The Community for Technology Leaders
Green Image
Issue No. 06 - Nov.-Dec. (vol. 11)
ISSN: 1540-7993

Front Cover (PDF)

pp. c1

Table of Contents (PDF)

pp. 1-2

Focus on Policy (HTML)

Shari Lawrence Pfleeger , Dartmouth College
pp. 3

[Masthead] (PDF)

pp. 4

Security and Privacy in Health IT [Guest editors' introduction] (HTML)

Kelly Caine , Clemson University
Michael Lesk , Rutgers University
pp. 10-11

Nonconfidential Patient Types in Emergency Clinical Decision Support (Abstract)

Mark Chignell , University of Toronto
Mahsa Rouzbahman , University of Toronto
Ryan Kealey , University of Toronto
Reza Samavi , University of Toronto
Erin Yu , Canadian Imperial Bank of Commerce
Tammy Sieminowski , Bridgepoint Hospital in Toronto
pp. 12-18

Securing Information Technology in Healthcare (Abstract)

Denise Anthony , Dartmouth College
Andrew T. Campbell , Dartmouth College
Thomas Candon , Dartmouth College
Andrew Gettinger , Dartmouth College
David Kotz , Dartmouth College
Lisa A. Marsch , Dartmouth College
Andres Molina-Markham , Dartmouth College
Karen Page , Dartmouth College
Sean W. Smith , Dartmouth College
Carl A. Gunter , University of Illinois
M. Eric Johnson , Vanderbilt University
pp. 25-33

Identity Management--In Privacy We Trust: Bridging the Trust Gap in eHealth Environments (Abstract)

Gines Dolera Tormo , NEC Laboratories Europe
Felix Gomez Marmol , NEC Laboratories Europe
Joao Girao , NEC Laboratories Europe
Gregorio Martinez Perez , University of Murcia
pp. 34-41

Point/Counterpoint (Abstract)

Deborah C. Peel , Patient Privacy Rights
Deven McGraw , Center for Democracy & Technology
pp. 42-44

Real-time detection of intrusive traffic in QoS network domains (Abstract)

Abdulghani Ali Ahmed , Universiti Sains Malaysia
Aman Jantan , Universiti Sains Malaysia
Tat-Chee Wan , Universiti Sains Malaysia
pp. 45-53

Automatic attack signature generation systems: A review (Abstract)

Sanmeet Kaur , Thapar University Patiala, India
Maninder Singh , Thapar University Patiala, India
pp. 54-61

E-biobanking: What Have You Done to My Cell Samples? (Abstract)

Paulo Esteves Verissimo , University of Lisbon
Alysson Bessani , University of Lisbon
pp. 62-65

Toward Effective Cybersecurity Education (Abstract)

Andrew McGettrick , University of Strathclyde
pp. 66-68

Stranger Visions: A Provocation (Abstract)

Heather Dewey-Hagborg , Rensselaer Polytechnic Institute
pp. 69-70

Communicating Covertly through CPU Monitoring (Abstract)

Jean-Michel Cioranesco , Panthéon-Assas University
Houda Ferradi , Paris VII University and École normale supérieure
David Naccache , Paris VII University and École normale supérieure
pp. 71-73

Big Data Analytics for Security (Abstract)

Alvaro A. Cardenas , University of Texas at Dallas
Sreeranga P. Rajan , Fujitsu Laboratories of America
pp. 74-76

The Old Is New Again (Abstract)

Michael Lesk , Rutgers University
pp. 77-79

Building Security In: Preparing for a Software Security Career (Abstract)

Nancy R. Mead , Carnegie Mellon University Software Engineering Institute
Thomas B. Hilburn , Embry-Riddle Aeronautical University
pp. 80-83

Everyday Security: Default to Decency (Abstract)

Harvey Molotch , New York University
pp. 84-87

Walls and Gates (HTML)

Steven M. Bellovin , Columbia University
pp. 88

Magazine Subscribe (PDF)

pp. c4
89 ms
(Ver 3.3 (11022016))