Author image not provided
 Heather M Conboy

Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article1.00
Citation Count5
Publication count5
Publication years2010-2017
Available for download4
Average downloads per article101.25
Downloads (cumulative)405
Downloads (12 Months)236
Downloads (6 Weeks)18
Arrow RightAuthor only

See all colleagues of this author

See all subject areas


5 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 5 of 5
Sort by:

1 published by ACM
March 2017 ACM Transactions on Privacy and Security (TOPS): Volume 20 Issue 2, May 2017
Publisher: ACM
Citation Count: 0
Downloads (6 Weeks): 6,   Downloads (12 Months): 165,   Downloads (Overall): 165

Full text available: PDFPDF
In this article, we present an approach for systematically improving complex processes, especially those involving human agents, hardware devices, and software systems. We illustrate the utility of this approach by applying it to part of an election process and show how it can improve the security and correctness of that ...
Keywords: elections, iterative analysis, model checking, Process modeling, fault tree analysis

2 published by ACM
May 2016 SEHS '16: Proceedings of the International Workshop on Software Engineering in Healthcare Systems
Publisher: ACM
Citation Count: 1
Downloads (6 Weeks): 10,   Downloads (12 Months): 54,   Downloads (Overall): 93

Full text available: PDFPDF
This paper presents an approach for automatically generating Smart Checklists---context-dependent, dynamically updated views of on-going medical processes based on current activities and previously validated process models of best practices. This approach addresses not only nominal scenarios but includes guidance when exceptional situations arise. The framework for creating these checklists is ...
Keywords: checklist, healthcare, process guidance

May 2014 SPW '14: Proceedings of the 2014 IEEE Security and Privacy Workshops
Publisher: IEEE Computer Society
Citation Count: 2

The insider threat is one of the most pernicious in computer security. Traditional approaches typically instrument systems with decoys or intrusion detection mechanisms to detect individuals who abuse their privileges (the quintessential "insider"). Such an attack requires that these agents have access to resources or data in order to corrupt ...
Keywords: insider threat, process modeling, elections, sabotage, data exfiltration

May 2013 SEHC '13: Proceedings of the 5th International Workshop on Software Engineering in Health Care
Publisher: IEEE Press
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 5,   Downloads (Overall): 19

Full text available: PDFPDF
Medical device requirements often depend on the healthcare processes in which the device is to be used. Since such processes may be complex, critical requirements may be specified inaccurately, or even missed altogether. We are investigating an automated requirement derivation approach that takes as input a model of the healthcare ...
Keywords: healthcare processes, learning algorithms, modes, requirement specifications, medical devices, model checking

5 published by ACM
November 2010 IHI '10: Proceedings of the 1st ACM International Health Informatics Symposium
Publisher: ACM
Citation Count: 2
Downloads (6 Weeks): 1,   Downloads (12 Months): 9,   Downloads (Overall): 117

Full text available: PDFPDF
One goal of medical device certification is to show that a given medical device satisfies its requirements. The requirements that should be met by a device, however, depend on the medical processes in which the device is to be used. Such processes may be complex and, thus, critical requirements may ...
Keywords: learning algorithms, requirement specifications, medical devices, medical processes, model checking

The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us