Natural language processing for information retrieval
Communications of the ACM
Foundations of statistical natural language processing
Foundations of statistical natural language processing
Introducing Abuse Frames for Analysing Security Requirements
RE '03 Proceedings of the 11th IEEE International Conference on Requirements Engineering
Trust Negotiations: Concepts, Systems, and Languages
Computing in Science and Engineering
The Effect of Trust Assumptions on the Elaboration of Security Requirements
RE '04 Proceedings of the Requirements Engineering Conference, 12th IEEE International
Modeling Security Requirements Through Ownership, Permission and Delegation
RE '05 Proceedings of the 13th IEEE International Conference on Requirements Engineering
Privacy and Contextual Integrity: Framework and Applications
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Why are there so many loop formulas?
ACM Transactions on Computational Logic (TOCL)
Building problem domain ontology from security requirements in regulatory documents
Proceedings of the 2006 international workshop on Software engineering for secure systems
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
CSFW '06 Proceedings of the 19th IEEE workshop on Computer Security Foundations
Queue - Compliance
An Aspect-Oriented Approach to Security Requirements Analysis
COMPSAC '06 Proceedings of the 30th Annual International Computer Software and Applications Conference - Volume 02
RE '06 Proceedings of the 14th IEEE International Requirements Engineering Conference
Privacy and Utility in Business Processes
CSF '07 Proceedings of the 20th IEEE Computer Security Foundations Symposium
The ChoicePoint Dilemma: How Data Brokers Should Handle the Privacy of Personal Information
IEEE Security and Privacy
Analyzing Regulatory Rules for Privacy and Security Requirements
IEEE Transactions on Software Engineering
Reasoning about Conditions and Exceptions to Laws in Regulatory Conformance Checking
DEON '08 Proceedings of the 9th international conference on Deontic Logic in Computer Science
Policy Compliance in Collaborative Systems
CSF '09 Proceedings of the 2009 22nd IEEE Computer Security Foundations Symposium
A Formalization of HIPAA for a Medical Messaging System
TrustBus '09 Proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business
What is answer set programming?
AAAI'08 Proceedings of the 23rd national conference on Artificial intelligence - Volume 3
Monitoring security policies with metric first-order temporal logic
Proceedings of the 15th ACM symposium on Access control models and technologies
Proceedings of the 1st ACM International Health Informatics Symposium
Stable models and circumscription
Artificial Intelligence
Representing and Reasoning about Web Access Control Policies
COMPSAC '10 Proceedings of the 2010 IEEE 34th Annual Computer Software and Applications Conference
Hi-index | 0.00 |
In healthcare domain, there is a gap between healthcare systems and government regulations such as the Health Insurance Portability and Accountability Act (HIPAA). The violations of HIPAA not only may cause the disclosure of patients' sensitive information, but also can bring about tremendous economic loss and reputation damage to healthcare providers. Taking effective measures to address this gap has become a critical requirement for all healthcare entities. However, the complexity of HIPAA regulations makes it difficult to achieve this requirement. In this paper, we propose a framework to bridge such a critical gap between healthcare systems and HIPAA regulations. Our framework supports compliance-oriented analysis to determine whether a health- care system is complied with HIPAA regulations. We also describe our evaluation results to demonstrate the feasibility and effectiveness of our approach.