Browse > Article

A Building Method of Infrastructure Efficiency under Ad Hoc-based on Network Infrastructure for Medical Information System  

Noh, Si-Choon (남서울대학교 컴퓨터학과)
Yoo, Seung-Jae (중부대학교 정보보호학과)
Publication Information
Abstract
Medical information system based on ad hoc network designed for general information systems and information networks have different security requirements. Malicious code infiltration and security features are performed on same medical information network architecture along the route. Security domain of medical information systems is the ground of penetration and defense performed over the network architecture and it is also the traffic handling areas separated by a concept of differentiated group. Ad hoc-based medical information systems in the network security domain, set some standards about what should be the methodology of this study. In this paper, medical information system network configuration, the determining factor based on the security domain, the structure selection criteria and blocking positionings are presented according to the traffic route configuration. If you apply this methodology designed to increase security, efficiency can be possible. Health information systems in accordance with the security domain areas requires differentiated protection needs of the security mechanism that is proposed by this study.
Keywords
Medical Information; Efficiency; Infrastructure;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Sichoon,Noh, "Building of an Integrated Multilevel Virus Protection Infrastructure", IEEE Computer Society,2005.12.
2 Sichoon, Noh,Dong Chun Lee,"Assurance Method of High Availability inInformation Security Infrastructure System", SCIELNCS 3794,2005.12
3 Sichoon,Noh,"A Securing Method of Multispectral Protection Infrastructure for Malicious Traffic in Intrne System", DCS, 2006.02
4 Paul Woosnam, "10 hottest Technologies",Telecommunications, 2003.4
5 Sichoon,Noh,Dong Chun Lee, "Multi-Level Protection Building for Virus Protection Infrastructure, SCIELNCS 3036,2004.6
6 ITU-T Rec. Y.1221,"Traffic Control and Congesti on Control inlPBased Networks,"March, 2002.
7 J, K Kwon, S. Park and D. K Sung, "Log-like lihood ratio(LLR) conversion schemes in orthogonal code hopping multiplexing," IEEE Comm. Letters, vol. 7, no. 3, pp. 104-106, Mar. 2003.   DOI
8 D. Yoon and K Cho, "General bit error probab ility of rectangular quadrature amplitude modulation," IEE Electronics Letters, vol. 38, no. 3, pp. 131-132, JanuaIy 2002.   DOI   ScienceOn
9 Sichoon Noh, Dong Chun Lee, and Kuimam J,Kim, "Improved Structure Management of Gateway Firewall Systems for Effective Networks Security", Springer, 2003.
10 Sichoon Noh, Dong Chun Lee, and Kuima m J,Kim, ''IrnprovedStructure Management of Gateway Firewall Systems for Effective Networks Security", Springer, 2003.
11 김태경.서희석.김희완, 서비스 응답시간 보장을 위한 패킷 손실에 관한 연구, 2005
12 김태성,이금석, 웹 어플리케이션 응답시간 모니터링 API의 설계 및 구현, 2000