{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T04:15:41Z","timestamp":1746159341819,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545245"},{"type":"electronic","value":"9783642545252"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54525-2_33","type":"book-chapter","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T14:26:22Z","timestamp":1391783182000},"page":"370-381","source":"Crossref","is-referenced-by-count":2,"title":["Emergency Aware, Non-invasive, Personalized Access Control Framework for IMDs"],"prefix":"10.1007","author":[{"given":"Monika","family":"Darji","sequence":"first","affiliation":[]},{"given":"Bhushan H.","family":"Trivedi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","unstructured":"Insulin pumps - global pipeline analysis, opportunity assessment and market forecasts to 2016. GlobalData, http:\/\/www.globaldata.com"},{"issue":"1","key":"33_CR2","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MPRV.2008.16","volume":"7","author":"D. Halperin","year":"2008","unstructured":"Halperin, D., Heydt-Benjamin, T.S., Fu, K., Kohno, T., Maisel, W.H.: Security and privacy for Implantable medical devices. IEEE Pervasive Computing\u00a07(1), 30\u201339 (2008)","journal-title":"IEEE Pervasive Computing"},{"key":"33_CR3","unstructured":"Roberts, P.: Blind attack on wireless insulin pumps could deliver lethal dose. Threatpost (blog post) (October 2011), http:\/\/threatpost.com\/en_us\/blogs\/blind-attack-wireless-insulin-pumps-could-deliver-lethal-dose-102711"},{"key":"33_CR4","unstructured":"Li, C., Raghunathan, A., Jha, N.K.: Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system. In: Proceedings of the 13th IEEE International Conference on e-Health Networking, Applications, and Services, Healthcom 2011 (June 2011)"},{"key":"33_CR5","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/2228360.2228364","volume-title":"Proceedings of the 49th Annual Design Automation Conference (DAC 2012)","author":"W. Burleson","year":"2012","unstructured":"Burleson, W., Clark, S.S., Ransford, B., Fu, K.: Design challenges for secure implantable medical devices. In: Proceedings of the 49th Annual Design Automation Conference (DAC 2012), pp. 12\u201317. ACM, New York (2012)"},{"key":"33_CR6","unstructured":"Bergamasco, S., Bon, M., Inchingolo, P.: Medical data protection with a new generation of hardware authentication tokens. In: Mediterranean Conference on Medical and Biological Engineering and Computing (MEDICON), Pula, Croatia, pp. 82\u201385 (2001)"},{"key":"33_CR7","unstructured":"Schechter, S.: Security that is Meant to be Skin Deep: Using Ultraviolet Micropigmentation to Store Emergency-Access Keys for Implantable Medical Devices. In: USENIX Workshop on Health Security and Privacy (2010)"},{"key":"33_CR8","doi-asserted-by":"crossref","unstructured":"Rasmussen, K.B., Castelluccia, C., Heydt-Benjamin, T.S., Capkun, S.: Proximity-Based Access Control for Implantable Medical Devices. In: ACM Conference on Computer and Communications Sexscurity (2009)","DOI":"10.1145\/1653662.1653712"},{"key":"33_CR9","doi-asserted-by":"crossref","unstructured":"Halperin, D., Heydt-Benjamin, T.S., Ransford, B., Clark, S.S., Defend, B., Morgan, W., Fu, K., Kohno, T., Maisel, W.H.: Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses. In: IEEE Symposium on Security and Privacy (2008)","DOI":"10.1109\/SP.2008.31"},{"key":"33_CR10","unstructured":"Denning, T., Fu, K., Kohno, T.: Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security. In: HotSec (2008)"},{"key":"33_CR11","doi-asserted-by":"crossref","unstructured":"Gollakota, S., Hassanieh, H., Ransford, B., Katabi, D., Fu, K.: They Can Hear Your Heartbeats: Noninvasive Security for Implanted Medical Devices. In: ACM SIGCOMM (2011)","DOI":"10.1145\/2018436.2018438"},{"issue":"9","key":"33_CR12","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/35.312842","volume":"32","author":"R. Sandhu","year":"1994","unstructured":"Sandhu, R., Samarati, P.: Access control: Principles and practice. IEEE Communications Magazine\u00a032(9), 40\u201348 (1994), http:\/\/www.list.gmu.edu\/journals\/commun\/i94ac%28org%29.pdf","journal-title":"IEEE Communications Magazine"},{"key":"33_CR13","unstructured":"D. of Defense, Department of defense trusted computer system evaluation criteria, Department of Defense Standard, Tech. Rep., (December 1985), http:\/\/csrc.nist.gov\/publications\/history\/dod85.pdf"},{"key":"33_CR14","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role Based Access Control Models. IEEE Computer, 38\u201347 (February 1996)","DOI":"10.1109\/2.485845"},{"key":"33_CR15","doi-asserted-by":"crossref","unstructured":"Covington, M.J., Long, W., Srinivasan, S.: Secure Context-Aware Applications Using Environmental Roles. In: Proc. of 6th ACM Symp. on Access Control Models Tech. (2001)","DOI":"10.1145\/373256.373258"},{"key":"33_CR16","unstructured":"Al-Muhtadi, J., Ranganathan, A., Campbell, R.H., Mickunas, M.D.: Cerberus: A Context-Aware Security Scheme for Smart Spaces. In: Proc. IEEE Percom (2003)"},{"key":"33_CR17","unstructured":"Hu, J., Weaver, A.C.: Dynamic, Context-aware Security Infrastructure for Distributed Healthcare Applications. In: Proc. 1st Workshop on Pervasive Security, Privacy Trust (2004)"},{"key":"33_CR18","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1109\/PERCOM.2006.19","volume-title":"Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM 2006)","author":"S.K.S. Gupta","year":"2006","unstructured":"Gupta, S.K.S., Mukherjee, T., Venkatasubramanian, K.: Criticality Aware Access Control Model for Pervasive Applications. In: Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM 2006), pp. 251\u2013257. IEEE Computer Society, Washington, DC (2006)"},{"key":"33_CR19","unstructured":"USPTO Patent Application 20080044014. Secure telemetric link, http:\/\/www.freshpatents.com\/Secure-telemetric-link-dt20080221ptan200800%44014.php?type=description"},{"key":"33_CR20","doi-asserted-by":"crossref","unstructured":"Venkatasubramanian, K., Gupta, S.: Security for pervasive healthcare. In: Security in Distributed, Grid, Mobile, and Pervasive Computing, pp. 349\u2013366 (2007)","DOI":"10.1201\/9780849379253.pt4"},{"key":"33_CR21","doi-asserted-by":"crossref","unstructured":"Cherukuri, S., Venkatasubramanian, K.K., Gupta, S.K.S.: Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body. In: International Conference on Parallel Processing Workshops, pp. 432\u2013439 (October 2003)","DOI":"10.1109\/ICPPW.2003.1240399"},{"key":"33_CR22","doi-asserted-by":"crossref","unstructured":"Harland, C.J., Clark, T.D., Prance, R.J.: Electric potential probes - new directions in the remote sensing of the human body. In: Measurement Science and Technology, vol.\u00a013, p. 163 (2002)","DOI":"10.1088\/0957-0233\/13\/2\/304"},{"key":"33_CR23","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/1866914.1866917","volume-title":"Proceedings of the Second Annual Workshop on Security and Privacy in Medical and Home-care Systems (SPIMACS 2010)","author":"J.A. Hansen","year":"2010","unstructured":"Hansen, J.A., Hansen, N.M.: A taxonomy of vulnerabilities in implantable medical devices. In: Proceedings of the Second Annual Workshop on Security and Privacy in Medical and Home-care Systems (SPIMACS 2010), pp. 13\u201320. ACM, New York (2010)"},{"key":"33_CR24","doi-asserted-by":"crossref","unstructured":"Savci, H., Sula, A., Wang, Z., Dogan, N.S., Arvas, E.: MICS transceivers: regulatory standards and applications [medical implant communications service. In: Proceedings of IEEE SoutheastCon 2005, pp. 179\u2013182 (April 2005)","DOI":"10.1109\/SECON.2005.1423241"},{"issue":"4","key":"33_CR25","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1049\/iet-ifs.2009.0260","volume":"4","author":"J.M.A. Calero","year":"2010","unstructured":"Calero, J.M.A., Perez, G.M., Skarmeta, A.F.G.: Towards an Authorization Model for Distributed Systems based on the Semantic Web. IET Information Security. IET\u00a04(4), 411\u2013421 (2010)","journal-title":"IET Information Security. IET"},{"issue":"4","key":"33_CR26","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MSP.2009.102","volume":"7","author":"Q. Ni","year":"2009","unstructured":"Ni, Q., Bertino, E., Lobo, J., Calo, S.B.: Privacy aware Role Based Access Control. IEEE Security and Privacy\u00a07(4), 35\u201343 (2009)","journal-title":"IEEE Security and Privacy"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54525-2_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T20:17:52Z","timestamp":1746130672000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54525-2_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545245","9783642545252"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54525-2_33","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}