Font Size: a A A

Design Of Security System In EMR For Regional Health

Posted on:2014-02-06Degree:MasterType:Thesis
Country:ChinaCandidate:X H ZhuFull Text:PDF
GTID:2234330395993039Subject:Biomedical engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology and life sciences, the degree of hospital informatization keeps increasing. Electronic medical record(EMR) not only improves the efficiency of medical work comprehensively, but also improves the medical quality and standardizes the medical care, which has become the core application of digital hospital, its level of development represents the hospital’s level of digitization to a great degree.According to the EMR Adoption model which is offered by healthcare information and management systems society(HIMSS), in the highest stage of the EMR model, the hospital will have the ability to expand to regional health and fully support the electronic health record(EHR). Through the regional medical center, the data exchange and system interoperability among the hospitals and medical institutions in the region has become more and more frequent, the operations across platform and organizations become very frequent, which makes the security of EMR become more and more important.This thesis combines with the development status and trends of information systems security technology, and aims at the business requirement of EMR for regional health, uses the design and implementation methods of the security system in EMR for regional health. We use authentication technology to ensure the credibility and legitimacy of the system users, use access control technology to ensure availability and controllability of system, use improved operation log to ensure integrity and non-reputation of system data, use encryption technology to ensure Confidentiality of system key data. Through combining the four methods which talked above, the whole security system of EMR can be established.
Keywords/Search Tags:Regional Health, EMR, CA Certification, RBAC, Cache, AES
PDF Full Text Request
Related items