Model-based security analysis of the German health card architecture

J Jürjens, R Rumm - Methods of information in medicine, 2008 - thieme-connect.com
Objectives: Health-care information systems are particularly security-critical. In order to make
these applications secure, the security analysis has to be an integral part of the system …

Securing the access to electronic health records on mobile phones

A Dmitrienko, Z Hadzic, H Löhr, AR Sadeghi… - … and Technologies: 4th …, 2013 - Springer
Mobile phones are increasingly used in the e-health domain. In this context, enabling secure
access to health records from mobile devices is of particular importance because of the high …

A trusted mobile phone prototype

O Aciicmez, A Latifi, JP Seifert… - 2008 5th IEEE Consumer …, 2008 - ieeexplore.ieee.org
Due to the increasing security demands in mobile devices, the Trusted Computing Group
(TCG) formed a dedicated Mobile Phone Working Group (MPWG) to address these security …

[PDF][PDF] A Security Architecture for Accessing Health Records on Mobile Phones.

A Dmitrienko, Z Hadzic, H Löhr, M Winandy… - HEALTHINF, 2011 - academia.edu
Using mobile phones to access healthcare data is an upcoming application scenario of
increasing importance in the near future. However, important aspects to consider in this …

Security and dependability engineering

J J&rjens - Security and dependability for Ambient Intelligence, 2009 - Springer
The current state of the art in security-critical ambient systems is far from satisfactory: New
security vulnerabilities are discovered on an almost daily basis. To improve this situation …

Beyond selinux: the case for behavior-based policy and trust languages

S Bratus, ME Locasto, B Otto, R Shapiro, SW Smith… - 2011 - digitalcommons.dartmouth.edu
Despite the availability of powerful mechanisms for security policy and access control, real-
world information security practitioners---both developers and security officers---still find …

Identification of vulnerabilities in web services using model-based security

S Höhn, L Lowis, J Jürjens, R Accorsi - … , Methodologies, Tools and …, 2010 - igi-global.com
In a service-oriented architecture, business processes are executed as composition of
services, which can suffer from vulnerabilities. These vulnerabilities in services and the …

Model-driven configuration of os-level mandatory access control: research abstract

B Agreiter - Companion of the 30th international conference on …, 2008 - dl.acm.org
Trust and assurance of mobile platforms is a prime objective when considering their use in
security-critical scenarios like in healthcare or e-government. Currently, several …

Model-driven configuration of SELinux policies

B Agreiter, R Breu - OTM Confederated International Conferences" On the …, 2009 - Springer
The need for access control in computer systems is inherent. However, the complexity to
configure such systems is constantly increasing which affects the overall security of a system …

New Directions for Hardware-assisted Trusted Computing Policies (Position Paper)

S Bratus, ME Locasto, A Ramaswamy… - Future of Trust in …, 2009 - Springer
The basic technological building blocks of the TCG architecture seem to be stabilizing. As a
result, we believe that the focus of the Trusted Computing (TC) discipline must naturally shift …