Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Medical services
biblio
Blockchain: Solving the Privacy and Research Availability Tradeoff for EHR Data: A New Disruptive Technology in Health Data Management
Submitted by grigby1 on Wed, 11/14/2018 - 1:19pm
policy maker institutions
health system developers
Human Factors
law regulations
lifelong recorded patient health data
Medical services
multisignature data access
patient data
patient privacy
Health information ecosystem
policy makers
population health management
privacy
privacy data
protective principles
pubcrawl
Scalability
secure data storing
defensive data hiding attitude
blockchain
blockchain technology
Business
cryptographically secured data storage
Cryptography
data availability
data privacy
data structures
American HIPAA regulation
disruptive technology
EHR
EHR data
electronic health records
ethical problems
expert systems
health data management
Health data storage
biblio
Context-Based Security and Privacy for Healthcare IoT
Submitted by grigby1 on Wed, 11/14/2018 - 1:18pm
patient-centric information
Human Factors
information collection
information sharing
Internet of Things
large scale connectivity
medical devices
medical information systems
Medical services
nursing staff
HIoT
physicians
privacy
pubcrawl
Real-time monitoring
regulatory compliance
Scalability
security
sensors
timely treatment
data privacy
Access controls
actuators
authorisation
Big Data
clinical staff
Context
context-based privacy
context-based security
context-sensitive role-based access control scheme
Access Control
expert systems
health care
health status
healthcare industry
healthcare innovation
healthcare Internet of things
healthcare IoT
healthcare knowledge
biblio
AZSPM: Autonomic Zero-Knowledge Security Provisioning Model for Medical Control Systems in Fog Computing Environments
Submitted by grigby1 on Fri, 10/26/2018 - 4:46pm
mobile computing
healthcare facilities
healthcare information system environment
high-profile attacks
medical control systems
medical data
medical devices
medical information systems
Medical services
healthcare cloud-lets
mobile services
Protocols
pubcrawl
Resiliency
Scalability
security
security of data
Service Provisioning
edge computing
autonomic zero-knowledge security provisioning model
AZSPM
Cloud Computing
cloud-based solutions
cloud-hoarding
Computational modeling
cyber security
different healthcare enterprises
atomic security components
Fog computing
FOG computing environment
fog environments
fog security administration
fully sand boxed environment
health care
health informatics industry
Health Information Systems
biblio
A trust-based security enforcement in disruption-tolerant networks
Submitted by grigby1 on Thu, 08/23/2018 - 11:44am
security enforcement
mobile computing
network participants
Peer-to-peer computing
privacy
pubcrawl
Routing protocols
security
security credentials
Medical services
security of data
subjective logic
telecommunication security
trust model
trust-based security enforcement
Trusted Computing
uncertainty
web of trust
delay tolerant networks
authentication
authorisation
central trusted entity
centralised trusted authorities
composability
Compositionality
computational intelligence
Cryptography
attribute-based access control
Delay-tolerant networks
delays
disruption- and delay-tolerant networks
disruption-tolerant networks
DTN
high packet drop rates
long delays
biblio
How Good Is a Security Policy against Real Breaches? A HIPAA Case Study
Submitted by grigby1 on Mon, 04/30/2018 - 3:26pm
security breaches
US Health Insurance Portability and Accountability Act
US Department of Health and Human Services
taxonomy
software engineering
software development
social norms
SEMAVER
Semantics
semantic similarity metric
semantic similarity
semantic reasoning
security policies
security of data
accidental misuses
Security and privacy breaches
security
pubcrawl
Ontologies
norm violation
Medical services
Measurement
malicious misuses
inference mechanisms
HIPAA
HHS
cognition
breach ontology
biblio
Secure Lightweight Context-Driven Data Logging for Bodyworn Sensing Devices
Submitted by grigby1 on Mon, 04/02/2018 - 12:55pm
Scalability
medical domain
Medical services
Monitoring
privacy
pubcrawl
recording
resilience
Resiliency
Medical diagnostic imaging
secure lightweight context-driven data logging
sensor medical data storage
sensor placement
sensors
timestamping
wearable technology
wearables security
Biomedical monitoring
medical computing
Logic gates
localization
Human behavior
Forensics
Digital Forensics
data structures
data handling
data fingerprint storage
contextual information security
chronological epoch-level blocks
bodyworn sensing devices
body sensor networks
Bloom filters
blockchain
biblio
Complexity of Cyber Security Architecture for IoT Healthcare Industry: A Comparative Study
Submitted by grigby1 on Mon, 04/02/2018 - 12:55pm
Scalability
patient personal information
patient wellness information
personal health
privacy
pubcrawl
Read only memory
resilience
Resiliency
Medical services
security of data
Wearable devices
wearable IoT healthcare applications
wearables security
XC7Z030 - 3fbg676 FPGA device
Xilinx IP cores
Xilinx Zynq-7000
Healthcare
Algorithm design and analysis
Complexity theory
Cyber Attacks
cyber security architecture
Cyber-security
encryption
field programmable gate arrays
health care
AES
Human behavior
Internet of Things
IoT
IoT based healthcare devices
IoT healthcare industry
IP networks
medical information systems
biblio
Security Attacks on Information Centric Networking for Healthcare System
Submitted by grigby1 on Mon, 03/19/2018 - 1:49pm
Medical services
wireless sensor networks
security of data
security framework
security attack
security
Resiliency
resilience
pubcrawl
Protocols
patient monitoring
patient health condition monitoring
Monitoring
Metrics
actuator security
medical information systems
IP networks
Internet of Things
internet
information centric networking
ICN
Human behavior
healthcare system
health care system
health care
e-healthcare monitoring service
composability
biomedical data communication security
biblio
A Communication Security Protocol for Ubiquitous Sensor Networks
Submitted by grigby1 on Tue, 02/06/2018 - 1:54pm
Metrics
wireless sensor networks
ubiquitous sensor networks
ubiquitous network system
Ubiquitous Computing Security
ubiquitous computing
telecommunication security
security
Scalability
Resiliency
Public key
pubcrawl
Protocols
privacy
Access Credential
Medical services
Logic gates
key exchange computation process
information technology
Human Factors
Human behavior
gateway
Cryptography
cryptographic access
communication security protocol
communication protocol
cipher content
authentication
biblio
FairTest: Discovering Unwarranted Associations in Data-Driven Applications
Submitted by K_Hooper on Fri, 02/02/2018 - 11:02am
machine learning algorithms
Algorithmic Fairness
algorithmic fairness formalization
Computer bugs
data analysis
Data collection
data privacy
data-driven applications
debugging capabilities
Decision Making
decision-making
fairness metrics
FairTest
Google
unwarranted association discovery
Measurement
Medical services
Metrics
Predictive Metrics
program debugging
pubcrawl
sensitive user attributes
software tools
Statistics
Systems
testing
tools
UA framework
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
next ›
last »