Detecting anomalous insiders in collaborative information systems
Collaborative information systems (CISs) are deployed within a diverse array of
environments that manage sensitive information. Current security mechanisms detect insider …
environments that manage sensitive information. Current security mechanisms detect insider …
Safety risks associated with the lack of integration and interfacing of hospital health information technologies: a qualitative study of hospital electronic prescribing …
KM Cresswell, H Mozaffar, L Lee… - BMJ Quality & …, 2017 - qualitysafety.bmj.com
Background Substantial sums of money are being invested worldwide in health information
technology. Realising benefits and mitigating safety risks is however highly dependent on …
technology. Realising benefits and mitigating safety risks is however highly dependent on …
[HTML][HTML] Experience-based access management: A life-cycle framework for identity and access management systems
Experience-Based Access Management - PMC Back to Top Skip to main content NIH NLM Logo
Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation Preview …
Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation Preview …
An approach to access control under uncertainty
In dynamic and uncertain environments such as healthcare, where the needs of security and
information availability are difficult to balance, an access control approach based on a static …
information availability are difficult to balance, an access control approach based on a static …
Towards the cyber security paradigm of ehealth: Resilience and design aspects
J Rajamäki, R Pirinen - AIP Conference Proceedings, 2017 - pubs.aip.org
Digital technologies have significantly changed the role of healthcare clients in seeNing and
receiving medical help, as well as brought up more cooperative policy issues in healthcare …
receiving medical help, as well as brought up more cooperative policy issues in healthcare …
Budget-aware role based access control
The suitability of Role Based Access Control (RBAC) is being challenged in dynamic
environments like healthcare. In an RBAC system, a user's legitimate access may be denied …
environments like healthcare. In an RBAC system, a user's legitimate access may be denied …
[PDF][PDF] Towards Risk-aware Access Control Framework for Healthcare Information Sharing.
Access control models play an important role in the response to insider threats such as
misuse and unauthorized disclosure of the electronic health records (EHRs). In our previous …
misuse and unauthorized disclosure of the electronic health records (EHRs). In our previous …
[PDF][PDF] Building a smarter health and wellness future: privacy and security challenges
C Gunter - ICT and the Health Sector: Towards Smarter Health …, 2013 - seclab.illinois.edu
Advances in information technology (IT) promise to improve health and wellness by holding
and managing detailed and precise records related to diagnoses and treatments and …
and managing detailed and precise records related to diagnoses and treatments and …
Sharing with care-multidisciplinary teams and secure access to electronic health records
Ensuring patient privacy and improving patient care quality are two of the most significant
challenges faced by healthcare systems around the world. This paper describes the …
challenges faced by healthcare systems around the world. This paper describes the …
Approaches to access control under uncertainty
F Salim - 2012 - eprints.qut.edu.au
The ultimate goal of an access control system is to allocate each user the precise level of
access they need to complete their job-no more and no less. This proves to be challenging …
access they need to complete their job-no more and no less. This proves to be challenging …