[HTML][HTML] Security and privacy issues in implantable medical devices: A comprehensive survey

C Camara, P Peris-Lopez, JE Tapiador - Journal of biomedical informatics, 2015 - Elsevier
Bioengineering is a field in expansion. New technologies are appearing to provide a more
efficient treatment of diseases or human deficiencies. Implantable Medical Devices (IMDs) …

Accountable algorithms

JA Kroll - 2015 - search.proquest.com
Important decisions about people are increasingly made by algorithms: Votes are counted;
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …

Data driven: truckers, technology, and the new workplace surveillance

K Levy - 2022 - torrossa.com
Data Driven Page 1 Page 2 DATA DRIVEN Page 3 Page 4 Data Driven Truckers, Technology,
and the New Workplace Surveillance Karen Levy PRINCE TON UNIVERSITY PRESS PRINCE …

Information security and privacy in healthcare: current state of research

A Appari, ME Johnson - International journal of Internet and …, 2010 - inderscienceonline.com
Information security and privacy in the healthcare sector is an issue of growing importance.
The adoption of digital patient records, increased regulation, provider consolidation and the …

Advances on networked ehealth information access and sharing: Status, challenges and prospects

VJ Aski, VS Dhaka, S Kumar, S Verma, DB Rawat - Computer networks, 2022 - Elsevier
Abstarct Internet of Medical Things (IoMT) is no longer a futuristic technology and has
become a day-to-day reality with the increasing ease of availing modern internet services …

Managing patient consent in a master patient index

J Crapo, DM Coyle, CL Owen, P Pearson… - US Patent …, 2015 - Google Patents
A system and method for managing patient consent. A data access manager includes a
controller, a lookup module, a clinical authorization engine, a logging/auditing unit, a user …

Security tradeoffs in cyber physical systems: A case study survey on implantable medical devices

R AlTawy, AM Youssef - Ieee Access, 2016 - ieeexplore.ieee.org
The new culture of networked systems that offer everywhere accessible services has given
rise to various types of security tradeoffs. In fact, with the evolution of physical systems that …

Defending resource depletion attacks on implantable medical devices

X Hei, X Du, J Wu, F Hu - 2010 IEEE global …, 2010 - ieeexplore.ieee.org
Implantable Medical Devices (IMDs) have been widely used to treat chronic diseases such
as cardiac arrhythmia and diabetes. Many IMDs are enabled with wireless communication …

[PDF][PDF] Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security.

T Denning, K Fu, T Kohno - HotSec, 2008 - usenix.org
A fundamental tension exists between safety in the common case and security under
adversarial conditions for wireless implantable medical devices. We propose a class of new …

Extending access control models with break-glass

AD Brucker, H Petritsch - Proceedings of the 14th ACM symposium on …, 2009 - dl.acm.org
Access control models are usually static, ie, permissions are granted based on a policy that
only changes seldom. Especially for scenarios in health care and disaster management, a …