• Title/Summary/Keyword: Client Requirements

Search Result 143, Processing Time 0.016 seconds

Design and Implementation of the SSL Component based on CBD (CBD에 기반한 SSL 컴포넌트의 설계 및 구현)

  • Cho Eun-Ae;Moon Chang-Joo;Baik Doo-Kwon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.3
    • /
    • pp.192-207
    • /
    • 2006
  • Today, the SSL protocol has been used as core part in various computing environments or security systems. But, the SSL protocol has several problems, because of the rigidity on operating. First, SSL protocol brings considerable burden to the CPU utilization so that performance of the security service in encryption transaction is lowered because it encrypts all data which is transferred between a server and a client. Second, SSL protocol can be vulnerable for cryptanalysis due to the key in fixed algorithm being used. Third, it is difficult to add and use another new cryptography algorithms. Finally. it is difficult for developers to learn use cryptography API(Application Program Interface) for the SSL protocol. Hence, we need to cover these problems, and, at the same time, we need the secure and comfortable method to operate the SSL protocol and to handle the efficient data. In this paper, we propose the SSL component which is designed and implemented using CBD(Component Based Development) concept to satisfy these requirements. The SSL component provides not only data encryption services like the SSL protocol but also convenient APIs for the developer unfamiliar with security. Further, the SSL component can improve the productivity and give reduce development cost. Because the SSL component can be reused. Also, in case of that new algorithms are added or algorithms are changed, it Is compatible and easy to interlock. SSL Component works the SSL protocol service in application layer. First of all, we take out the requirements, and then, we design and implement the SSL Component, confidentiality and integrity component, which support the SSL component, dependently. These all mentioned components are implemented by EJB, it can provide the efficient data handling when data is encrypted/decrypted by choosing the data. Also, it improves the usability by choosing data and mechanism as user intend. In conclusion, as we test and evaluate these component, SSL component is more usable and efficient than existing SSL protocol, because the increase rate of processing time for SSL component is lower that SSL protocol's.

Development of validated Nursing Interventions for Home Health Care to Women who have had a Caesarian Delivery (조기퇴원 제왕절개 산욕부를 위한 가정간호 표준서 개발)

  • HwangBo, Su-Ja
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.6 no.1
    • /
    • pp.135-146
    • /
    • 2000
  • The purpose of this study was to develope, based on the Nursing Intervention Classification (NIC) system. a set of standardized nursing interventions which had been validated. and their associated activities. for use with nursing diagnoses related to home health care for women who have had a caesarian delivery and for their newborn babies. This descriptive study for instrument development had three phases: first. selection of nursing diagnoses. second, validation of the preliminary home health care interventions. and third, application of the home care interventions. In the first phases, diagnoses from 30 nursing records of clients of the home health care agency at P. medical center who were seen between April 21 and July 30. 1998. and from 5 textbooks were examined. Ten nursing diagnoses were selected through a comparison with the NANDA (North American Nursing Diagnosis Association) classification In the second phase. using the selected diagnoses. the nursing interventions were defined from the diagnoses-intervention linkage lists along with associated activities for each intervention list in NIC. To develope the preliminary interventions five-rounds of expertise tests were done. During the first four rounds. 5 experts in clinical nursing participated. and for the final content validity test of the preliminary interventions. 13 experts participated using the Fehring's Delphi technique. The expert group evaluated and defined the set of preliminary nursing interventions. In the third phases, clinical tests were held at in a home health care setting with two home health care nurses using the preliminary intervention list as a questionnaire. Thirty clients referred to the home health care agency at P. medical center between October 1998 and March 1999 were the subjects for this phase. Each of the activities were tested using dichotomous question method. The results of the study are as follows: 1. For the ten nursing diagnoses. 63 appropriate interventions were selected from 369 diagnoses interventions links in NlC., and from 1.465 associated nursing activities. From the 63 interventions. the nurses expert group developed 18 interventions and 258 activities as the preliminary intervention list through a five-round validity test 2. For the fifth content validity test using Fehring's model for determining lCV (Intervention Content Validity), a five point Likert scale was used with values converted to weights as follows: 1=0.0. 2=0.25. 3=0.50. 4=0.75. 5=1.0. Activities of less than O.50 were to be deleted. The range of ICV scores for the nursing diagnoses was 0.95-0.66. for the nursing interventions. 0.98-0.77 and for the nursing activities, 0.95-0.85. By Fehring's method. all of these were included in the preliminary intervention list. 3. Using a questionnaire format for the preliminary intervention list. clinical application tests were done. To define nursing diagnoses. home health care nurses applied each nursing diagnoses to every client. and it was found that 13 were most frequently used of 400 times diagnoses were used. Therefore. 13 nursing diagnoses were defined as validated nursing diagnoses. Ten were the same as from the nursing records and textbooks and three were new from the clinical application. The final list included 'Anxiety', 'Aspiration. risk for'. 'Infant behavior, potential for enhanced, organized'. 'Infant feeding pattern. ineffective'. 'Infection'. 'Knowledge deficit'. 'Nutrition, less than body requirements. altered', 'Pain'. 'Parenting'. 'Skin integrity. risk for. impared' and 'Risk for activity intolerance'. 'Self-esteem disturbance', 'Sleep pattern disturbance' 4. In all. there were 19 interventions. 18 preliminary nursing interventions and one more intervention added from the clinical setting. 'Body image enhancement'. For 265 associated nursing activities. clinical application tests were also done. The intervention rate of 19 interventions was from 81.6% to 100%, so all 19 interventions were in c1uded in the validated intervention set. From the 265 nursing activities. 261(98.5%) were accepted and four activities were deleted. those with an implimentation rate of less than 50%. 5. In conclusion. 13 diagnoses. 19 interventions and 261 activities were validated for the final validated nursing intervention set.

  • PDF

Medical Information Dynamic Access System in Smart Mobile Environments (스마트 모바일 환경에서 의료정보 동적접근 시스템)

  • Jeong, Chang Won;Kim, Woo Hong;Yoon, Kwon Ha;Joo, Su Chong
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.47-55
    • /
    • 2015
  • Recently, the environment of a hospital information system is a trend to combine various SMART technologies. Accordingly, various smart devices, such as a smart phone, Tablet PC is utilized in the medical information system. Also, these environments consist of various applications executing on heterogeneous sensors, devices, systems and networks. In these hospital information system environment, applying a security service by traditional access control method cause a problems. Most of the existing security system uses the access control list structure. It is only permitted access defined by an access control matrix such as client name, service object method name. The major problem with the static approach cannot quickly adapt to changed situations. Hence, we needs to new security mechanisms which provides more flexible and can be easily adapted to various environments with very different security requirements. In addition, for addressing the changing of service medical treatment of the patient, the researching is needed. In this paper, we suggest a dynamic approach to medical information systems in smart mobile environments. We focus on how to access medical information systems according to dynamic access control methods based on the existence of the hospital's information system environments. The physical environments consist of a mobile x-ray imaging devices, dedicated mobile/general smart devices, PACS, EMR server and authorization server. The software environment was developed based on the .Net Framework for synchronization and monitoring services based on mobile X-ray imaging equipment Windows7 OS. And dedicated a smart device application, we implemented a dynamic access services through JSP and Java SDK is based on the Android OS. PACS and mobile X-ray image devices in hospital, medical information between the dedicated smart devices are based on the DICOM medical image standard information. In addition, EMR information is based on H7. In order to providing dynamic access control service, we classify the context of the patients according to conditions of bio-information such as oxygen saturation, heart rate, BP and body temperature etc. It shows event trace diagrams which divided into two parts like general situation, emergency situation. And, we designed the dynamic approach of the medical care information by authentication method. The authentication Information are contained ID/PWD, the roles, position and working hours, emergency certification codes for emergency patients. General situations of dynamic access control method may have access to medical information by the value of the authentication information. In the case of an emergency, was to have access to medical information by an emergency code, without the authentication information. And, we constructed the medical information integration database scheme that is consist medical information, patient, medical staff and medical image information according to medical information standards.y Finally, we show the usefulness of the dynamic access application service based on the smart devices for execution results of the proposed system according to patient contexts such as general and emergency situation. Especially, the proposed systems are providing effective medical information services with smart devices in emergency situation by dynamic access control methods. As results, we expect the proposed systems to be useful for u-hospital information systems and services.