Achieving application requirements
Distributed systems
Reasoning about naming systems
ACM Transactions on Programming Languages and Systems (TOPLAS)
Constraint satisfaction and debugging for interactive user interfaces
Constraint satisfaction and debugging for interactive user interfaces
A study on video browsing strategies
A study on video browsing strategies
The cubic mouse: a new device for three-dimensional input
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
An extensive empirical study of feature selection metrics for text classification
The Journal of Machine Learning Research
A widget framework for augmented interaction in SCAPE
Proceedings of the 16th annual ACM symposium on User interface software and technology
A comparison of MC/DC, MUMCUT and several other coverage criteria for logical decisions
Journal of Systems and Software - Special issue: Quality software
Modeling and Simulation Design
Modeling and Simulation Design
Hi-index | 0.00 |
The Health Information Portability and Accountability Act (HIPAA) of 1996 mandates several policy and technology security standards that must be implemented for healthcare organizations that deal, store and process electronic patient medical records. The enforcement of this law can present many organizational and technical challenges to healthcare providers with no formal information security program processes in place. The use of security models, such as NIST SP 800-66 and the formal SecSDLC security program methodology, can help healthcare providers put an information security program in place that enforces HIPAA compliance and ensures the protection of their health information systems.