Table of Contents Author Guidelines Submit a Manuscript
BioMed Research International
Volume 2015, Article ID 542016, 12 pages
http://dx.doi.org/10.1155/2015/542016
Research Article

EMRlog Method for Computer Security for Electronic Medical Records with Logic and Data Mining

1Departamento de Ciencias Computacionales, Tecnológico de Monterrey, Campus Cuernavaca, Autopista del Sol Km 104, Colonia Real del Puente, 62790 Xochitepec, MOR, Mexico
2Tecnológico Nacional de México, Instituto Tecnológico de Ciudad Madero, Avenida 1 de Mayo, Esquina Sor Juana Inés de la Cruz s/n, Colonia Los Mangos, 89440 Madero, TAMPS, Mexico
3Tecnológico de Monterrey, Escuela de Ingeniería y Ciencias, Carretera Lago de Guadalupe, Km. 3.5, 52926, MEX, Mexico

Received 24 January 2015; Revised 26 April 2015; Accepted 21 May 2015

Academic Editor: Shigehiko Kanaya

Copyright © 2015 Sergio Mauricio Martínez Monterrubio et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. H. Sapolsky and E. Gholz, US Defense Politics: The Origins of Security Policy, Routledge, New York, NY, USA, 2nd edition, 2014.
  2. A. Askarov and A. Myers, “Attacker control and impact for confidentiality and integrity,” Logical Methods in Computer Science, vol. 7, no. 3, article 17, pp. 1–31, 2011. View at Publisher · View at Google Scholar
  3. D. F. Ferraiolo and D. R. Kuhn, “Role-based access controls,” in Proceedings of the 15th National Computer Security Conference, pp. 554–563, Baltimore, Md, USA, 1992.
  4. N. Shankar, “Automated deduction for verification,” ACM Computing Surveys, vol. 41, no. 4, article 20, 56 pages, 2009. View at Publisher · View at Google Scholar
  5. F. B. Schneider, “Enforceable security policies,” ACM Transactions on Information and System Security, vol. 3, no. 1, pp. 30–50, 2000. View at Publisher · View at Google Scholar
  6. L. A. Wahsheh, D. C. de Leon, and J. Alves-Foss, “Formal verification and visualization of security policies,” Journal of Computers, vol. 3, no. 6, pp. 22–31, 2008. View at Google Scholar · View at Scopus
  7. R. van der Meyden, “The dynamic logic of permission,” Journal of Logic and Computation, vol. 6, no. 3, pp. 465–479, 1996. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  8. J. Y. Halpern and V. Weissman, “Using first-order logic to reason about policies,” ACM Transactions on Information and System Security, vol. 11, no. 4, article 21, 2008. View at Publisher · View at Google Scholar · View at Scopus
  9. N. Cuppens-Boulahia and F. Cuppens, “Specifying intrusion detection and reaction policies: an application of deontic logic,” in Deontic Logic in Computer Science, N. Cuppens-Boulahia and F. Cuppens, Eds., vol. 5076 of Lecture Notes in Computer Science, pp. 65–80, Springer, Berlin, Germany, 2008. View at Publisher · View at Google Scholar
  10. D. Bell and L. LaPadula, “Secure computer systems: unified exposition and multics interpretation,” Tech. Rep. ESD-TR-75-306, MITRE, 1975. View at Google Scholar
  11. F. Cuppens, N. Cuppens-Boulahia, and M. B. Ghorbel, “High level conflict management strategies in advanced access control models,” Electronic Notes in Theoretical Computer Science, vol. 186, pp. 3–26, 2007. View at Publisher · View at Google Scholar · View at Scopus
  12. A. Álvarez, K. García, R. Monroy, L. Trejo, and J. Vázquez, “A tool for managing security policies in organisations,” in Advances in Information and Computer Security, A. V. Álvarez, K. A. García, R. Monroy, L. A. Trejo, and J. Vázquez, Eds., pp. 378–388, Springer, Kyoto, Japan, 2006. View at Google Scholar
  13. S. Noel, D. Wijesekera, and C. Youman, “Modern intrusion detection, data mining, and degrees of attack guilt,” in Applications of Data Mining in Computer Security, D. Barbara and S. Jajodia, Eds., vol. 6 of Advances in Information Security, chapter 1, pp. 1–31, Springer, New York, NY, USA, 2002. View at Publisher · View at Google Scholar
  14. M. Gasser, Building a Secure Computer System, Van Nostrand Reinhold, New York, NY, USA, 1988.
  15. R. Salerno, J. Gaudioso, and B. Brodsky, Laboratory Biosecurity Handbook, CRC Press, Boca Raton, Fla, USA, 1st edition, 2007.
  16. R. Vallabhaneni, Wiley CIA Exam Review Focus Notes 2013: Internal Audit Knowledge Elements, John Wiley & Sons, New York, NY, USA, 2013.
  17. J. Quinlan, C4.5: Programs for Machine Learning, Morgan Kaufmann, San Francisco, Calif, USA, 1993.
  18. U. Fayyad, G. Piatetsky-Shapiro, and P. Smyth, “From data mining to knowledge discovery in databases,” AI Magazine, vol. 17, no. 3, pp. 37–54, 1996. View at Publisher · View at Google Scholar
  19. T. Abraham, “IDDM: intrusion detection using data mining techniques,” Tech. Rep. DSTO-GD-0286, DSTO Electronics and Surveillance Laboratory, 2001. View at Google Scholar
  20. A. Valdes and K. Skinner, “Adaptive, model-based monitoring for cyber attack detection,” in Recent Advances in Intrusion Detection, vol. 1907 of Lecture Notes in Computer Science, pp. 80–93, Springer, Berlin, Germany, 2000. View at Publisher · View at Google Scholar
  21. J. Abdul Jaleel, S. Sibi, and R. Aswin, “Artificial neural network based detection for instance, skin cancer,” International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, vol. 1, no. 3, 2012. View at Google Scholar