[HTML][HTML] Security and privacy issues in implantable medical devices: A comprehensive survey
Bioengineering is a field in expansion. New technologies are appearing to provide a more
efficient treatment of diseases or human deficiencies. Implantable Medical Devices (IMDs) …
efficient treatment of diseases or human deficiencies. Implantable Medical Devices (IMDs) …
Accountable algorithms
JA Kroll - 2015 - search.proquest.com
Important decisions about people are increasingly made by algorithms: Votes are counted;
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …
Data driven: truckers, technology, and the new workplace surveillance
K Levy - 2022 - torrossa.com
Data Driven Page 1 Page 2 DATA DRIVEN Page 3 Page 4 Data Driven Truckers, Technology,
and the New Workplace Surveillance Karen Levy PRINCE TON UNIVERSITY PRESS PRINCE …
and the New Workplace Surveillance Karen Levy PRINCE TON UNIVERSITY PRESS PRINCE …
Information security and privacy in healthcare: current state of research
A Appari, ME Johnson - International journal of Internet and …, 2010 - inderscienceonline.com
Information security and privacy in the healthcare sector is an issue of growing importance.
The adoption of digital patient records, increased regulation, provider consolidation and the …
The adoption of digital patient records, increased regulation, provider consolidation and the …
Advances on networked ehealth information access and sharing: Status, challenges and prospects
Abstarct Internet of Medical Things (IoMT) is no longer a futuristic technology and has
become a day-to-day reality with the increasing ease of availing modern internet services …
become a day-to-day reality with the increasing ease of availing modern internet services …
Managing patient consent in a master patient index
J Crapo, DM Coyle, CL Owen, P Pearson… - US Patent …, 2015 - Google Patents
A system and method for managing patient consent. A data access manager includes a
controller, a lookup module, a clinical authorization engine, a logging/auditing unit, a user …
controller, a lookup module, a clinical authorization engine, a logging/auditing unit, a user …
Security tradeoffs in cyber physical systems: A case study survey on implantable medical devices
R AlTawy, AM Youssef - Ieee Access, 2016 - ieeexplore.ieee.org
The new culture of networked systems that offer everywhere accessible services has given
rise to various types of security tradeoffs. In fact, with the evolution of physical systems that …
rise to various types of security tradeoffs. In fact, with the evolution of physical systems that …
Defending resource depletion attacks on implantable medical devices
Implantable Medical Devices (IMDs) have been widely used to treat chronic diseases such
as cardiac arrhythmia and diabetes. Many IMDs are enabled with wireless communication …
as cardiac arrhythmia and diabetes. Many IMDs are enabled with wireless communication …
[PDF][PDF] Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security.
A fundamental tension exists between safety in the common case and security under
adversarial conditions for wireless implantable medical devices. We propose a class of new …
adversarial conditions for wireless implantable medical devices. We propose a class of new …
Extending access control models with break-glass
AD Brucker, H Petritsch - Proceedings of the 14th ACM symposium on …, 2009 - dl.acm.org
Access control models are usually static, ie, permissions are granted based on a policy that
only changes seldom. Especially for scenarios in health care and disaster management, a …
only changes seldom. Especially for scenarios in health care and disaster management, a …