Lillian Røstad

According to our database1, Lillian Røstad authored at least 12 papers between 2006 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Software Security Maturity in Public Organisations.
Proceedings of the Information Security - 18th International Conference, 2015

2010
Combining Misuse Cases with Attack Trees and Security Activity Models.
Proceedings of the ARES 2010, 2010

2009
Visualizing Patient Trajectories on Wall-Mounted Boards - Information Security Challenges.
Proceedings of the Medical Informatics in a United and Healthy Europe - Proceedings of MIE 2009, The XXIInd International Congress of the European Federation for Medical Informatics, Sarajevo, Bosnia and Herzegovina, August 30, 2009

Patient-Administered Access Control: A Usability Study.
Proceedings of the The Forth International Conference on Availability, 2009

hACMEgame: A Tool for Teaching Software Security.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Learning by Failing (and Fixing).
IEEE Secur. Priv., 2008

Towards Dynamic Access Control for Healthcare Information Systems.
Proceedings of the eHealth Beyond the Horizon, 2008

Personalized access control for a personally controlled health record.
Proceedings of the 2nd ACM Workshop on Computer Security Architecture, 2008

An Initial Model and a Discussion of Access Control in Patient Controlled Health Records.
Proceedings of the The Third International Conference on Availability, 2008

2007
Access Control and Integration of Health Care Systems: An Experience Report and Future Challenges.
Proceedings of the The Second International Conference on Availability, 2007

2006
Establishing a Centre for Information Security: Experiences from the Trial Period and Recommendations to Similar Initiatives.
Proceedings of the IT-Incidents Management & IT-Forensics, 2006

A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006


  Loading...