Browse > Article

A Study of Methodology Based on Role-Based Serucity Agent Medical Information System Security Architecture Design  

Lee, Dae-Sung (경기대학교 산업기술보호특화센터)
Noh, Si-Choon (남서울대학교 컴퓨터학과)
Publication Information
Abstract
In addition to the rapid development of health information technology services for the development of new medical information, a lot of research is underway. Improve health care services for patients are many ways to help them. However, no information about the security, if only the technology advances in health care systems will create an element of risk and threat. Today's issues and access issues are stable over a public network. Ad hocsensor network using secure, non-integrated health information system's security vulnerabilities does not solve the security vulnerabilities. In the development and utilization of health information systems to be subject to greater restrictions. Different security policies in an environment with a medical information system security policy mechanism that can be resolved if people get here are needed. Context-aware and flexible policy of integration and confidential medical information through the resistance should be guaranteed. Other cross-domain access control policy for telecommunications should be protected. In this paper, that the caller's medical information system, diversification, diversification Security agent in the environment, architecture, design, plan, role-based security system are proposed. The proposed system architecture, design work in the field and in the utilization of one model are expected to be.
Keywords
Security Agent; Medical Environment; Security Methodology;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 J.W. Choi, S.Y. Yoo, H.Y. Park, J.H. Chun, "Design and Implementation of HL7-based Real-time Data Communication for Mobile Clinical Information System", J. Biomed. Eng. Res. Vol.26, No2, 65-71, 2005.
2 Dimitris Gritzalis, Costas Lambrinoudakis, "A security architecture for interconnecting health information systems", International Journal of Medical Informatics 73, 305-309, 2004.   DOI   ScienceOn
3 Bernd Blobel, "Authorisation and access control for electronic health record systems", Interna tional Journal of Medical Informatics 73, 251 -257, 2004.   DOI   ScienceOn
4 Richard E. Scott, Penny Jennett, Maryann Yeo, "Access and authorisation in a Glocal e-Health Policy context", International Journal of Medical Informatics 73, 259-266, 2004.   DOI   ScienceOn
5 CodeBlue: An Ad Hoc Sensor Network Infrast rcture for Emergency Medical Care, David Malan, Thaddeus Fulford-Jones, Matt Welsh, and Steve Moulton. International Workshop on Wearable and Implantable Body Sensor Netw orks, April 2004.
6 Wireless Sensor Networks for Emergency Medical Care. Presented at GE Global Research, March 8, 2004
7 Biomedical telemedicine - CSCI E-170 January 11, 2005
8 Healthwear:Medical Technology Becomes Wearable - 2004 IEEE