首页> 美国卫生研究院文献>other >EMRlog Method for Computer Security for Electronic Medical Records with Logic and Data Mining
【2h】

EMRlog Method for Computer Security for Electronic Medical Records with Logic and Data Mining

机译:具有逻辑和数据挖掘功能的电子病历计算机安全性的EMRlog方法

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

The proper functioning of a hospital computer system is an arduous work for managers and staff. However, inconsistent policies are frequent and can produce enormous problems, such as stolen information, frequent failures, and loss of the entire or part of the hospital data. This paper presents a new method named EMRlog for computer security systems in hospitals. EMRlog is focused on two kinds of security policies: directive and implemented policies. Security policies are applied to computer systems that handle huge amounts of information such as databases, applications, and medical records. Firstly, a syntactic verification step is applied by using predicate logic. Then data mining techniques are used to detect which security policies have really been implemented by the computer systems staff. Subsequently, consistency is verified in both kinds of policies; in addition these subsets are contrasted and validated. This is performed by an automatic theorem prover. Thus, many kinds of vulnerabilities can be removed for achieving a safer computer system.
机译:医院计算机系统的正常运行对管理人员和员工而言是一项艰巨的工作。但是,不一致的策略经常出现,并且会产生巨大的问题,例如信息被盗,频繁出现故障以及整个或部分医院数据丢失。本文提出了一种用于医院计算机安全系统的名为EMRlog的新方法。 EMRlog专注于两种安全策略:指令策略和已实施策略。安全策略应用于处理大量信息的计算机系统,例如数据库,应用程序和病历。首先,使用谓词逻辑应用语法验证步骤。然后,使用数据挖掘技术来检测计算机系统人员确实实施了哪些安全策略。随后,两种策略的一致性都得到验证;此外,对这些子集进行了对比和验证。这由自动定理证明器执行。因此,可以消除许多漏洞,以实现更安全的计算机系统。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号