:::

詳目顯示

回上一頁
題名:以AVL Tree探討個人健康記錄於醫學中心之存取權限分級分類管控機制
書刊名:醫療資訊雜誌
作者:吳思緯鄭柏壎賴金鑫
作者(外文):Wu, Ssu-weiCheng, Po-hsunLai, Jin-shin
出版日期:2012
卷期:21:1
頁次:頁10-20
主題關鍵詞:存取控制資訊安全權限管理電子健康紀錄隱私Accessing controlInformation securityElectronic health recordsPrivacy
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:2
在資訊化的生活中,許多資料都已數位化,使得隱私保護成為一項越來越受重視的課題。什麼人可瀏覽特定人物的資料,誰又可對這些資料進行更新,都需要有明確的規範。因此要做到權限分級分類控制管理,以限制彼此間對於資料的存取權限,乃成為迫切需要解決的問題之一。而在這許多不同的情境中,由於醫院人員之職位身份非常多元化,且每種身分的存取權限各有不同,一位員工可能同時擔任兩種以上的職位,相對造成權限分級管理的複雜度,而醫院系統的使用者必須在不同身份權限之間來回切換,不僅麻煩且沒有效率,故至今還沒有高效率的機制來解決此問題。本研究就是以此為目的,首先透過改良先前以B-Tree 為設計基礎之版本,改以AVL Tree 為基礎的資料結構來儲存職員節點,作為權限判斷之依據。並設計出一個能指定身份權限給使用者,且於使用者進行存取時可自動判斷權限的系統,同時輔以Circular Doubly Linked List 來串連相同的使用者節點,加速搜尋功能。我們將大多數使用者所可能遇到的情境,加以進行分類,建立出不同的權限集合,對應到每種情境,使系統可自動對使用者的存取動作做權限判斷。並期望這樣的架構往後可被自由套用至相關的情境下,而不侷限於醫療機構之內。
In this informational life, many data have been digitalized and made privacy protection became a more and more important issue. For example, who can browse or update specific person’s data, it needs specific definition. So that to achieve the privilege level management for limiting each other's accessing privilege is one of the urgent problems that need to be solved. And in so many cases, take healthcare enterprise for instance. Due to the various identities in such environments and each of the identities have different privileges. One staff might act as more than one identity at the same time. Make the privilege management more complexity. And it still doesn't have an efficient solution to solve the problem. It is also the purpose of our research. We firstly improved the previous B-Tree-based data structure version with AVL Tree to store the staff nodes for authority determination basis. And design a system which can assign privileges to the user and can automatically judge the authority permission. Be supplemented by circular doubly linked list to connect the same user nodes in different trees and to accelerating the search function. We categorized most situations that users might encounter, and created different privilege sets that corresponding to each scenario. Let the system could automatically make permission decisions regards to users' accessing operations. We expect such system architecture can be adapted to any situation, not only in the healthcare enterprise.
期刊論文
1.Schoevers, M. A.、Muijsenbergh, M. E. T. C. van den、Largro-Janssen, A. L. M.(200910)。Patient-held records for undocumented immigrants: a blind spot. A systematic review of patient-held records。Ethnicity & Health,14(5),497-508。  new window
2.Safran, C.、Goldberg, H.(2000)。Electronic patient records and the impact of the Internet。International Journal of Medical Informatics,60(2),77-83。  new window
3.Shapiro, S. S.(201006)。Inside risks privacy by design: moving from art to practice。Communications of The ACM,53(6),27-29。  new window
4.Chen, Y. P.、Hsieh, S. H.、Cheng, P. H.、Chien, T. N.、Chen, H. S.、Lull, J. J.、Chen, S. J.(2010)。An agile enterprise regulation architecture for health information security management。Telemedicine and e-Health,16(7),807-817。  new window
5.Li, Gong(2011)。Java Security Architecture Revisited。Communications of the ACM,54(11),48-52。  new window
6.Muthulakshmi, A.、Anitha, R.、Sumathi, M.(2011)。Non-spilt Balancing Higher Order Tree for Multi-privilege Group。WSEAS Transactions on Communications,10(10),308-321。  new window
7.Chen, N.、Shou, L. D.、Chen, G.、Dong, J. X.(200811)。Adaptive Indexing of Moving Objects with Higher Variable Update Frequencies。Journal of Computer Science and Technology,23(6),998-1014。  new window
8.Meng, Q.、Ding, Y.(2007)。Small-world Network Inspired Trustworthy Web Service Evaluation and Management Model。Lecture Notes in Computer Science,4459,218-228。  new window
9.Song, H.、Zhu, S.、Zhang, W.、Cao, G.(200808)。Least Privilege and Privilege Deprivation: Toward Tolerating Mobile Sink Compromises in Wireless Sensor Networks。ACM Transactions on Sensor Networks,4(4)。  new window
10.Kaelber, D. C.、Jha, A. K.、Johnston, D.、Middleton, B.、Bates, D. W.(2008)。A research agenda for personal health records (PHRs)。Journal of the American Medical Informatics Association,15(6),729-736。  new window
會議論文
1.Kim, M. J.、Lee, H.、Pyeon, M.、Eo, Y.、Lee, D.、Lee, W.(2008)。A TMO Based Real-time Model: Supporting u-GIS Informative Construction Technology Innovation。The IEEE 4th International Conference on Networked Computing and Advanced Information Management,(會議日期: September 2-4,2008)。Gyeongju, Korea。  new window
2.Murase, Y.、Aikebaier, A.、Enokido, T.、Takizawa, M.(200803)。Distributed Database in Dynamic R-Tree for Vehicle Information System。The 22nd International Conference on Advanced Information Networking and Applications,(會議日期: March 2008),133-138。  new window
3.Zhou, L.、Ravishankar, C. V.(200606)。Dynamic Merkle Trees for Verifying Privilege in Sensor Networks。IEEE International Conference on Communications。Istanbul, Turkey。2276-2282。  new window
學位論文
1.姜育菁(2006)。論電子病歷政策對醫療資訊安全所生之影響-從病患權利保護出發(碩士論文)。國立臺北大學。  延伸查詢new window
2.陳秀雯(2003)。電子病歷資訊共享效益分析之研究(碩士論文)。中原大學。  延伸查詢new window
3.趙英傑(2008)。基於健康資訊交換第七層協定之個人健康記錄線上查詢系統(碩士論文)。亞洲大學。  延伸查詢new window
4.陳嬿如(2010)。二元樹之間的旋轉距離(博士論文)。國立臺灣科技大學。  延伸查詢new window
5.陳哲慶(2003)。使用二元樹資料結構探討產品組態問題(碩士論文)。大葉大學。  延伸查詢new window
6.朱恆興(2009)。在JFFS2上執行B+Tree的索引架構(碩士論文)。輔仁大學。  延伸查詢new window
圖書
1.Goodrich, M. T.、Tamassia, R.(2006)。Data Structures and Algorithms in JAVA。New Work:Wiley。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE