Modifying without a trace: general audit guidelines are inadequate for open-source electronic health record audit mechanisms
暂无分享,去创建一个
Laurie A. Williams | Jason Tyler King | Ben H. Smith | L. Williams | Benjamin H. Smith | J. King | Benjamin H. Smith
[1] Dawn M. Cappelli,et al. The "Big Picture" of Insider IT Sabotage Across U.S. Critical Infrastructures , 2008, Insider Attack and Cyber Security.
[2] Gunnar Peterson,et al. Logging in the Age of Web Services , 2009, IEEE Security & Privacy.
[3] Ben Smith. Systematizing security test case planning using functional requirements phrases , 2011, 2011 33rd International Conference on Software Engineering (ICSE).
[4] Norman Chonacky. Staking New Ground , 2005, Comput. Sci. Eng..
[5] Karen Kent,et al. Guide to Computer Security Log Management , 2006 .
[6] Laurie Williams,et al. Systematizing Security Test Planning Using Functional Requirements Phrases , 2011 .
[7] A Min Tjoa,et al. Towards More Trustable Log Files for Digital Forensics by Means of “Trusted Computing” , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[8] Fred B. Schneider. Accountability for Perfection , 2009, IEEE Secur. Priv..
[9] P.D. Dixon,et al. An overview of computer forensics , 2005, IEEE Potentials.
[10] Santosh K. Shrivastava,et al. Implementing fair non-repudiable interactions with Web services , 2005, Ninth IEEE International EDOC Enterprise Computing Conference (EDOC'05).