Research on Software Key Technology of Implement EHR at Small Medium Enterprises

Article Preview

Abstract:

Solving the key technology of software system is the foundation of the enterprise implementation of EHR. For small medium enterprise data quantity is little, and lack of a large amount of money to support, carry on the key techniques of EHR software studies. First, research software framework technology, compare the characteristics of the J2EE framework and the.Net framework, recommend the latter, and give the frame structure; Study on performance evaluation index system, illustrate the basic idea of target management, design implementation procedures of target management; Finally, research system security, design three-dimensional framework based on OSI model network security system structure, make use of the SSL protocol to improve data security between application factors. The results of the study show that, software key technology for small medium enterprises implementation of EHR has the important practical significance.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 452-453)

Pages:

716-720

Citation:

Online since:

January 2012

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Baidu know, What is EHR, http: /zhidao. baidu. com/question/3455102. html, 2011-08-10.

Google Scholar

[2] Y.C. Ren, T. Xing, X. E, Software Development Process Management, Beijing Jiaotong University Press, (2010).

Google Scholar

[3] Z.B. Fang, T. Xing, X. E, Performance Management of Strategy and Strategic, Economic Science Press, (2005).

Google Scholar

[4] D. Liu, Performance Appraisal Study of Developers in Medium-small Software Enterprises, " Master, s degree of Lanzhou University of Technology, (2008).

Google Scholar

[5] W. Wu, Software developers in the performance management problems and countermeasures, Enterprise Economy, vol. 30, no. 9, pp.16-19, (2009).

Google Scholar

[6] B.R. Zou, C. Li, Y.X. Jiang, Research on the Security Architecture of Important Information System under Network Environment, China Safety Science Journal, vol. 20, no. 1, pp.142-148, (2010).

Google Scholar

[7] J.M. Xiao, J. Liu, H.G. Zhou, Network Information Safety, China Machine Press, (2006).

Google Scholar

[8] Y.H. Yang, Y. Hu, E-government Information System's Security Protection System, Computer Security, vol. 10, no. 4, pp.72-74, (2010).

Google Scholar

[9] Jianfeng, SSL Security Protocols, Hand in Hand Education Forum (http: /www. jysls. com/thread-169208-1-1. html), 2011-08-11.

Google Scholar