A security architecture for medical application platforms

[1]  John F. Barkley,et al.  Comparing simple role based access control models and access control lists , 1997, RBAC '97.

[2]  Insup Lee,et al.  Toward a safe integrated clinical environment: a communication security perspective , 2012, MedCOMM '12.

[3]  Stephen T. Kent,et al.  The NULL Encryption Algorithm and Its Use With IPsec , 1998, RFC.

[4]  K K Venkatasubramanian,et al.  Interoperable Medical Devices , 2010, IEEE Pulse.

[5]  Curtis R. Taylor,et al.  Understanding the security of interoperable medical devices using attack graphs , 2014, HiCoNS.

[6]  Insup Lee,et al.  Security and Interoperable-Medical-Device Systems, Part 1 , 2012, IEEE Security & Privacy.

[7]  Insup Lee,et al.  Security and Interoperable-Medical-Device Systems, Part 2: Failures, Consequences, and Classification , 2012, IEEE Security & Privacy.

[8]  Jonathan K. Millen,et al.  A resource allocation model for denial of service , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[9]  Steve Hanna,et al.  A survey of mobile malware in the wild , 2011, SPSM '11.

[10]  D. Richard Kuhn,et al.  Adding Attributes to Role-Based Access Control , 2010, Computer.

[11]  Insup Lee,et al.  Prototyping closed loop physiologic control with the medical device coordination framework , 2010, SEHC '10.

[12]  Ravi S. Sandhu,et al.  The NIST model for role-based access control: towards a unified standard , 2000, RBAC '00.

[13]  Sandy Weininger,et al.  Supporting Medical Device Adverse Event Analysis in an Interoperable Clinical Environment: Design of a Data Logging and Playback System , 2011, ICBO.

[14]  Insup Lee,et al.  Rationale and Architecture Principles for Medical Application Platforms , 2012, 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems.

[15]  Krishna K Venkatasubramanian,et al.  The chronicles of interoperability: failures, safety, and security. , 2014, Biomedical instrumentation & technology.

[16]  Srdjan Marinovic,et al.  Rumpole: a flexible break-glass access control model , 2011, SACMAT '11.

[17]  Steve Warren,et al.  An open test bed for medical device integration and coordination , 2009, 2009 31st International Conference on Software Engineering - Companion Volume.

[18]  Ravi S. Sandhu,et al.  Configuring role-based access control to enforce mandatory and discretionary access control policies , 2000, TSEC.

[19]  Bill McCarty,et al.  Selinux: NSA's Open Source Security Enhanced Linux , 2004 .