Checking and Enforcing Security Through Opacity in Healthcare Applications.
Rym ZrelliMoez YeddesNejib Ben Hadj-AlouanePublished in: ICSOC Workshops (2017)
Keyphrases
- information security
- information assurance
- information systems
- security problems
- security issues
- intrusion detection
- information technology
- security measures
- security requirements
- security level
- security policies
- access control
- human operators
- key management
- cyber security
- security model
- medical information
- malware detection
- database
- security management
- security threats
- risk assessment
- network security