Detecting anomalous insiders in collaborative information systems

Y Chen, S Nyemba, B Malin - IEEE transactions on dependable …, 2012 - ieeexplore.ieee.org
Collaborative information systems (CISs) are deployed within a diverse array of
environments that manage sensitive information. Current security mechanisms detect insider …

Safety risks associated with the lack of integration and interfacing of hospital health information technologies: a qualitative study of hospital electronic prescribing …

KM Cresswell, H Mozaffar, L Lee… - BMJ Quality & …, 2017 - qualitysafety.bmj.com
Background Substantial sums of money are being invested worldwide in health information
technology. Realising benefits and mitigating safety risks is however highly dependent on …

[HTML][HTML] Experience-based access management: A life-cycle framework for identity and access management systems

CA Gunter, D Liebovitz, B Malin - IEEE security & privacy, 2011 - ncbi.nlm.nih.gov
Experience-Based Access Management - PMC Back to Top Skip to main content NIH NLM Logo
Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation Preview …

An approach to access control under uncertainty

F Salim, J Reid, E Dawson… - 2011 Sixth International …, 2011 - ieeexplore.ieee.org
In dynamic and uncertain environments such as healthcare, where the needs of security and
information availability are difficult to balance, an access control approach based on a static …

Towards the cyber security paradigm of ehealth: Resilience and design aspects

J Rajamäki, R Pirinen - AIP Conference Proceedings, 2017 - pubs.aip.org
Digital technologies have significantly changed the role of healthcare clients in seeNing and
receiving medical help, as well as brought up more cooperative policy issues in healthcare …

Budget-aware role based access control

F Salim, J Reid, U Dulleck, E Dawson - Computers & Security, 2013 - Elsevier
The suitability of Role Based Access Control (RBAC) is being challenged in dynamic
environments like healthcare. In an RBAC system, a user's legitimate access may be denied …

[PDF][PDF] Towards Risk-aware Access Control Framework for Healthcare Information Sharing.

M Abomhara, GM Køien, VA Oleshchuk… - ICISSP, 2018 - pdfs.semanticscholar.org
Access control models play an important role in the response to insider threats such as
misuse and unauthorized disclosure of the electronic health records (EHRs). In our previous …

[PDF][PDF] Building a smarter health and wellness future: privacy and security challenges

C Gunter - ICT and the Health Sector: Towards Smarter Health …, 2013 - seclab.illinois.edu
Advances in information technology (IT) promise to improve health and wellness by holding
and managing detailed and precise records related to diagnoses and treatments and …

Sharing with care-multidisciplinary teams and secure access to electronic health records

MAS Abomhara, B Smaradottir, GM Køien… - Proceedings of the …, 2018 - uia.brage.unit.no
Ensuring patient privacy and improving patient care quality are two of the most significant
challenges faced by healthcare systems around the world. This paper describes the …

Approaches to access control under uncertainty

F Salim - 2012 - eprints.qut.edu.au
The ultimate goal of an access control system is to allocate each user the precise level of
access they need to complete their job-no more and no less. This proves to be challenging …