A security architecture for medical application platforms
暂无分享,去创建一个
[1] John F. Barkley,et al. Comparing simple role based access control models and access control lists , 1997, RBAC '97.
[2] Insup Lee,et al. Toward a safe integrated clinical environment: a communication security perspective , 2012, MedCOMM '12.
[3] Stephen T. Kent,et al. The NULL Encryption Algorithm and Its Use With IPsec , 1998, RFC.
[4] K K Venkatasubramanian,et al. Interoperable Medical Devices , 2010, IEEE Pulse.
[5] Curtis R. Taylor,et al. Understanding the security of interoperable medical devices using attack graphs , 2014, HiCoNS.
[6] Insup Lee,et al. Security and Interoperable-Medical-Device Systems, Part 1 , 2012, IEEE Security & Privacy.
[7] Insup Lee,et al. Security and Interoperable-Medical-Device Systems, Part 2: Failures, Consequences, and Classification , 2012, IEEE Security & Privacy.
[8] Jonathan K. Millen,et al. A resource allocation model for denial of service , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[9] Steve Hanna,et al. A survey of mobile malware in the wild , 2011, SPSM '11.
[10] D. Richard Kuhn,et al. Adding Attributes to Role-Based Access Control , 2010, Computer.
[11] Insup Lee,et al. Prototyping closed loop physiologic control with the medical device coordination framework , 2010, SEHC '10.
[12] Ravi S. Sandhu,et al. The NIST model for role-based access control: towards a unified standard , 2000, RBAC '00.
[13] Sandy Weininger,et al. Supporting Medical Device Adverse Event Analysis in an Interoperable Clinical Environment: Design of a Data Logging and Playback System , 2011, ICBO.
[14] Insup Lee,et al. Rationale and Architecture Principles for Medical Application Platforms , 2012, 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems.
[15] Krishna K Venkatasubramanian,et al. The chronicles of interoperability: failures, safety, and security. , 2014, Biomedical instrumentation & technology.
[16] Srdjan Marinovic,et al. Rumpole: a flexible break-glass access control model , 2011, SACMAT '11.
[17] Steve Warren,et al. An open test bed for medical device integration and coordination , 2009, 2009 31st International Conference on Software Engineering - Companion Volume.
[18] Ravi S. Sandhu,et al. Configuring role-based access control to enforce mandatory and discretionary access control policies , 2000, TSEC.
[19] Bill McCarty,et al. Selinux: NSA's Open Source Security Enhanced Linux , 2004 .