:::

詳目顯示

回上一頁
題名:網際網路病歷資訊之安全管理:角色存取控制機制之建置
書刊名:醫療資訊雜誌
作者:劉敦仁 引用關係吳美玉 引用關係李旭登黎尚育
作者(外文):Liu, Duen-renWu, Mei-yuLee, Shu-tengLi, Shang-yu
出版日期:2000
卷期:11
頁次:頁17-38
主題關鍵詞:病歷記錄網際網路以角色為基礎的存取控制身份識別資訊安全Patient recordsInternetRole-based access controlIdentity authenticationInformation security
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:46
     病歷資訊是醫療系統中最重要的資訊,而在開放的網路環境,病人的私密性必須透過存取控制與授權管理機制予以確保。存取控制主要是判斷醫療使用者是否有權使用或更動病歷資訊,而授權管理則規範使用者可以擔任之醫療角色及每個醫療角色之權限。本研究根據所分析的各種病歷資訊使用角色與其對於病歷資訊之使用權限,整合資訊安全技術及網路上之身分識別技術,設計以角色為基礎的存取控制機制於網路上病歷資訊之安全管理。所設計的安全機制規範了使用者被授權擔任之角色,以及每個角色所賦予的存取病歷資料之權限,並且整合身份識別來確認使用者身份及可擔任的醫療角色,進而依據其啟動擔任之角色決定存取權限.以進行安全控管。安全機制並且使用加解密技術,以確保病歷資料在網路傳輸的安全性。研究結果顯示整合角色存取控制機制、身份識別及加解密技術,可有效的提供網際網路存取病歷資料之安全控管。此外,訂定標準規範與政策是相當重要的,本文建議主管衛生單位需針對醫療角色及其存取權限制訂各醫療組織需遵循之標準規範與政策。
     Patient records are the most important information for health care systems. The prevalentuse of Internet makes the access to patient records more convenient. However, as an openenvironment on the Internet, it is necessary to protect the privacy of patients. To achieve securityrequirements, security mechanisms are required to implement access control and authorizationmanagement of patient records. Access control determines whether a medical user has theprivilege to access patient records. Authorization management enacts the assignment of users toroles and the assignment of permissions to roles. This work analyzes various medical roles andaccess permissions on patient records. Integrated with the technologies on information securityand identity authentication, a role-based access control scheme is developed to control the accessto patient records on the Internet. The authorization of roles to users as well as the authorization ofpermissions to roles is enforced. The scheme integrates identity authorization to verify a user'sidentity and authorized roles. The user's access privileges are further determined according to the permissions of authorized roles. Data security on the Internet is enforced by encryption. The resultshows that secure Internet access to patient records can be achieved effectively by integratingrole-based access control, identity authentication and encryption technologies. Furthermore, ourstudy suggests that it is important to develop organization-wide policies for the enactment ofmedical roles and corresponding legal permissions on patient records.
期刊論文
1.Dowd, S. B.、Dowd, L. P.(1996)。Maintaining Confidentiality: Health Care’s Ongoing Dilemma。Health Care Supervisor,15(1)。  new window
2.Sandhu, R. S.、Coyne, E. J.(1996)。Role-based Access Control Models。IEEE Computer,29(2),38-47。  new window
3.Wright, B.(1994)。Security Concerns of Computer-Based Health Care Information。Computer Security Journal,10(1)。  new window
4.Morrissey, J.(1996)。Patient Privacy Requires Cultural Revolution。Modern Healthcare,26(40)。  new window
5.Rivest, R. L.、Shamir, A.、Adleman, L.(1978)。A Method for Obtaining Digital Signatures and Public Key Cryptosystems。Communications of the ACM,21(2)。  new window
6.Waegemann, C. P.(1995)。Industry in Focus: Developing a Security Policy for Health Care Providers。Computer Security Journal,11(1)。  new window
7.Morrissey, J.(1996)。Securing the Internet Frontier。Modern Healthcare,26(43)。  new window
8.Detmer, D. E.(1996)。Who should have access to your medical record? Good health care is built on good data。Business & Health,14(2)。  new window
9.Sandhu, R. S.、Samarati, P.(1994)。Access Control: Principles and Practice。IEEE Comm. Magazine,1994(Sep.),40-48。  new window
會議論文
1.Barkley, L(1995)。Implementing Role Based Access Control using Object Technology。First ACM Workshop on Role Based Access Control。  new window
2.Ferraiolo, D. F.、Cugini, J. A.、Kuhn, D. R.(1995)。Role-based Access Control (RBAC): Features and Motivations。11th Annual Computer Security Application Conference。IEEE Computer Society Press。241-248。  new window
3.Ferraiolo, D. F.、Kuhn, R.(1992)。Role-Based Access Control。15th NIST-NCSC National Computer Security Conference,554-563。  new window
4.Giuri, L.、Lglio, P.(1996)。A Role-Based Secure Database Design Tool。12th Annual Computer Security Applications Conference。  new window
5.Gustafsson, M.、Deligny, B.、Shahmehri, N.(1997)。Using NFS to Implement Role-Based Access Control。IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises。  new window
6.Sandhu, R. S.、Munawer, Q.(1998)。The RRA97 Model for Role-Based Administration of Role Hierarchies。ACSAC98 conference。  new window
7.Simon, R. T.、Zurko, M. E.(1997)。Separation of Duty in Role-Based Environments。10th Computer Security Foundations Workshop,(會議日期: 1997/06/10-06/12)。  new window
研究報告
1.Poole, J.、Barkley, J.、Brady, K.、Cincotta, A.、Salamon, W.(1996)。Distributed Communication Methods and Role-Based Access control for Use in Health Care Applications。  new window
圖書
1.Schneier, B.(1996)。Applied Cryptography。John Wiley & Sons, Inc.。  new window
其他
1.RSAEURO release 1.04,http://www.sourcery.demon.co.uk/rsaann.html。  new window
2.行政院研究發展考核委員會(1997)。行政機關資訊安全管理作業原則。  延伸查詢new window
3.ITU-T。Information Technology-Open Systems Interconnection-The Directory: Authentication Framework(ISO/IEC 9594-8)。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top