Security and Interoperable Medical Device Systems: Part 1
dc.citation.doi | 10.1109/MSP.2012.128 | en_US |
dc.citation.epage | 6 | en_US |
dc.citation.issn | 1540-7993 | en_US |
dc.citation.issue | 5 | en_US |
dc.citation.jtitle | IEEE Security and Privacy Magazine (IEEE SECUR PRIV) | en_US |
dc.citation.spage | 1 | en_US |
dc.citation.volume | 10 | en_US |
dc.contributor.author | Venkatasubramanian, Krishna K. | |
dc.contributor.author | Vasserman, Eugene Y. | |
dc.contributor.author | Sokolsky, Oleg | |
dc.contributor.author | Lee, Insup | |
dc.contributor.authoreid | eyv | en_US |
dc.date.accessioned | 2015-08-05T21:29:46Z | |
dc.date.available | 2015-08-05T21:29:46Z | |
dc.date.issued | 2013-10-16 | |
dc.date.published | 2012 | en_US |
dc.description.abstract | Interoperable medical devices (IMDs) face threats due to the increased attack surface presented by interoperability and the corresponding infrastructure. Introducing networking and coordination functionalities fundamentally alters medical systems' security properties. Understanding the threats is an important first step in eventually designing security solutions for such systems. Part 1 of this two-part article provides an overview of the IMD environment and the attacks that can be mounted on it. | en_US |
dc.identifier.uri | http://hdl.handle.net/2097/20139 | |
dc.language.iso | en_US | en_US |
dc.publisher | IEEE Computer Society; Institute of Electrical and Electronics Engineers | en_US |
dc.relation.uri | http://doi.org/10.1109/MSP.2012.128 | en_US |
dc.rights | http://www.sherpa.ac.uk/romeo/issn/1540-7993/ | en_US |
dc.rights | This Item is protected by copyright and/or related rights. You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s). | |
dc.rights.uri | https://rightsstatements.org/page/InC/1.0/?language=en | |
dc.subject | Integrated Clinical Environment (ICE) | en_US |
dc.subject | Attack model, attack vectors | en_US |
dc.subject | Computer security | en_US |
dc.subject | Interoperable medical devices | en_US |
dc.subject | Interoperability | en_US |
dc.subject | Medical devices | en_US |
dc.title | Security and Interoperable Medical Device Systems: Part 1 | en_US |
dc.type | Text | en_US |