Automated log audits for privacy compliance validation: a literature survey

J Reuben, LA Martucci, S Fischer-Hübner - … for a Revolution? 10th IFIP WG …, 2016 - Springer
Log audits are the technical means to retrospectively reconstruct and analyze system
activities for determining if the system is executed in accordance with the rules. This …

Misuse of 'Break-the-Glass' Policies in Hospitals: Detecting Unauthorized Access to Sensitive Patient Health Data

B Stark, H Gewald, H Lautenbacher… - International Journal of …, 2018 - igi-global.com
This article describes how the information about an individual's personal health is among
ones most sensitive and important intangible belongings. When health information is …

Misuse of 'Break-the-Glass' Policies in Hospitals: Detecting Unauthorized Access to Sensitive Patient Health Data

B Stark, H Gewald, H Lautenbacher… - … on Privatizing and …, 2021 - igi-global.com
This article describes how the information about an individual's personal health is among
ones most sensitive and important intangible belongings. When health information is …