Meeting EHR Security Requirements: SeAAS Approach.
Basel KattThomas TrojerRuth BreuThomas SchabetsbergerFlorian WozakPublished in: EFMI-STC (2010)
Keyphrases
- security requirements
- electronic health records
- security analysis
- smart card
- information security
- security problems
- security mechanisms
- security concerns
- security policies
- security properties
- mobile commerce
- software architecture
- security model
- access control
- reference models
- security patterns
- covert channel
- security protocols
- requirements engineering
- data processing
- development lifecycle
- secure electronic