A study of access control requirements for healthcare systems based on audit trails from access logs L Rostad, O Edsberg 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 175-186, 2006 | 123 | 2006 |
An extended misuse case notation: Including vulnerabilities and the insider threat L Røstad Access Control in Healthcare Information Systems 67, 2008 | 89 | 2008 |
Safety vs security? MB Line, O Nordland, L Røstad, IA Tøndel PSAM Conference, New Orleans, USA, 2006 | 71 | 2006 |
Combining misuse cases with attack trees and security activity models IA Tøndel, J Jensen, L Røstad 2010 International Conference on Availability, Reliability and Security, 438-445, 2010 | 63 | 2010 |
An initial model and a discussion of access control in patient controlled health records L Røstad 2008 Third International Conference on Availability, Reliability and …, 2008 | 42 | 2008 |
Personalized access control for a personally controlled health record L Røstad, Ø Nytrø Proceedings of the 2nd ACM workshop on Computer security architectures, 9-16, 2008 | 33 | 2008 |
Software security maturity in public organisations MG Jaatun, DS Cruzes, K Bernsmed, IA Tøndel, L Røstad Information Security: 18th International Conference, ISC 2015, Trondheim …, 2015 | 29 | 2015 |
Software security maturity in public organisations MG Jaatun, DS Cruzes, K Bernsmed, IA Tøndel, L Røstad Information Security: 18th International Conference, ISC 2015, Trondheim …, 2015 | 29 | 2015 |
Access control and integration of health care systems: An experience report and future challenges L Rostad, O Nytro, IA Tondel, PH Meland The Second International Conference on Availability, Reliability and …, 2007 | 26 | 2007 |
Access control in healthcare information systems L Røstad Norwegian University of Science and Technology, 2009 | 22 | 2009 |
hacmegame: A tool for teaching software security Ø Nerbråten, L Røstad 2009 International Conference on Availability, Reliability and Security, 811-816, 2009 | 14 | 2009 |
Safety vs. security?(psam-0148) MB Line, O Nordland, L Røstad, IA Tøndel, MG Stamatelatos, ... Proceedings of the Eighth International Conference on Probabilistic Safety …, 2006 | 9 | 2006 |
MAFIIA—an architectural description framework: experience from the health care domain S Walderhaug, E Stav, SL Tomassen, L Røstad, NB Moe Interoperability of Enterprise Software and Applications, 43-54, 2006 | 8 | 2006 |
Visualizing patient trajectories on wall-mounted boards–information security challenges A Faxvaag, IA Tøndel, AR Seim, PJ Toussaint Medical Informatics in a United and Healthy Europe, 715-719, 2009 | 7 | 2009 |
How to mediate between health information security and patient safety PH Meland, L Røstad, IA Tøndel Proceedings of the Eigh International Conference on Probabilistic Safety …, 2006 | 7 | 2006 |
Safety vs. security L Røstad, IA Tøndel, MB Line, O Nordland, MG Stamatelatos, ... Safety Assessment and Management-PSAM 8, 2006 | 6 | 2006 |
Patient-administered access control: A usability study L Røstad, OA Alsos 2009 International Conference on Availability, Reliability and Security, 877-881, 2009 | 5 | 2009 |
Learning by failing (and fixing) L Røstad, IA Tøndel, PH Meland, GR Øie IEEE Security & Privacy 6 (4), 54-56, 2008 | 4 | 2008 |
Access control in healthcare applications L Røstad Access Control in Healthcare Information Systems 37, 2008 | 4 | 2008 |
Towards dynamic access control for healthcare information systems L Røstad, Ø Nytrø Studies in Health Technology and Informatics 136, 703, 2008 | 3 | 2008 |