Assurance: the power behind PCASSO security

被引:0
|
作者
Baker, DB [1 ]
Masys, DR
Jones, RL
Barnhart, RM
机构
[1] SAIC, La Jolla, CA USA
[2] UCSD, La Jolla, CA 92093 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The need for security protection in Internet-based healthcare applications is generally acknowledged. Most healthcare applications that use the Internet have at least implemented some kind of encryption. Most applications also enforce user authentication and access control policies, and many audit user actions. However, most fall short on providing strong assurances that the security mechanisms are behaving as expected and that they cannot be subverted While no system can claim to be totally "bulletproof," PCASSO provides assurance of correct operation through formal, disciplined design and development methodologies, as well as through functional and penetration testing. Through its security mechanisms, backed by strong system assurances, PCASSO is demonstrating "safe" use of public data networks for health care.
引用
收藏
页码:666 / 670
页数:5
相关论文
共 50 条
  • [21] Embracing the Diversity of Information Assurance & Security
    Myers, J. Paul, Jr.
    Riela, Sandra
    IMSCI '08: 2ND INTERNATIONAL MULTI-CONFERENCE ON SOCIETY, CYBERNETICS AND INFORMATICS, VOL 1, PROCEEDINGS, 2008, : 215 - +
  • [22] Failure analysis for hardware assurance and security
    Rahman, M. Tanjidur
    Asadizanjani, Navid
    Electronic Device Failure Analysis, 2019, 21 (03): : 16 - 24
  • [23] Software Security Assurance of Telecommunication Systems
    Savola, Reijo M.
    2009 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS 2009), 2009, : 138 - 143
  • [24] Security Assurance in Modern IoT Systems
    Bena, Nicola
    Bondaruc, Ruslan
    Polimeno, Antongiacomo
    2022 IEEE 95TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2022-SPRING), 2022,
  • [25] Information security assurance lifecycle research
    XIE, Cheng-shan
    XUJIA, Gu-yue
    WANG, Li
    Journal of China Universities of Posts and Telecommunications, 2007, 14 (04): : 77 - 81
  • [26] Assurance cases for security: The metrics challenge
    Bloomfield, Robin
    Masera, Marcelo
    Miller, Ann
    Saydjari, O. Sami
    Weinstock, Charles B.
    37TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2007, : 807 - 808
  • [27] Regulatory Compliance and Information Security Assurance
    Tashi, Igli
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 670 - 674
  • [28] Hardware Security Through Chain Assurance
    Obeng, Yaw
    Nolan, Colm
    Brown, David
    PROCEEDINGS OF THE 2016 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2016, : 1535 - 1537
  • [29] Evaluating Security Assurance Case Adaptation
    Jahan, Sharmin
    Marshall, Allen
    Gamble, Rose F.
    PROCEEDINGS OF THE 52ND ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2019, : 7312 - 7321
  • [30] BASECASS: A methodology for CAPTCHAs security assurance
    Hernandez-Castro, Carlos Javier
    Barrero, David F.
    R-Moreno, Maria D.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 63