Follow
Lillian Røstad
Lillian Røstad
Associate Professor
Verified email at ntnu.no - Homepage
Title
Cited by
Cited by
Year
A study of access control requirements for healthcare systems based on audit trails from access logs
L Rostad, O Edsberg
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 175-186, 2006
1212006
An extended misuse case notation: Including vulnerabilities and the insider threat
L Røstad
Access Control in Healthcare Information Systems 67, 2008
892008
Safety vs security?
MB Line, O Nordland, L Røstad, IA Tøndel
PSAM Conference, New Orleans, USA, 2006
692006
Combining misuse cases with attack trees and security activity models
IA Tøndel, J Jensen, L Røstad
2010 International Conference on Availability, Reliability and Security, 438-445, 2010
632010
An initial model and a discussion of access control in patient controlled health records
L Røstad
2008 Third International Conference on Availability, Reliability and …, 2008
422008
Personalized access control for a personally controlled health record
L Røstad, Ø Nytrø
Proceedings of the 2nd ACM workshop on Computer security architectures, 9-16, 2008
332008
Software security maturity in public organisations
MG Jaatun, DS Cruzes, K Bernsmed, IA Tøndel, L Røstad
Information Security: 18th International Conference, ISC 2015, Trondheim …, 2015
282015
Software security maturity in public organisations
MG Jaatun, DS Cruzes, K Bernsmed, IA Tøndel, L Røstad
Information Security: 18th International Conference, ISC 2015, Trondheim …, 2015
282015
Access control and integration of health care systems: An experience report and future challenges
L Rostad, O Nytro, IA Tondel, PH Meland
The Second International Conference on Availability, Reliability and …, 2007
262007
Access control in healthcare information systems
L Røstad
Norwegian University of Science and Technology, 2009
222009
hacmegame: A tool for teaching software security
Ø Nerbråten, L Røstad
2009 International Conference on Availability, Reliability and Security, 811-816, 2009
142009
Safety vs. security?(psam-0148)
MB Line, O Nordland, L Røstad, IA Tøndel, MG Stamatelatos, ...
Proceedings of the Eighth International Conference on Probabilistic Safety …, 2006
82006
MAFIIA—an architectural description framework: experience from the health care domain
S Walderhaug, E Stav, SL Tomassen, L Røstad, NB Moe
Interoperability of Enterprise Software and Applications, 43-54, 2006
82006
Visualizing patient trajectories on wall-mounted boards–information security challenges
A Faxvaag, IA Tøndel, AR Seim, PJ Toussaint
Medical Informatics in a United and Healthy Europe, 715-719, 2009
72009
How to mediate between health information security and patient safety
PH Meland, L Røstad, IA Tøndel
Proceedings of the Eigh International Conference on Probabilistic Safety …, 2006
72006
Safety vs. security
L Røstad, IA Tøndel, MB Line, O Nordland, MG Stamatelatos, ...
Safety Assessment and Management-PSAM 8, 2006
62006
Patient-administered access control: A usability study
L Røstad, OA Alsos
2009 International Conference on Availability, Reliability and Security, 877-881, 2009
52009
Learning by failing (and fixing)
L Røstad, IA Tøndel, PH Meland, GR Øie
IEEE Security & Privacy 6 (4), 54-56, 2008
42008
Access control in healthcare applications
L Røstad
Access Control in Healthcare Information Systems 37, 2008
42008
Towards dynamic access control for healthcare information systems
L Røstad, Ø Nytrø
Studies in Health Technology and Informatics 136, 703, 2008
32008
The system can't perform the operation now. Try again later.
Articles 1–20