Assurance: the power behind PCASSO security

被引:0
|
作者
Baker, DB [1 ]
Masys, DR
Jones, RL
Barnhart, RM
机构
[1] SAIC, La Jolla, CA USA
[2] UCSD, La Jolla, CA 92093 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The need for security protection in Internet-based healthcare applications is generally acknowledged. Most healthcare applications that use the Internet have at least implemented some kind of encryption. Most applications also enforce user authentication and access control policies, and many audit user actions. However, most fall short on providing strong assurances that the security mechanisms are behaving as expected and that they cannot be subverted While no system can claim to be totally "bulletproof," PCASSO provides assurance of correct operation through formal, disciplined design and development methodologies, as well as through functional and penetration testing. Through its security mechanisms, backed by strong system assurances, PCASSO is demonstrating "safe" use of public data networks for health care.
引用
收藏
页码:666 / 670
页数:5
相关论文
共 50 条
  • [31] Tools for information security assurance arguments
    Park, JS
    Montrose, B
    Froscher, JN
    DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, 2001, : 287 - 296
  • [32] A reference model for enterprise security -: High assurance enterprise security
    Enstrom, David W.
    Walsh, D'Arcy
    Hossendoust, Siavosh
    ICEIS 2007: PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION, 2007, : 355 - +
  • [33] Assessing of software security reliability: Dimensional security assurance techniques
    Ali, Mohammad
    Ullah, Ahsan
    Islam, Md. Rashedul
    Hossain, Rifat
    COMPUTERS & SECURITY, 2025, 150
  • [34] Information security assurance lifecycle research
    XIE Cheng-shan State Key Laboratory of Information Security
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2007, (04) : 77 - 81
  • [35] Authenticity as a Component of Information Assurance and Security
    Rogers, Corinne
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2014), 2014, : 101 - 108
  • [36] COMPUTER ASSURANCE - SECURITY, SAFETY, AND ECONOMICS
    HANKINSON, AL
    COMPASS 89 : PROCEEDINGS OF THE FOURTH ANNUAL CONFERENCE ON COMPUTER ASSURANCE: SYSTEMS INTEGRITY, SOFTWARE SAFETY AND PROCESS SECURITY, 1989, : 1 - 7
  • [37] An Immune Intelligent Approach for Security Assurance
    Enache, Adriana-Cristina
    Ionita, Mihai
    Sgarciu, Valentin
    2015 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBERSA), 2015,
  • [38] Software security assurance SOUP to NUTS
    Axelrod, C. Warren
    Axelrod, C. Warren (waxelrod@delta-risk.net), 2015, U.S. Department of Defense (28): : 37 - 43
  • [39] From Security to Assurance in the Cloud: A Survey
    Ardagna, Claudio A.
    Asal, Rasool
    Damiani, Ernesto
    Quang Hieu Vu
    ACM COMPUTING SURVEYS, 2015, 48 (01)
  • [40] Strategic planning for information security and assurance
    Port, Daniel
    Kazman, Rick
    Takenaka, Ann
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 466 - 471