Your browser doesn't support javascript.
loading
Montrer: 20 | 50 | 100
Résultats 1 - 3 de 3
Filtre
Ajouter des filtres








Gamme d'année
1.
Chinese Medical Equipment Journal ; (6)1989.
Article Dans Chinois | WPRIM | ID: wpr-593853

Résumé

Objective To design a set of feasible program of data monitor based on the database's security of the "No.1 Military Medical Project" in many years of running successful operation to enhance safety audit of database.Methods The system was consisted with date's collection of active and passive for safety information,preservation of backup data,and analysis of credibility dictionaries and auditing.Results The complete processing program of network security monitor which could form alarm message and advance corresponding disposal plans was came into being and its better reliability.Conclusion By using the way,the question of the "No.1 Military Medical Project" in database monitoring is solved in network environment and ensured safe operation of database,the network security of the "No.1 Military Medical Project" system is promoted.

2.
Chinese Medical Equipment Journal ; (6)1989.
Article Dans Chinois | WPRIM | ID: wpr-588587

Résumé

Nurse workstation, a typical client program of "No.1 Military" project, is trailed and speculated with Oracle tools such as TOAD, and then the general startup flow mode for "No.1 Military" project can be determined, which is instructive for its maintenance and programming.

3.
Chinese Medical Equipment Journal ; (6)1989.
Article Dans Chinois | WPRIM | ID: wpr-584392

Résumé

With the advance of hospital digitization, the computer technology and the utilization of database are greatly enhanced, and thus the information security situation of hospital has been more and more serious. The computer entering hospital's network illegally and the unauthorized application program seriously threaten the security of hospital's database and network. This article discusses a security model of medical database of LAN in practice from the aspects of authorized document library, daemon program and monitoring, reporting and the orientation of the illegal computer. With source creativity, the model is significant to the security of medical network or other network. It is suggested that a real-time medical database monitoring system be set up to monitor network.

SÉLECTION CITATIONS
Détails de la recherche