-Palhares, E.5
Chadwick, D.W.6
Da Costa Pereira, A.7
-
25
-
-
84887099428
-
An audit server for monitoring usage of clinical information systems
-
Gallagher, R. J., Sengupta, S., Hripcsak, G., Barrows, R. C., and Clayton, P. D. 1998. An audit server for monitoring usage of clinical information systems. In Proceedings of the American Medical Informatics Association Annual Symposium.
-
(1998)
Proceedings of the American Medical Informatics Association Annual Symposium
-
-
Gallagher, R.J.1
Sengupta, S.2
Hripcsak, G.3
Barrows, R.C.4
Clayton, P.D.5
-
26
-
-
80051743310
-
Implementing context and team based access control in healthcare intranets
-
DOI 10.1080/1463923021000042715
-
Georgiadis, C., Mavridis, I., Nikolakopoulou, G., and Pangalos, G. 2002. Implementing context and team based access control in healthcare intranets. Med. Informatics Internet Medicine 27, 185-201. (Pubitemid 36013489)
-
(2002)
Medical Informatics and the Internet in Medicine
, vol.27
, Issue.3
, pp. 185-201
-
-
Georgiadis, C.K.1
Mavridis, I.K.2
Nikolakopoulou, G.3
Pangalos, G.I.4
-
27
-
-
0034150591
-
Electronic medical records and patient privacy
-
Goldberg, I. V. 2000. Electronic medical records and patient privacy. Health Care Manager 18, 3, 63-69.
-
(2000)
Health Care Manager
, vol.18
, Issue.3
, pp. 63-69
-
-
Goldberg, I.V.1
-
28
-
-
33745183324
-
Hit and mis: Implications of health information technology andmedical information systems
-
Goldschmidt, P. G. 2005. Hit and mis: Implications of health information technology andmedical information systems. Comm. ACM 48, 10, 68-74.
-
(2005)
Comm. ACM
, vol.48
, Issue.10
, pp. 68-74
-
-
Goldschmidt, P.G.1
-
29
-
-
80053461711
-
Experience-based access management: A life-cycle framework for identity and access management systems
-
Gunter, C. A., Liebovitz, D., and Malin, B. 2011. Experience-based access management: A life-cycle framework for identity and access management systems. IEEE Security Privacy 9, 5, 48-55.
-
(2011)
IEEE Security Privacy
, vol.9
, Issue.5
, pp. 48-55
-
-
Gunter, C.A.1
Liebovitz, D.2
Malin, B.3
-
30
-
-
61349124807
-
Identifying disgruntled employee systems fraud risk through text mining: A simple solution for a multi-billion dollar problem
-
Holton, C. 2009. Identifying disgruntled employee systems fraud risk through text mining: A simple solution for a multi-billion dollar problem. Decision Supp. Syst. 46, 853-864.
-
(2009)
Decision Supp. Syst.
, vol.46
, pp. 853-864
-
-
Holton, C.1
-
31
-
-
38549142402
-
Anomaly detection using temporal data mining in a smart home environment
-
DOI 10.3414/ME9103
-
Jakkula, V. R. and Cook, D. J. 2008. Anomaly detection using temporal data mining in a smart home environment. Methods Inform. Medicine 47, 1, 70-75. (Pubitemid 351160348)
-
(2008)
Methods of Information in Medicine
, vol.47
, Issue.1
, pp. 70-75
-
-
Jakkula, V.1
Cook, D.J.2
-
32
-
-
84891771211
-
-
Chapter Enhancing anomaly detection using temporal pattern discovery, 175-194, Spriger
-
Jakkula, V. R., Crandall, A. S., and Cook, D. J. 2008. Advanced Intelligent Environments. Chapter Enhancing anomaly detection using temporal pattern discovery, 175-194, Spriger.
-
(2008)
Advanced Intelligent Environments
-
-
Jakkula, V.R.1
Crandall, A.S.2
Cook, D.J.3
-
33
-
-
83455173577
-
Considering complexity in healthcare systems
-
Kannampallil, T. G., Schauer, G. F., Cohen, T., and Patel, V. L. 2011. Considering complexity in healthcare systems. J. Biomed. Informatics 44, 6, 943-947.
-
(2011)
J. Biomed. Informatics
, vol.44
, Issue.6
, pp. 943-947
-
-
Kannampallil, T.G.1
Schauer, G.F.2
Cohen, T.3
Patel, V.L.4
-
34
-
-
84863347135
-
Anomaly and signature filtering improve classifier performance for detection of suspicious access to ehrs
-
Kim, J., Grillo, J. M., Boxwala, A. A., Jiang, X., Mandelbaum, R. B., Patel, B. A., Mikels, D., Vinterbo, S. A., and Ohno-Machado, L. 2011. Anomaly and signature filtering improve classifier performance for detection of suspicious access to ehrs. In Proceedings of the American Medical Informatics Association Annual Symposium. 723-731.
-
(2011)
Proceedings of the American Medical Informatics Association Annual Symposium
, pp. 723-731
-
-
Kim, J.1
Grillo, J.M.2
Boxwala, A.A.3
Jiang, X.4
Mandelbaum, R.B.5
Patel, B.A.6
Mikels, D.7
Vinterbo, S.A.8
Ohno-Machado, L.9
-
36
-
-
84871879163
-
Security practices and regulatory compliance in the healthcare industry
-
Kwon, J. and Johnson, M. 2013. Security practices and regulatory compliance in the healthcare industry. J. Amer. Med. Informatics Assoc. 20, 1, 44-50.
-
(2013)
J. Amer. Med. Informatics Assoc.
, vol.20
, Issue.1
, pp. 44-50
-
-
Kwon, J.1
Johnson, M.2
-
37
-
-
77949731575
-
Temporal sequence learning and data reduction for anomaly detection
-
Lane, T. and Brodley, C. E. 1999. Temporal sequence learning and data reduction for anomaly detection. ACM Trans. Inform. Syst. Secur. 2, 3, 295-331.
-
(1999)
ACM Trans. Inform. Syst. Secur.
, vol.2
, Issue.3
, pp. 295-331
-
-
Lane, T.1
Brodley, C.E.2
-
38
-
-
84869871203
-
An enhancement of the role-based access control model to facilitate information access management in context of team collaboration and workflow
-
Le, X., T. Doll, Barbosu, M., Luque, Z., and Wang, D. 2012. An enhancement of the role-based access control model to facilitate information access management in context of team collaboration and workflow. J. Biomed. Informatics 45, 1084-1107.
-
(2012)
J. Biomed. Informatics
, vol.45
, pp. 1084-1107
-
-
Le, X.1
Doll, T.2
Barbosu, M.3
Luque, Z.4
Wang, D.5
-
39
-
-
84867297440
-
RBAC-matrix-based EMR rights management system to improve HIPAA compliance
-
Lee, H. and Chang, S. 2012. RBAC-matrix-based EMR rights management system to improve HIPAA compliance. J. Med. Syst 36, 2981-2992.
-
(2012)
J. Med. Syst
, vol.36
, pp. 2981-2992
-
-
Lee, H.1
Chang, S.2
-
41
-
-
0036318237
-
If electronic medical records are so great, why aren't family physicians using them?
-
Loomis, G. A., Ries, J. S., Saywell, R. M., and Thakker, N. R. 2002. If electronic medical records are so great, why arent family physicians using them? J. Family Practice 51, 7, 636-641. (Pubitemid 34753553)
-
(2002)
Journal of Family Practice
, vol.51
, Issue.7
, pp. 636-641
-
-
Loomis, G.A.1
Ries, S.J.2
Saywell Jr., R.M.3
Thakker, N.R.4
-
42
-
-
57549096747
-
Adopting electronic medical records in primary care: Lessons learned from health information systems implementation experience in seven countries
-
Ludwick, D. A. and Doucette, J. 2009. Adopting electronic medical records in primary care: lessons learned from health information systems implementation experience in seven countries. Int. J. Med. Informatics 78, 1, 22-31.
-
(2009)
Int. J. Med. Informatics
, vol.78
, Issue.1
, pp. 22-31
-
-
Ludwick, D.A.1
Doucette, J.2
-
43
-
-
79952774177
-
Learning relational policies from electronic health record access logs
-
Malin, B., Nyemba, S., and Paulett, J. 2011. Learning relational policies from electronic health record access logs. J. Biomed. Informatics 44, 2, 333-342.
-
(2011)
J. Biomed. Informatics
, vol.44
, Issue.2
, pp. 333-342
-
-
Malin, B.1
Nyemba, S.2
Paulett, J.3
-
44
-
-
84891780550
-
Four reasons for CIOs to celebrate stage 2 meaningful use
-
September 12
-
Manos, D. September 12 2012. Four reasons for CIOs to celebrate stage 2 meaningful use. Gov. Health IT Mag.
-
(2012)
Gov. Health IT Mag.
-
-
Manos, D.1
-
45
-
-
79960184348
-
Rumpole: A flexible break-glass access control model
-
Marinovic, S., Craven, R., Ma, J., and Dulay, N. 2011. Rumpole: A flexible break-glass access control model. In Proceedings of the 16th ACM Symposium on Access Control Models and Technologies. 73-82.
-
(2011)
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies
, pp. 73-82
-
-
Marinovic, S.1
Craven, R.2
Ma, J.3
Dulay, N.4
-
46
-
-
84897111298
-
Detecting inappropriate access to electronic health records using collaborative filtering
-
Menon, A., Jiang, X., Kim, J., Vaidya, J., and Ohno-Machado, L. 2013. Detecting inappropriate access to electronic health records using collaborative filtering. Mach. Learn., 1-1.
-
(2013)
Mach. Learn.
, pp. 1-1
-
-
Menon, A.1
Jiang, X.2
Kim, J.3
Vaidya, J.4
Ohno-Machado, L.5
-
47
-
-
0142151165
-
A contextual role-based access control authorization model for electronic patient records
-
Motta, G. and Furuie, S. 2003. A contextual role-based access control authorization model for electronic patient records. IEEE Trans. Inform. Technol. Biomed. 7, 202-207.
-
(2003)
IEEE Trans. Inform. Technol. Biomed.
, vol.7
, pp. 202-207
-
-
Motta, G.1
Furuie, S.2
-
48
-
-
84994391858
-
Role-based access control on the Web
-
Park, J. S., Sandhu, R., and Ahn, G.-J. 2001. Role-based access control on the Web. ACM Trans. Inform. Syst. Secur. 4, 1, 37-71.
-
(2001)
ACM Trans. Inform. Syst. Secur.
, vol.4
, Issue.1
, pp. 37-71
-
-
Park, J.S.1
Sandhu, R.2
Ahn, G.-J.3
-
49
-
-
55549122324
-
Situation-based access control: Privacy management via modeling of patient data access scenarios
-
Peleg, M., Beimel, D., Dori, D., and Denekamp, Y. 2008. Situation-Based Access Control: Privacy management via modeling of patient data access scenarios. J. Biomed. Informatics 41, 6, 1028-1040.
-
(2008)
J. Biomed. Informatics
, vol.41
, Issue.6
, pp. 1028-1040
-
-
Peleg, M.1
Beimel, D.2
Dori, D.3
Denekamp, Y.4
-
50
-
-
18044390760
-
Primary care physician time utilization before and after implementation of an electronic health record: A time-motion study
-
DOI 10.1016/j.jbi.2004.11.009, PII S1532046404001613
-
Pizziferri, L., Kittler, A. F., Volk, L. A., Honour, M. M., Gupta, S., Wang, S., Wang, T., Lippincott, M., Li, Q., and Bates, D. W. 2005. Primary care physician time utilization before and after implementation of an electronic health record: A time-motion study. J. Biomed. Informatics 38, 3, 176-188. (Pubitemid 40724468)
-
(2005)
Journal of Biomedical Informatics
, vol.38
, Issue.3
, pp. 176-188
-
-
Pizziferri, L.1
Kittler, A.F.2
Volk, L.A.3
Honour, M.M.4
Gupta, S.5
Wang, S.6
Wang, T.7
Lippincott, M.8
Li, Q.9
Bates, D.W.10
-
52
-
-
5344244656
-
-
R Development Core Team, R Foundation for Statistical Computing, Vienna, Austria
-
R Development Core Team. 2008. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria.
-
(2008)
R: A Language and Environment for Statistical Computing
-
-
-
54
-
-
0028513932
-
Access control: Principle and practice
-
Sandhu, R. and Samarati, P. 1994. Access control: Principle and practice. IEEE Comm. Mag. 32, 40-48.
-
(1994)
IEEE Comm. Mag.
, vol.32
, pp. 40-48
-
-
Sandhu, R.1
Samarati, P.2
-
55
-
-
0030086382
-
Role-based access control
-
Sandhu, R., Coyne, E., Feinstein, H., and Youman, C. 1996. Role-based access control. IEEE Comput. 26, 38-47.
-
(1996)
IEEE Comput.
, vol.26
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
56
-
-
0034638661
-
Internet based repository of medical records that retains patient confidentiality
-
Schoenberg, R. and Safran, C. 2000. Internet based repository of medical records that retains patient confidentiality. British Med. J. 321, 1199-1203.
-
(2000)
British Med. J.
, vol.321
, pp. 1199-1203
-
-
Schoenberg, R.1
Safran, C.2
-
57
-
-
0036395373
-
A framework for understanding and predicting insider attacks
-
DOI 10.1016/S0167-4048(02)01009-X
-
Schultz, E. 2002. A framework for understanding and predicting insider attacks. Comput. Security 21, 526-531. (Pubitemid 35186246)
-
(2002)
Computers and Security
, vol.21
, Issue.6
, pp. 526-531
-
-
Schultz, E.E.1
-
58
-
-
0033120274
-
Security in health-care information systems - Current trends
-
DOI 10.1016/S1386-5056(98)00168-3, PII S1386505698001683
-
Smith, E. and Eloff, J. 1999. Security in health-care information systems-Current trends. Int. J. Med. Informatics 54, 39-54. (Pubitemid 29130335)
-
(1999)
International Journal of Medical Informatics
, vol.54
, Issue.1
, pp. 39-54
-
-
Smith, E.1
Eloff, J.H.P.2
-
59
-
-
84858241555
-
-
Springer, New York, NY
-
Stolfo, S., Bellovin, S., Hershkop, S., Keromytis, A., Sinclair, S., and Smith, S. 2008. Insider Attack and Cyber Security: Beyond the Hacker. Springer, New York, NY.
-
(2008)
Insider Attack and Cyber Security: Beyond the Hacker
-
-
Stolfo, S.1
Bellovin, S.2
Hershkop, S.3
Keromytis, A.4
Sinclair, S.5
Smith, S.6
-
60
-
-
33749583360
-
Beyond streams and graphs: Dynamic tensor analysis
-
KDD 2006: Proceedings of the Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
Sun, J., Tao, D., and Faloutsos, C. 2006. Beyond streams and graphs: Dynamic tensor analysis. In Proceedings of KDD. 374-383. (Pubitemid 44535534)
-
(2006)
Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, vol.2006
, pp. 374-383
-
-
Sun, J.1
Tao, D.2
Faloutsos, C.3
-
61
-
-
0035402112
-
Probabilistic techniques for intrusion detection based on computer audit data
-
DOI 10.1109/3468.935043, PII S1083442701052882, Information Assurance
-
Ye, N., Li, X., Chen, Q., Emran, S. M., and Xu, M. 2001. Probabilistic techniques for intrusion detection based on computer audit data. IEEE Trans. Syst., Man, and Cybern. A, Syst. Humans 31, 4, 266-274. (Pubitemid 33142052)
-
(2001)
IEEE Transactions on Systems, Man, and Cybernetics Part A:Systems and Humans.
, vol.31
, Issue.4
, pp. 266-274
-
-
Ye, N.1
Li, X.2
Chen, Q.3
Emran, S.M.4
Xu, M.5
-
62
-
-
3042684910
-
A rule-based framework for role-based delegation and revocation
-
Zhang, L., Ahn, G.-J., and Chu, B.-T. 2003. A rule-based framework for role-based delegation and revocation. ACM Trans. Inform. Syst. Security 6, 3, 404-441.
-
(2003)
ACM Trans. Inform. Syst. Security
, vol.6
, Issue.3
, pp. 404-441
-
-
Zhang, L.1
Ahn, G.-J.2
Chu, B.-T.3
-
63
-
-
84863373113
-
Role prediction using electronic medical record system audits
-
Zhang, W., Gunter, C. A., Liebovitz, D., Tian, J., and Malin, B. 2011. Role prediction using electronic medical record system audits. In Proceedings of the American Medical Informatics Association Annual Symposium. 858-867.
-
(2011)
Proceedings of the American Medical Informatics Association Annual Symposium
, pp. 858-867
-
-
Zhang, W.1
Gunter, C.A.2
Liebovitz, D.3
Tian, J.4
Malin, B.5
-
64
-
-
14844299328
-
HIPAA compliant auditing system for medical images
-
DOI 10.1016/j.compmedimag.2004.09.009, PII S0895611104001223, Imaging Informatics
-
Zhou, Z. and Liu, B. J. 2005. HIPAA compliant auditing system for medical images. Comput. Med. Imaging Graphics 29, 2-3, 235-241. (Pubitemid 40341312)
-
(2005)
Computerized Medical Imaging and Graphics
, vol.29
, Issue.2-3
, pp. 235-241
-
-
Zhou, Z.1
Liu, B.J.2
|