Firewalls and Internet security: repelling the wily hacker
Firewalls and Internet security: repelling the wily hacker
Building Internet firewalls (2nd ed.)
Building Internet firewalls (2nd ed.)
Implementing a distributed firewall
Proceedings of the 7th ACM conference on Computer and communications security
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Some Ideas About Intelligent Medical System Design
CBMS '99 Proceedings of the 12th IEEE Symposium on Computer-Based Medical Systems
Fang: A Firewall Analysis Engine
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Firmato: A novel firewall management toolkit
ACM Transactions on Computer Systems (TOCS)
Current Issues in Health Care Informatics
Journal of Medical Systems
Corporate Computer and Network Security
Corporate Computer and Network Security
Challenges in Health Informatics
HICSS '07 Proceedings of the 40th Annual Hawaii International Conference on System Sciences
A Flexible Policy-Based Firewall Management Framework
CW '08 Proceedings of the 2008 International Conference on Cyberworlds
Accuracy of intelligent medical systems
Computer Methods and Programs in Biomedicine
Patient controlled encryption: ensuring privacy of electronic medical records
Proceedings of the 2009 ACM workshop on Cloud computing security
TAP.NET: A Windows Messaging Service for Nursing Staff
Journal of Medical Systems
Manual nurse messaging with patient information using a mobile whiteboard system
Computer Methods and Programs in Biomedicine
Hi-index | 0.00 |
With the progress and the development of information technology, the internal data in medical organizations have become computerized and are further established the medical information system. Moreover, the use of the Internet enhances the information communication as well as affects the development of the medical information system that a lot of medical information is transmitted with the Internet. Since there is a network within another network, when all networks are connected together, they will form the "Internet". For this reason, the Internet is considered as a high-risk and public environment which is easily destroyed and invaded so that a relevant protection is acquired. Besides, the data in the medical network system are confidential that it is necessary to protect the personal privacy, such as electronic patient records, medical confidential information, and authorization-controlled data in the hospital. As a consequence, a medical network system is considered as a network requiring high security that excellent protections and managerial strategies are inevitable to prevent illegal events and external attacks from happening. This study proposes secure medical managerial strategies being applied to the network environment of the medical organization information system so as to avoid the external or internal information security events, allow the medical system to work smoothly and safely that not only benefits the patients, but also allows the doctors to use it more conveniently, and further promote the overall medical quality. The objectives could be achieved by preventing from illegal invasion or medical information being stolen, protecting the completeness and security of medical information, avoiding the managerial mistakes of the internal information system in medical organizations, and providing the highly-reliable medical information system.