Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 2 de 2
Filtrar
Mais filtros










Base de dados
Intervalo de ano de publicação
1.
Stud Health Technol Inform ; 95: 136-40, 2003.
Artigo em Inglês | MEDLINE | ID: mdl-14663976

RESUMO

The healthcare environment consists of vast amounts of dynamic and unstructured information, distributed over a large number of information systems. Mobile agent technology is having an ever-growing impact on the delivery of medical information. It supports acquiring and manipulating information distributed in a large number of information systems. Moreover is suitable for the computer untrained medical stuff. But the introduction of mobile agents generates advanced threads to the sensitive healthcare information, unless the proper countermeasures are taken. By applying the role-based approach to the authorization problem, we ease the sharing of information between hospital information systems and we reduce the administering part. The different initiative of the agent's migration method, results in different methods of assigning roles to the agent.


Assuntos
Segurança Computacional , Informática Médica , Sistemas Computadorizados de Registros Médicos/normas , Acesso à Informação , Software
2.
Stud Health Technol Inform ; 90: 697-701, 2002.
Artigo em Inglês | MEDLINE | ID: mdl-15460782

RESUMO

Health information networks are expected to support information exchange that is authentic, accurate, private and available when, where and to whom is needed. With the increase of the shared medical information and resources in healthcare wireless information systems, unauthorized access to the information by illegal users also increases. The security of the transmitted information is a vital issue. In this paper, we report on the development of the Lightweight Authentication Protocol (LAP), which makes a mobile and distributed system more secure and flexible and we implement it in a Health Care Environment where the clinicians use mobile and wireless devices like PDAs. We also provide an indicative example of integrating the LAP with access control mechanisms. Context-based Team Access Control (C-TMAC) model is used in this example, since it provides great flexibility on user-permissions management in collaborative healthcare environments. LAP is indeed capable to support efficiently the advanced authorization procedures of such demanding active security models.


Assuntos
Segurança Computacional , Atenção à Saúde/organização & administração , Sistemas de Informação/organização & administração , Grécia
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...