Understanding and Mitigating Security Risks of Network on Medical Cyber Physical System
暂无分享,去创建一个
Dengguo Feng | Liang Cheng | Zhangtan Li | Yang Zhang | D. Feng | Liang Cheng | Yang Zhang | Zhangtan Li
[1] James Joshi,et al. A constraint and risk-aware approach to attribute-based access control for cyber-physical systems , 2020, Comput. Secur..
[2] Md. Atiqur Rahman Ahad,et al. Security Analysis and a Potential Layer to Layer Security Solution of Medical Cyber-Physical Systems , 2019, A Handbook of Internet of Things in Biomedical and Cyber Physical System.
[3] Robert H. Deng,et al. Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control , 2018, IEEE Internet of Things Journal.
[4] Lui Sha,et al. Data-Centered Runtime Verification of Wireless Medical Cyber-Physical System , 2017, IEEE Transactions on Industrial Informatics.
[5] Eugene Y. Vasserman,et al. A Flexible Authorization Architecture for Systems of Interoperable Medical Devices , 2017, SACMAT.
[6] Insup Lee,et al. Security and Interoperable-Medical-Device Systems, Part 1 , 2012, IEEE Security & Privacy.
[7] Insup Lee,et al. Challenges and Research Directions in Medical Cyber–Physical Systems , 2012, Proceedings of the IEEE.
[8] Insup Lee,et al. Prototyping closed loop physiologic control with the medical device coordination framework , 2010, SEHC '10.
[9] Jaehong Park,et al. The UCONABC usage control model , 2004, TSEC.