Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/2696523guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
HealthTech'13: Proceedings of the 2013 USENIX conference on Safety, Security, Privacy and Interoperability of Health Information Technologies
2013 Proceeding
Publisher:
  • USENIX Association
  • 2560 Ninth St. Suite 215 Berkeley, CA
  • United States
Conference:
Washington DC 12 August 2013
Published:
12 August 2013
Sponsors:
SHARPS, CODENOMICON, AAMI, Microsoft Research

Reflects downloads up to 21 Dec 2024Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
Article
Privacy-preserving computation of disease risk by using genomic, clinical, and environmental data
Page 1

According to many scientists and clinicians, genomics is the "next big thing" in the field of medicine. On one hand, decreasing costs in genome sequencing has been paving the way to better preventive and personalized medicine. On the other hand, genomic ...

Article
Understanding the challenges with medical data segmentation for privacy
Page 2

Electronic Health Records (EHRs) are perceived as a path to significant improvement in healthcare, and patient privacy is an important consideration in the adoption of EHRs. Medical record segmentation is a technique to provide privacy and protect ...

Article
Privacy aspects of health related information sharing in online social networks
Page 3

Online social networks (OSNs) have formed virtual social networks where people meet and share information. Among all shared information, health related information (HRI) has received considerable attention from researchers and individual users. While ...

Article
Cataloging and comparing logging mechanism specifications for electronic health record systems
Page 4

Electronic health record (EHR) systems must log all transactions with protected health information (PHI) to deter unauthorized behavior and prevent users from denying that they created, read, updated, or deleted PHI. However, a plethora of ...

Article
Electronic prescription for controlled substances: a cybersecurity perspective
Page 5

The Electronic Prescription for Controlled Substances (EPCS) is a set of rules published by the Drug Enforcement Administration (DEA) that regulates implementations of electronic prescription systems for controlled substances [1]. EPCS includes ...

Article
Requirements and design for an extensible toolkit for analyzing EMR audit logs
Page 6

Over the past decade, various regulations have been proposed and promulgated to support the auditing of accesses to Electronic Medical Record (EMRs). Current tools to support this process can improve their use of statistical and machine learning ...

Article
Capability exchange: improving access control usability in health IT
Page 7

Clinicians report usability problems in modern health IT systems in part because the strictness of computerization eliminates the layer of informality which previously enabled them to get their jobs done. In this paper, we examine a solution by ...

Article
Using bowel sounds to create a forensically-aware insulin pump system
Page 8

Patients are increasingly reliant on implantable medical device systems today. For patients with diabetes, an implantable insulin pump system can greatly improve their quality of life. As with any device, these devices can and do suffer from software ...

Article
WattsUpDoc: power side channels to nonintrusively discover untargeted malware on embedded medical devices
Page 9

Medical devices based on embedded systems are ubiquitous in clinical settings. Increasingly, they connect to networks and run off-the-shelf operating systems vulnerable to malware. But strict validation requirements make it prohibitively difficult or ...

Contributors
  • University of Michigan, Ann Arbor
  • California Polytechnic State University, San Luis Obispo
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations