{"title":"医疗保健信息学中的安全性和保密性","authors":"Y. Al-Salqan","doi":"10.1109/ENABL.1998.725720","DOIUrl":null,"url":null,"abstract":"In order to provide secure healthcare informatics systems, three different security levels need to be considered: 1) secure healthcare applications to provide user authentication and access control mechanism to healthcare applications, components, and objects.; 2) secure database to provide the protection of the database against unauthorized disclosure, alteration, or distinction of healthcare information by legal personnel; and 3) secure communication infrastructure which provides the protection of healthcare informatics systems from unauthorized attempts to access information or interfere with its operation. The author emphasises the database and communication security. Several issues are learned from experience in the Advanced Research TEstbed on Medical Information System (ARTEMIS) project.","PeriodicalId":321059,"journal":{"name":"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1996-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":"{\"title\":\"Security and confidentiality in healthcare informatics\",\"authors\":\"Y. Al-Salqan\",\"doi\":\"10.1109/ENABL.1998.725720\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In order to provide secure healthcare informatics systems, three different security levels need to be considered: 1) secure healthcare applications to provide user authentication and access control mechanism to healthcare applications, components, and objects.; 2) secure database to provide the protection of the database against unauthorized disclosure, alteration, or distinction of healthcare information by legal personnel; and 3) secure communication infrastructure which provides the protection of healthcare informatics systems from unauthorized attempts to access information or interfere with its operation. The author emphasises the database and communication security. Several issues are learned from experience in the Advanced Research TEstbed on Medical Information System (ARTEMIS) project.\",\"PeriodicalId\":321059,\"journal\":{\"name\":\"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)\",\"volume\":\"68 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1996-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"14\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ENABL.1998.725720\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ENABL.1998.725720","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security and confidentiality in healthcare informatics
In order to provide secure healthcare informatics systems, three different security levels need to be considered: 1) secure healthcare applications to provide user authentication and access control mechanism to healthcare applications, components, and objects.; 2) secure database to provide the protection of the database against unauthorized disclosure, alteration, or distinction of healthcare information by legal personnel; and 3) secure communication infrastructure which provides the protection of healthcare informatics systems from unauthorized attempts to access information or interfere with its operation. The author emphasises the database and communication security. Several issues are learned from experience in the Advanced Research TEstbed on Medical Information System (ARTEMIS) project.