Design and Realization of Network Security Defense Architecture of Medical Information Integration Platform

Article Preview

Abstract:

In this paper, based on the characteristics of heterogeneous information integration, a set of complete medical information integration platform network security defense architecture was designed by utilizing network security defense equipment and technologies such as gatekeeper, disk array and hot-standby etc. On the basis of overall design, the construction, deployment and operation of related system were realized. At last, the effectiveness of the network security defense architecture designed and realized in this paper was tested by means of fault injection.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

600-606

Citation:

Online since:

September 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Zhuo Xing. Study on the construction of the hospital information network security protection system [J]. Fujian Computer, 2010(10): 165-166.

Google Scholar

[2] Zhu Xiaofeng. Study on the municipal health record information system network security protection system [J]. Information Research, 2011(08): 68-70.

Google Scholar

[3] Zhang Zhenzhen, Cao Yunjing, Sun Shangwu. Study on the architecture of major hospitals network security protection system [J]. Modern Hospital, 2008(09): 137-138.

Google Scholar

[4] Qiu Jie, Zhou Xiaolong, Xie Xiaoyu. Construction and Practice of Security Protection System of Hospital Information Network [J]. China Digital Medicine, 2008(12): 25-26.

Google Scholar

[5] VISCHER M, BOUTELLIER R, BREITENMOSER P. Implementation of a gatekeeper structure for business and technology intelligence[J]. International Journal of Technology Intelligence and Planning, 2010, 6(2): 111-127.

DOI: 10.1504/ijtip.2010.035152

Google Scholar

[6] CALYAM P, TRUEB G, HOWES N. Evaluation of gatekeeper proxies for firewall traversal in secure videoconferencing systems[J]. International Journal of Internet Protocol Technology, 2010, 5(1-2): 32-43.

DOI: 10.1504/ijipt.2010.032613

Google Scholar

[7] CHEN C H, TING Y, LU W B, et al. Recovery mechanism design for hot standby computer system: System Security and Assurance, October 5, 2003 - October 8, 2003, Washington, DC, United states, 2003[C]. Institute of Electrical and Electronics Engineers Inc.

DOI: 10.1109/icsmc.2003.1244352

Google Scholar

[8] ZHOU X, QIN X, XU Z. Research on highly available database Hot Standby system and its performance[J]. Zhongguo Kuangye Daxue Xuebao/Journal of China University of Mining and Technology, 2011, 40(2): 315-320.

Google Scholar

[9] XU F, YANG S. Hot standby method for microcomputer-based double-channel excitation regulator[J]. Dianli Zidonghua Shebei / Electric Power Automation Equipment, 2009, 29(2): 106-109.

Google Scholar

[10] Li Dongwu. Design and Implementation of HIS with Double- server Standby and Data Backup [J]. China Medical Equipment, 2008(07): 38-40.

Google Scholar