Reusable security requirements for healthcare applications

被引:0
|
作者
Jensen, Jostein [1 ]
Toøndel, Inger Anne [1 ]
Jaatun, Martin Gilje [1 ]
Meland, Per Håkon [1 ]
Andresen, Herbjørn [2 ]
机构
[1] SINTEF ICT, Department of Software, Engineering Safety and Security, Norway
[2] University of Oslo, Faculty of Law, Norwegian Research Center for Computers and Law, Norway
来源
Proceedings - International Conference on Availability, Reliability and Security, ARES 2009 | 2009年
关键词
Compendex;
D O I
5066498
中图分类号
学科分类号
摘要
Health care
引用
收藏
页码:380 / 385
相关论文
共 50 条
  • [41] Analysis of Key Critical Requirements for Enhancing Security of Web Applications
    Kumar, R.
    2015 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, AND SYSTEMS (ICCCS), 2015, : 241 - 245
  • [42] Security Requirements and Challenges of 6G Technologies and Applications
    Hakeem, Shimaa A. Abdel
    Hussein, Hanan H.
    Kim, HyungWon
    SENSORS, 2022, 22 (05)
  • [43] A Security Requirements Library for the Development of Internet of Things (IoT) Applications
    Kamalrudin, Massila
    Ibrahim, Asma Asdayana
    Sidek, Safiah
    REQUIREMENTS ENGINEERING FOR INTERNET OF THINGS, 2018, 809 : 87 - 96
  • [44] Defining Security Requirements With the Common Criteria: Applications, Adoptions, and Challenges
    Sun, Nan
    Li, Chang-Tsun
    Chan, Hin
    Le, Ba Dung
    Islam, Md Zahidul
    Zhang, Leo Yu
    Islam, Md Rafiqul
    Armstrong, Warren
    IEEE ACCESS, 2022, 10 : 44756 - 44777
  • [45] Adapting Compliance of Security Requirements in Multi-Tenant Applications
    Alqahtani, Sarra
    He, Xinchi
    Gamble, Rose
    2017 IEEE 2ND INTERNATIONAL WORKSHOPS ON FOUNDATIONS AND APPLICATIONS OF SELF* SYSTEMS (FAS*W), 2017, : 122 - 129
  • [46] A Study of Security Requirements in Wireless Sensor Networks for Smart Home Healthcare Systems
    Alami, Ahlam
    Benhlima, Laila
    Bah, Slimane
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON SMART CITY APPLICATIONS (SCA'18), 2018,
  • [47] Security Policy and Requirements from the Healthcare Insurance Portability and Accountability ACT of 1996
    Korn, L
    TOWARD AN ELECTRONIC PATIENT RECORD '97 - CONFERENCE AND EXPOSITION, PROCEEDINGS, VOLS 1-3, 1997, : A136 - A136
  • [48] Security Requirements for the Medical Information Used by U-Healthcare Medical Equipment
    Son, Jaebum
    Kim, Soonseok
    Park, Gilhong
    Cha, Jihun
    Park, Kijung
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (01): : 169 - 180
  • [49] Understanding Data Flow and Security Requirements in Wireless Body Area Networks for Healthcare
    Salehi, Ahmad S.
    Camtepe, Seyit
    Jayalath, Dhammika
    2015 17TH INTERNATIONAL CONFERENCE ON E-HEALTH NETWORKING, APPLICATION & SERVICES (HEALTHCOM), 2015, : 621 - 626
  • [50] CincoSecurity: A Reusable Security Module Based on Fine Grained Roles and Security Profiles for Java']Java EE Applications
    Consuelo Franky, Maria
    Manuel Toro C, Victor
    PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE ON INTERNET AND WEB APPLICATIONS AND SERVICES (ICIW 2011), 2011, : 118 - 123