Follow
Lillian Røstad
Lillian Røstad
Verified email at simula.no - Homepage
Title
Cited by
Cited by
Year
A study of access control requirements for healthcare systems based on audit trails from access logs
L Rostad, O Edsberg
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 175-186, 2006
1212006
An extended misuse case notation: Including vulnerabilities and the insider threat
L Røstad
Access Control in Healthcare Information Systems 67, 2008
882008
Safety vs security?
MB Line, O Nordland, L Røstad, IA Tøndel
PSAM Conference, New Orleans, USA, 2006
852006
Combining misuse cases with attack trees and security activity models
IA Tøndel, J Jensen, L Røstad
2010 International Conference on Availability, Reliability and Security, 438-445, 2010
682010
An initial model and a discussion of access control in patient controlled health records
L Røstad
2008 Third International Conference on Availability, Reliability and …, 2008
442008
Personalized access control for a personally controlled health record
L Røstad, Ø Nytrø
Proceedings of the 2nd ACM workshop on Computer security architectures, 9-16, 2008
362008
Software security maturity in public organisations
MG Jaatun, DS Cruzes, K Bernsmed, IA Tøndel, L Røstad
Information Security: 18th International Conference, ISC 2015, Trondheim …, 2015
322015
Access control and integration of health care systems: An experience report and future challenges
L Rostad, O Nytro, IA Tondel, PH Meland
The Second International Conference on Availability, Reliability and …, 2007
242007
Access control in healthcare information systems
L Røstad
Norges teknisk-naturvitenskapelige universitet, 2009
222009
Hacmegame: A tool for teaching software security
Ø Nerbråten, L Røstad
2009 International Conference on Availability, Reliability and Security, 811-816, 2009
172009
MAFIIA—an architectural description framework: experience from the health care domain
S Walderhaug, E Stav, SL Tomassen, L Røstad, NB Moe
Interoperability of Enterprise Software and Applications, 43-54, 2006
82006
Safety vs. security?(psam-0148)
MB Line, O Nordland, L Røstad, IA Tøndel
72006
How to mediate between health information security and patient safety
PH Meland, L Røstad, IA Tøndel
Proceedings of the Eigh International Conference on Probabilistic Safety …, 2006
62006
Safety vs. security
L Røstad, IA Tøndel, MB Line, O Nordland, MG Stamatelatos, ...
Safety Assessment and Management-PSAM 8, 2006
62006
Patient-administered access control: A usability study
L Røstad, OA Alsos
2009 International Conference on Availability, Reliability and Security, 877-881, 2009
52009
Learning by failing (and fixing)
L Røstad, IA Tøndel, PH Meland, GR Øie
IEEE Security & Privacy 6 (4), 54-56, 2008
42008
Access control in healthcare applications
L Røstad
Access Control in Healthcare Information Systems 37, 2008
42008
Towards dynamic access control for healthcare information systems
L Røstad, Ø Nytrø
Studies in Health Technology and Informatics 136, 703, 2008
32008
Intrusion detection using ensembles
A Balon-Perin, B Gambäck, L Røstad
Proceedings of the 7th International Conference on Software Engineering …, 2012
12012
From Incident Response to Incident Response Management
SO Johnsen, L Røstad, B Haugset, MB Dahl
Probabilistic Safety Assessment and Management: PSAM 7—ESREL’04 June 14–18 …, 2004
12004
The system can't perform the operation now. Try again later.
Articles 1–20