Local Access and Security Strategies of Medical Data

Article Preview

Abstract:

Hospital network office automation system could make the hospital connected by a PC, terminal equipment, medical equipment and hospital networks to link up and connected to the Internet. In this paper, the star tree on the hospital's existing network structure transformation, using port aggregation technology upgrades to existing network data transmission and improve the operating efficiency of the entire hospital network, and the hospital server, computer workstation security configuration and remote management configuration, database and application development of all types of information systems are a good network support.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1578-1581

Citation:

Online since:

September 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] D. Gritzalis, C. Lambrinoudakis: A security architecture for interconnecting health information systems, International Journal of Medical Informatics, Vol. 73 (2004), pp.305-309.

DOI: 10.1016/j.ijmedinf.2003.12.011

Google Scholar

[2] Ó. J. Rubio, Á. Alesanco, J. García: A robust and simple security extension for the medical standard SCP-ECG, Journal of Biomedical Informatics, Vol. 46 (2013), pp.142-151.

DOI: 10.1016/j.jbi.2012.07.007

Google Scholar

[3] G. Reni, M. Molteni, S. Arlotti, F. Pinciroli: Chief medical officer actions on information security in an Italian rehabilitation centre, International Journal of Medical Informatics, Vol. 73 (2004), pp.271-279.

DOI: 10.1016/j.ijmedinf.2003.11.022

Google Scholar

[4] H. Linden, D. Kalra, A. Hasman, J. Talmon: Inter-organizational future proof EHR systems: A review of the security and privacy related issues, International Journal of Medical Informatics, Vol. 78 (2009), pp.141-160.

DOI: 10.1016/j.ijmedinf.2008.06.013

Google Scholar

[5] S. Chatterjee, A. K. Das, J. K. Sing: A novel and efficient user access control scheme for wireless body area sensor networks, Journal of King Saud University - Computer and Information Sciences, Vol. 26 (2014), pp.181-201.

DOI: 10.1016/j.jksuci.2013.10.007

Google Scholar

[6] T. S. Ravindran: Poverty, food security and universal access to sexual and reproductive health services: a call for cross-movement advocacy against neoliberal globalization, Reproductive Health Matters, Vol. 22 (2014), pp.14-27.

DOI: 10.1016/s0968-8080(14)43751-0

Google Scholar

[7] J. L. Fernández-Alemán, I. C. Señor, P. Á. O. Lozoya: Security and privacy in electronic health records: A systematic literature review, Journal of Biomedical Informatics, Vol. 46 (2013), pp.541-562.

DOI: 10.1016/j.jbi.2012.12.003

Google Scholar

[8] W. M. Fitzgerald, U. Neville, S. N. Foley: MASON: Mobile autonomic security for network access controls, Journal of Information Security and Applications, Vol. 18 (2013), pp.14-29.

DOI: 10.1016/j.jisa.2013.08.001

Google Scholar

[9] T. Neubauer, J. Heurix: A methodology for the pseudonymization of medical data, International Journal of Medical Informatics, Vol. 80 (2011), pp.190-204.

DOI: 10.1016/j.ijmedinf.2010.10.016

Google Scholar