Fundamentals of computer security technology
Fundamentals of computer security technology
A survey and analysis of Electronic Healthcare Record standards
ACM Computing Surveys (CSUR)
SSL-DP: A Rootkit of Network Based SSL and TLS Traffic Decryptor
CTC '10 Proceedings of the 2010 Second Cybercrime and Trustworthy Computing Workshop
A security policy model for clinical information systems
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Hi-index | 0.00 |
The security of electronic health record (EHR) systems is crucial for their growing acceptance. There is a need for assurance that these records are securely protected from attacks. For a system as complex as an EHR system, the number of possible attacks is potentially very large. In this paper, a threat modeling methodology, known as attack tree, is employed to analyze attacks affecting EHR systems. The analysis is based on a proposed generic client-server model of EHR systems. The developed attack tree is discussed along with some system properties that enable quantitative and qualitative analysis. A list of suggested countermeasures are also highlighted.