Lillian Røstad

English version of this page
Brukernavn
Besøksadresse Gaustadalléen 23B Ole-Johan Dahls hus 0373 OSLO
Postadresse Postboks 1080 Blindern 0316 OSLO

Publikasjoner

  • Jaatun, Martin Gilje; Cruzes, Daniela Soares; Bernsmed, Karin; Tøndel, Inger Anne & Røstad, Lillian (2015). Software Security Maturity in Public Organisations. Lecture Notes in Computer Science.  ISSN 0302-9743.  9290, s 120- 138 . doi: 10.1007/978-3-319-23318-5_7 Vis sammendrag
  • Balon-Perin, Alexandre; Gambäck, Björn & Røstad, Lillian (2012). Intrusion Detection Using Ensembles, In Herwig Mannaert (ed.),  Seventh International Conference on Software Engineering Advances 2012 (ICSEA 2012).  Xpert Publishing Services.  ISBN 9781622765843.  article.  s 656 - 663
  • Røstad, Lillian & Alsos, Ole Andreas (2009). Patient-Administered Access Control: a Usability Study, In Takizawa Makoto (ed.),  Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009.  IEEE.  ISBN 9780769535647.  SecUSAB 2009 - Session 2.  s 877 - 882
  • Røstad, Lillian & Nerbråten, Øyvind (2009). hAcmeGame: A Tool for Teaching Software Security, In Takizawa Makoto (ed.),  Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009.  IEEE.  ISBN 9780769535647.  SecSE 2009 - Education and Other Vulnerabilities.  s 811 - 817
  • Røstad, Lillian; Meland, Per Håkon; Tøndel, Inger Anne & Øie, Gunnar Rene (2008). Learning by Failing (and Fixing). IEEE Security and Privacy.  ISSN 1540-7993.  6(4), s 54- 56 Vis sammendrag
  • Røstad, Lillian (2008). An Initial Model and a Discussion of Access Control in Patient Controlled Health Records, In Bob Werner (ed.),  Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008.  IEEE.  ISBN 0769531024.  WPA.  s 935 - 942
  • Røstad, Lillian & Nytrø, Øystein (2008). Personalized Access Control for a Personally Controlled Health Record, In Trent Jaeger (ed.),  Proceedings of the 2nd ACM workshop on Computer security architectures.  Association for Computing Machinery (ACM).  ISBN 978-1-60558-300-6.  SESSION: Trust and privacy.  s 9 - 16 Vis sammendrag
  • Røstad, Lillian & Nytrø, Øystein (2008). Towards Dynamic Access Control for Healthcare Information Systems, In Stig Kjær Andersen; Gunnar O. Klein; Stefan Schulz; Jos Aarts & M. Cristina Mazzoleni (ed.),  eHealth Beyond the Horizon – Get IT There - Proceedings of MIE2008 – The XXIst International Congress of the European Federation for Medical Informatics.  IOS Press.  ISBN 978-1-58603-864-9.  9. Privacy and Security.  s 703 - 708
  • Røstad, Lillian; Meland, Per Håkon; Tøndel, Inger Anne & Nytrø, Øystein (2007). Access Control and Integration of Health Care Systems: An Experience Report and Future Challenges, In Nguyen Man Tho (ed.),  Proceedings from the Second International Conference on Availability, Reliability and Security (ARES 2007).  IEEE.  ISBN 0-7695-2775-2.  DAWAM.
  • Røstad, Lillian (2006). An extended misuse case notation: Including vulnerabilities and the insider threat, In Sawyer Peter (ed.),  Proceedings of The Twelfth Working Conference on Requirements Engineering: Foundation for Software Quality.  Essener Informatik Beitrage.  ISBN 3-922602-26-6.  Session 1 "Quality requirements". Vis sammendrag
  • Røstad, Lillian & Edsberg, Ole (2006). A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs, In Bob Werner (ed.),  Proceedings of the 22nd Annual Computer Security Applications Conference.  IEEE.  ISBN 0-7695-2716-7.  Session: Security in Systems.  s 175 - 183 Vis sammendrag
  • Stav, Erlend; Walderhaug, Ståle; Tomassen, Stein Løkke; Røstad, Lillian & Moe, Nils Brede (2006). MAFIIA - an Architectural Description Framework: Experience from the Health Care Domain, In D Konstantas; J.-P. Bourrières; M. Léonard & N. Boudjlida (ed.),  Interoperability of Enterprise Software and Applications.  Springer Publishing Company.  ISBN 1-84628-151-2.  None.  s 43 - 54 Vis sammendrag

Se alle arbeider i Cristin

  • Jaatun, Martin Gilje; Scandariato, Riccardo & Røstad, Lillian (2014). Guest Editorial Preface - Special Issue on 7th International Workshop on Secure Software Engineering (SecSE 2013). International Journal of Secure Software Engineering.  ISSN 1947-3036.  5(2), s iv- vi
  • Faxvaag, Arild; Røstad, Lillian; Tøndel, Inger Anne; Seim, Andreas Røsland & Toussaint, Pieter Jelle (2009). Visualizing patient trajectories on wall-mounted boards — information security challenges. Vis sammendrag
  • Røstad, Lillian (2009). Access Control in Healthcare Information Systems. Doktoravhandlinger ved NTNU. 24.
  • Røstad, Lillian (2005). Access Control in Healthcare Applications.
  • Røstad, Lillian (2004). Access Control for Distributed Health Care Applications.
  • Røstad, Lilian; Nytrø, Øystein; Moe, Nils Brede & Stav, Erlend (2003). Sikkerhetsarkitektur for PlanBasert Samarbeidsjournal SPBS v.1. SINTEF Rapport. SIF40 A03033. Vis sammendrag

Se alle arbeider i Cristin

Publisert 12. juni 2019 14:56 - Sist endret 12. juni 2019 14:56