Securing Information Technology in Healthcare

Securing Information Technology in Healthcare
Denise Anthony, Andrew T. Campbell, Thomas Candon, Andrew Gettinger, David Kotz, Lisa A. Marsch, Andres Molina-Markham, Karen Page, Sean Smith, Carl A. Gunter, and M. Eric Johnson
IEEE Security & Privacy, Vol.11, No.6, pp.25,33, Nov.-Dec. 2013.

Last updated on Monday, June 22, 2015, 2:42 pm

Identity, Location, Disease and More: Inferring Your Secrets from Android Public Resources

Identity, Location, Disease and More: Inferring Your Secrets from Android Public Resources,
Xiaoyong Zhou, Soteris Demetriou, Dongjing He, Muhammad Naveed, Xiaorui Pan, Xiaofeng Wang Carl A. Gunter, Klara Nahrstedt.
ACM Computer and Communication Security (CCS ’13), Berlin Germany, November 2013.

Last updated on Sunday, December 22, 2013, 10:30 am

Building a Smarter Health and Wellness Future: Privacy and Security Challenges

Building a Smarter Health and Wellness Future: Privacy and Security Challenges,
Carl A. Gunter. 
Chapter 9 in ICTs and the Health Sector: Towards Smarter Health and Wellness Models, OECD, October 2013, pages 141-157.

Last updated on Sunday, December 22, 2013, 10:05 am

Requirements and Design for an Extensible Toolkit for Analyzing EMR Audit Logs

Requirements and Design for an Extensible Toolkit for Analyzing EMR Audit Logs,
Eric Duffy, Steve Nyemba, Carl A. Gunter, David Liebovitz, and Bradley Malin.
USENIX Workshop on Health Information Technologies (HealthTech 13), August 2013.

Last updated on Sunday, December 22, 2013, 10:01 am

Modeling and Detecting Anomalous Topic Access

Modeling and Detecting Anomalous Topic Access
Siddharth Gupta, Casey Hanson, Carl A. Gunter, Mario Frank, David Liebovitz, and Bradley Malin
IEEE Intelligence and Security Informatics (ISI 13), June 2013. [BIB][PPT]

Last updated on Friday, February 7, 2014, 8:46 am

Implementing Health Information Exchange with Searchable Encryption

Implementing Health Information Exchange with Searchable Encryption,
Igors Svecs.
Master of Science Thesis, University of Illinois at Urbana-Champaign, May 2013.

Last updated on Sunday, May 18, 2014, 5:56 pm

Modeling and Detecting Anomalous Topic Access in EMR Audit Logs

Modeling and Detecting Anomalous Topic Access in EMR Audit Logs,
Siddharth Gupta.
Master of Science Thesis, University of Illinois at Urbana-Champaign, May 2013.

Last updated on Sunday, May 18, 2014, 5:41 pm

Facilitating Patient and Administrator Analyses of Electronic Health Record Accesses

Facilitating Patient and Administrator Analyses of Electronic Health Record Accesses,
Eric Duffy.
Master of Science Thesis, University of Illinois at Urbana-Champaign, August 2013.

Last updated on Monday, June 9, 2014, 9:13 am

Friendsourcing to Detect Network Manipulation

Friendsourcing to Detect Network Manipulation,
Ravinder Shankesi.
Doctoral Thesis, University of Illinois at Urbana-Champaign, August 2013.

Last updated on Tuesday, June 10, 2014, 3:38 pm

Evolving Role Definitions Through Permission Invocation Patterns

Evolving Role Definitions Through Permission Invocation Patterns
Wen Zhang, You Chen, Carl A. Gunter, David Liebovitz, and Bradley Malin
ACM Symposium on Access Control Models and Technologies (SACMAT ’13), June 2013. [BIB]

Last updated on Sunday, June 1, 2014, 11:01 am