-
2
-
-
0036644509
-
Computer monitoring: Benefits and pitfalls facing management
-
DOI 10.1016/S0378-7206(01)00121-5, PII S0378720601001215
-
S. Ariss Computer monitoring: benefits and pitfalls facing management Information Management 39 7 2002 553 558 (Pubitemid 34704309)
-
(2002)
Information and Management
, vol.39
, Issue.7
, pp. 553-558
-
-
Ariss, S.S.1
-
4
-
-
84867511196
-
On the prevention of fraud and privacy exposure in process information flow
-
X. Bai, R. Gopal, M. Nunez, and D. Zhdanov On the prevention of fraud and privacy exposure in process information flow INFORMS Journal on Computing 24 3 2012 416 432
-
(2012)
INFORMS Journal on Computing
, vol.24
, Issue.3
, pp. 416-432
-
-
Bai, X.1
Gopal, R.2
Nunez, M.3
Zhdanov, D.4
-
6
-
-
57349200762
-
Privacy, Confidentiality, and Electronic Medical Records
-
R.C. Barrows, and P.D. Clayton Privacy, confidentiality, and electronic medical records Journal of the American Medical Informatics Association 3 2 1996 139 148 (Pubitemid 126445018)
-
(1996)
Journal of Health Care for the Poor and Underserved
, vol.7
, Issue.1
, pp. 139-148
-
-
Barrows Jr., R.C.1
Clayton, P.D.2
-
7
-
-
0037213472
-
Knowledge management-enabled health care management systems: Capabilities, infrastructure, and decision-support
-
DOI 10.1016/S0957-4174(02)00083-0, PII S0957417402000830
-
R. Bose Knowledge management-enabled health care management systems: capabilities, infrastructure, and decision-support Expert Systems with Applications 24 1 2003 59 71 (Pubitemid 35452265)
-
(2003)
Expert Systems with Applications
, vol.24
, Issue.1
, pp. 59-71
-
-
Bose, R.1
-
8
-
-
79952784402
-
Health information technology: Integration of clinical workflow into meaningful use of electronic health records
-
F.M. Bowens, P.A. Frye, and W.A. Jones Health information technology: integration of clinical workflow into meaningful use of electronic health records Perspectives in Health Information Management 1-18 Fall 2010
-
(2010)
Perspectives in Health Information Management
, Issue.118
-
-
Bowens, F.M.1
Frye, P.A.2
Jones, W.A.3
-
9
-
-
77954599196
-
On Privacy-Preserving Access to Distributed Heterogeneous Healthcare Information
-
Vol. 6, IEEE Computer Society Washington, DC, USA
-
Claus Boyens, Ramayya Krishnan, and Rema Padman On Privacy-Preserving Access to Distributed Heterogeneous Healthcare Information In Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 6 - Volume 6 (HICSS '04) 2004 Vol. 6, IEEE Computer Society Washington, DC, USA 60135
-
(2004)
Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 6 - Volume 6 (HICSS '04)
, pp. 60135
-
-
Boyens, C.1
Krishnan, R.2
Padman, R.3
-
10
-
-
0028515494
-
Policy resolution in workflow management systems
-
C.J. Bussler Policy resolution in workflow management systems Digital Technical Journal 6 4 September 1994 26 49
-
(1994)
Digital Technical Journal
, vol.6
, Issue.4
, pp. 26-49
-
-
Bussler, C.J.1
-
11
-
-
34748816024
-
Privacy-preserving data integration and sharing
-
C. Clifton, M. Kantarcioglu, A. Doan, G. Schadow, J. Vaidya, A. Elmagarmid, and D. Suciu Privacy-preserving data integration and sharing The 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery (DMKD'04) 2004 19 26
-
(2004)
The 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery (DMKD'04)
, pp. 19-26
-
-
Clifton, C.1
Kantarcioglu, M.2
Doan, A.3
Schadow, G.4
Vaidya, J.5
Elmagarmid, A.6
Suciu, D.7
-
12
-
-
79151485910
-
A new role mining framework to elicit business roles and to mitigate enterprise risk
-
A. Colantonio, R.D. Pietro, A. Ocello, and N.V. Verde A new role mining framework to elicit business roles and to mitigate enterprise risk Decision Support Systems 50 4 2011 715 731
-
(2011)
Decision Support Systems
, vol.50
, Issue.4
, pp. 715-731
-
-
Colantonio, A.1
Pietro, R.D.2
Ocello, A.3
Verde, N.V.4
-
13
-
-
47649094419
-
Role engineering
-
C.E. Youman, R.S. Sandhu, E.J. Coyne, ACM New York, NY
-
E.J. Coyne Role engineering C.E. Youman, R.S. Sandhu, E.J. Coyne, Of the First ACM Workshop on Role-based Access Control (RBAC'95), Number 4 1996 ACM New York, NY
-
(1996)
Of the First ACM Workshop on Role-based Access Control (RBAC'95), Number 4
-
-
Coyne, E.J.1
-
14
-
-
0037768626
-
Privacy enhancing techniques: The key to secure communication and management of clinical and genomic data
-
G.J. de Moor, B. Claerhout, and F. de Meyer Privacy enhancing technologies: the key to secure communication and management of clinical and genomic data Methods of Information in Medicine 42 2003 148 153 (Pubitemid 36637322)
-
(2003)
Methods of Information in Medicine
, vol.42
, Issue.2
, pp. 148-153
-
-
De Moor, G.J.E.1
Claerhout, B.2
De Meyer, F.3
-
17
-
-
33845638417
-
How to break access control in a controlled manner
-
IEEE Computer Society Washington, DC
-
A. Ferreira, R. Cruz-Correia, L. Antunes, P. Farinha, E. Oliveira-Palhares, D.W. Chadwick, and A. Costa-Pereira How to break access control in a controlled manner Proceedings of the 19th IEEE Symposium on Computer-Based Medical Systems (CBMS'06) 2006 IEEE Computer Society Washington, DC 847 854
-
(2006)
Proceedings of the 19th IEEE Symposium on Computer-Based Medical Systems (CBMS'06)
, pp. 847-854
-
-
Ferreira, A.1
Cruz-Correia, R.2
Antunes, L.3
Farinha, P.4
Oliveira-Palhares, E.5
Chadwick, D.W.6
Costa-Pereira, A.7
-
18
-
-
0000432739
-
Disclosure limitation using perturbation and related methods for categorical data (with discussion)
-
S.E. Fienberg, U.E. Makov, and R.J. Steele Disclosure limitation using perturbation and related methods for categorical data (with discussion) Journal of Official Statistics 14 1998 485 512
-
(1998)
Journal of Official Statistics
, vol.14
, pp. 485-512
-
-
Fienberg, S.E.1
Makov, U.E.2
Steele, R.J.3
-
19
-
-
84887099428
-
An audit server for monitoring usage of clinical information systems
-
R.J. Gallagher, S. Sengupta, G. Hripcsak, R.C. Barrows, and P.D. Clayton An audit server for monitoring usage of clinical information systems 1998 American Medical Informatics Association Annual Symposium (AMIA) 1998 1002
-
(1998)
1998 American Medical Informatics Association Annual Symposium (AMIA)
, pp. 1002
-
-
Gallagher, R.J.1
Sengupta, S.2
Hripcsak, G.3
Barrows, R.C.4
Clayton, P.D.5
-
21
-
-
0036602405
-
Privacy protection of binary confidential data against deterministic, stochastic, and insider threat
-
R. Garfinkel, R.D. Gopal, and P.B. Goes Privacy protection of binary confidential data against deterministic, stochastic, and insider threat Management Science 48 2002 749 764 (Pubitemid 34799259)
-
(2002)
Management Science
, vol.48
, Issue.6
, pp. 749-764
-
-
Garfinkel, R.1
Gopal, R.2
Goes, P.3
-
22
-
-
50049104179
-
Role engineering: From design to evolution of security schemes
-
G. Goncalves, and A. Poniszewska-Maranda Role engineering: from design to evolution of security schemes Journal of Systems and Software 81 8 August 2008 1306 1326
-
(2008)
Journal of Systems and Software
, vol.81
, Issue.8
, pp. 1306-1326
-
-
Goncalves, G.1
Poniszewska-Maranda, A.2
-
23
-
-
0031373349
-
A baseline security policy for distributed healthcare information systems
-
PII S0167404897000096
-
D. Gritzalis A baseline security policy for distributed healthcare information systems Computers & Security 16 8 1997 709 719 (Pubitemid 127437031)
-
(1997)
Computers and Security
, vol.16
, Issue.8
, pp. 709-719
-
-
Gritzalis, D.1
-
28
-
-
34547798962
-
Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection
-
DOI 10.1016/j.dss.2006.04.004, PII S0167923606000625
-
J.V. Hansen, P.B. Lowry, R.D. Meservy, and D.M. McDonald Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection Decision Support Systems 43 4 2007 1362 1374 (Pubitemid 47225189)
-
(2007)
Decision Support Systems
, vol.43
, Issue.4
, pp. 1362-1374
-
-
Hansen, J.V.1
Lowry, P.B.2
Meservy, R.D.3
McDonald, D.M.4
-
30
-
-
84892366062
-
Standards for privacy of individually identifiable health information. 45 C.F.R. Parts 160 and 164
-
HIPAA Standards for privacy of individually identifiable health information. 45 C.F.R. Parts 160 and 164 Health Insurance Portability and Accountability Act (HIPAA) 2002
-
(2002)
Health Insurance Portability and Accountability Act (HIPAA)
-
-
-
32
-
-
84863273586
-
A dynamic, context-aware security infrastructure for distributed healthcare applications
-
J. Hu, and A.C. Weaver A dynamic, context-aware security infrastructure for distributed healthcare applications Proceedings of Pervasive Security, Privacy and Trust (PSPT2004), Boston, MA August 2004
-
(2004)
Proceedings of Pervasive Security, Privacy and Trust (PSPT2004), Boston, MA
-
-
Hu, J.1
Weaver, A.C.2
-
33
-
-
79960160217
-
An integrated approach for identity and access management in a SOA context
-
W. Hummer, P. Gaubatz, M. Strembeck, U. Zdun, and S. Dustdar An integrated approach for identity and access management in a SOA context Proceedings of the 16th ACM Symposium on Access Control Models and Technologies (SACMAT), Innsbruck, Austria June 2011
-
(2011)
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies (SACMAT), Innsbruck, Austria
-
-
Hummer, W.1
Gaubatz, P.2
Strembeck, M.3
Zdun, U.4
Dustdar, S.5
-
36
-
-
0034780099
-
Evaluating informatics applications - Clinical decision support systems literature review
-
DOI 10.1016/S1386-5056(01)00183-6, PII S1386505601001836
-
B. Kaplan Evaluating informatics applications - clinical decision support systems literature review International Journal of Medical Informatics 64 1 2001 15 37 (Pubitemid 32982864)
-
(2001)
International Journal of Medical Informatics
, vol.64
, Issue.1
, pp. 15-37
-
-
Kaplan, B.1
-
37
-
-
18844423005
-
A review and a framework of handheld computer adoption in healthcare
-
DOI 10.1016/j.ijmedinf.2005.03.001, PII S1386505605000201
-
Y. Lu, Y. Xiao, A. Sears, and J. Jacko A review and a framework of handheld computer adoption in healthcare International Journal of Medical Informatics 74 5 2005 409 422 (Pubitemid 40694204)
-
(2005)
International Journal of Medical Informatics
, vol.74
, Issue.5
, pp. 409-422
-
-
Lu, Y.-C.1
Xiao, Y.2
Sears, A.3
Jacko, J.A.4
-
38
-
-
34547686114
-
Partitioning knowledge bases between advanced notification and clinical decision support systems
-
DOI 10.1016/j.dss.2006.02.006, PII S0167923606000285
-
Y.A. Lussier, R. Williams, J. Li, S. Jalan, T. Borlawsky, E. Stern, and I. Kohli Partitioning knowledge bases between advanced notification and clinical decision support systems Decision Support Systems 43 4 2007 1274 1286 (Pubitemid 47223462)
-
(2007)
Decision Support Systems
, vol.43
, Issue.4
, pp. 1274-1286
-
-
Lussier, Y.A.1
Williams, R.2
Li, J.3
Jalan, S.4
Borlawsky, T.5
Stern, E.6
Kohli, I.7
-
40
-
-
38549090694
-
Stochastic protection of confidential information in databases: A hybrid of data perturbation and query restriction
-
DOI 10.1287/opre.1070.0407
-
M. Nunez, R. Garfinkel, and R.D. Gopal Stochastic protection of confidential information in statistical databases: a hybrid of query restriction and data perturbation Operations Research 55 2007 890 908 (Pubitemid 351159536)
-
(2007)
Operations Research
, vol.55
, Issue.5
, pp. 890-908
-
-
Nunez, M.A.1
Garfinkel, R.S.2
Gopal, R.D.3
-
41
-
-
38549097246
-
Precision: Privacy enhanced context-aware information fusion in ubiquitous healthcare
-
G. Pallapa, N. Roy, and S. Das Precision: privacy enhanced context-aware information fusion in ubiquitous healthcare Software Engineering for Pervasive Computing Applications, Systems, and Environments 10 2007 20 26
-
(2007)
Software Engineering for Pervasive Computing Applications, Systems, and Environments
, vol.10
, pp. 20-26
-
-
Pallapa, G.1
Roy, N.2
Das, S.3
-
44
-
-
0035230313
-
Electronic medical records: The FPM vendor survey
-
S. Rehm, and S. Kraft Electronic medical records: the FPM vendor survey Family Practice Management 8 1 2001 45 54
-
(2001)
Family Practice Management
, vol.8
, Issue.1
, pp. 45-54
-
-
Rehm, S.1
Kraft, S.2
-
45
-
-
63449110864
-
A novel use of RBAC to protect privacy in distributed health care information systems
-
R. Safavi-Naini, J. Seberry
-
J.F. Reid, I. Cheong, M.P. Henricksen, and J. Smith A novel use of RBAC to protect privacy in distributed health care information systems R. Safavi-Naini, J. Seberry, Proceedings of 8th Australasian Conference on Information Security and Privacy (ACISP 2003), Wollongong July 9-11 2003
-
(2003)
Proceedings of 8th Australasian Conference on Information Security and Privacy (ACISP 2003), Wollongong
-
-
Reid, J.F.1
Cheong, I.2
Henricksen, M.P.3
Smith, J.4
-
46
-
-
0033652039
-
-
ACM New York, NY, USA pp. 47-63
-
R. Sandhu, D. Ferraiolo, and R. Kuhn The NIST model for role-based access control: towards a unified standard, in: Proceedings of the Fifth ACM workshop on Role-based Access Control (RBAC '00) 2000 ACM New York, NY, USA pp. 47-63
-
(2000)
The NIST Model for Role-based Access Control: Towards A Unified Standard, In: Proceedings of the Fifth ACM Workshop on Role-based Access Control (RBAC '00)
-
-
Sandhu, R.1
Ferraiolo, D.2
Kuhn, R.3
-
47
-
-
17844366573
-
Analysis of end user security behaviors
-
DOI 10.1016/j.cose.2004.07.001, PII S0167404804001841
-
J. Stanton, K. Stam, P. Mastrangelo, and J. Jolton Analysis of end user security behaviors Computers & Security 2005 124 133 (Pubitemid 40583824)
-
(2005)
Computers and Security
, vol.24
, Issue.2
, pp. 124-133
-
-
Stanton, J.M.1
Stam, K.R.2
Mastrangelo, P.3
Jolton, J.4
-
48
-
-
33845574135
-
Privacy-aware autonomous agents for pervasive healthcare
-
DOI 0E89157E-07C6-4AC1-8E07-F0F0900190CC
-
M. Tentori, J. Favela, and M.D. Rodriguez Privacy-aware autonomous agents for pervasive healthcare Intelligent Systems, IEEE 21 6 2006 55 62 (Pubitemid 44936722)
-
(2006)
IEEE Intelligent Systems
, vol.21
, Issue.6
, pp. 55-62
-
-
Tentori, M.1
Favela, J.2
Rodriguez, M.D.3
-
49
-
-
24344501341
-
Access control in collaborative systems
-
DOI 10.1145/1057977.1057979
-
W. Tolone, T. Pai, G.J. Ahn, and S.P. Hong Access control in collaborative systems ACM Computing Surveys 37 1 March 2005 29 41 (Pubitemid 41246321)
-
(2005)
ACM Computing Surveys
, vol.37
, Issue.1
, pp. 29-41
-
-
Tolone, W.1
Ahn, G.-J.2
Pai, T.3
Hong, S.-P.4
-
50
-
-
33845581604
-
Secure integration of distributed medical data using mobile agents
-
DOI DED21A49-0A8A-411F-9C82-A62D23FBE85B
-
P.M. Vieira-Marques, S. Robles, J. Cucurull, R.J. Cruz-Correia, G. Navarro, and R. Marti Secure integration of distributed medical data using mobile agents Intelligent Systems, IEEE 21 6 2006 47 54 (Pubitemid 44936721)
-
(2006)
IEEE Intelligent Systems
, vol.21
, Issue.6
, pp. 47-54
-
-
Vieira-Marques, P.M.1
Cruz-Correia, R.J.2
Robles, S.3
Cucurull, J.4
Navarro, G.5
Marti, R.6
-
51
-
-
2342475711
-
Towards information security behavioural compliance
-
C. Vroom, and R. von Solms Towards information security behavioural compliance Computers & Security 23 3 2004 191 198
-
(2004)
Computers & Security
, vol.23
, Issue.3
, pp. 191-198
-
-
Vroom, C.1
Von Solms, R.2
-
52
-
-
0348209180
-
W-RBAC - A workflow security model incorporating controlled overriding of constraints
-
DOI 10.1142/S0218843003000814
-
J. Wainer, P. Barthelmess, and A. Kumar W-RBAC - a workflow security model incorporating controlled overriding of constraints International Journal of Cooperative Information Systems 12 4 2003 455 485 (Pubitemid 38000660)
-
(2003)
International Journal of Cooperative Information Systems
, vol.12
, Issue.4
, pp. 455-485
-
-
Wainer, J.1
Barthelmess, P.2
Kumar, A.3
-
53
-
-
78049461565
-
A cost-based analysis of intrusion detection system configuration under active or passive response
-
W.T. Yue, and M. ÇakanyIldIrIm A cost-based analysis of intrusion detection system configuration under active or passive response Decision Support Systems 50 1 December 2010 21 31
-
(2010)
Decision Support Systems
, vol.50
, Issue.1
, pp. 21-31
-
-
Yue, W.T.1
Çakanyildirim, M.2
-
55
-
-
78049452805
-
Security and performance in service-oriented applications: Trading off competing objectives
-
H. Zo, D.L. Nazareth, and H.K. Jain Security and performance in service-oriented applications: trading off competing objectives Decision Support Systems 50 1 2010 336 346
-
(2010)
Decision Support Systems
, vol.50
, Issue.1
, pp. 336-346
-
-
Zo, H.1
Nazareth, D.L.2
Jain, H.K.3
|