Challenges for protecting the privacy of health information: required certification can leave common vulnerabilities undetected
暂无分享,去创建一个
Andrew Meneely | Laurie Williams | Andrew Austin | Ben Smith | Matt Brown | Jason T. King | Jerrod Lankford | L. Williams | Andrew Meneely | J. King | Andrew Austin | Benjamin H. Smith | Matt Brown | Jerrod Lankford
[1] Mordechai Ben-Menachem,et al. Writing effective use cases , 2001, SOEN.
[2] Establishment of the temporary certification program for health information technology. Final rule. , 2010, Federal register.
[3] Alessandro Orso,et al. AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks , 2005, ASE.
[4] Zhendong Su,et al. Static detection of cross-site scripting vulnerabilities , 2008, 2008 ACM/IEEE 30th International Conference on Software Engineering.
[5] Dan S. Wallach,et al. Analysis of an electronic voting system , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[6] Annie I. Antón,et al. An Empirical Study of Consumer Perceptions and Comprehension of Web Site Privacy Policies , 2008, IEEE Transactions on Engineering Management.
[7] Andreas L. Opdahl,et al. Eliciting security requirements with misuse cases , 2004, Requirements Engineering.
[8] Kevin Fu,et al. Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[9] Dawn M. Cappelli,et al. The "Big Picture" of Insider IT Sabotage Across U.S. Critical Infrastructures , 2008, Insider Attack and Cyber Security.
[10] Gary McGraw,et al. Software Security Testing , 2004, IEEE Secur. Priv..
[11] Era moderna até. Health Insurance Portability and Accountability Act , 2011 .
[12] Gary McGraw,et al. Software Security: Building Security In , 2006, 2006 17th International Symposium on Software Reliability Engineering.
[13] Laurie A. Williams,et al. Towards improved security criteria for certification of electronic health record systems , 2010, SEHC '10.
[14] Lynda L. McGhie. Health Insurance Portability and Accountability Act Security Rule , 2007, Information Security Management Handbook, 6th ed..
[15] Joanne R Lax,et al. The modified HIPAA Privacy Rule. Health Insurance Portability and Accountability Act. , 2002, Optometry.
[16] John R. Vacca,et al. Defense in Depth: Firewall Topologies , 2005 .
[17] Steven M. Bellovin. Security by Checklist , 2008, IEEE Security & Privacy Magazine.
[18] M S Pritchard. Doing the Minimum , 2001, Science and engineering ethics.