Security by IC Card System in Medical Information System

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Perspectives on hospital information system in medical practice

Introduction: The most effective method of collecting, storage, communication and presentation of huge amount of Information in order to obviate user needs is computer. The comprehensive hospital information system (HIS) resulted in processing of information, operational and hospital control needs in daily practice, and also accelerating and facilitating in planning, budgeting and managem...

متن کامل

Smart Card based Robust Security System

In the up to date electronic planet, authentication of an individual is a vital assignment in numerous territories of everyday existence. Smart Cards are secure compact space gadgets utilized for a few requisitions specifically security identified ones including access to framework's database either connected or disconnected from the net. Smartcard are regularly “secure” movable units. It is an...

متن کامل

Trend of Autonomous Decentralized System Technologies and Their Application in IC Card Ticket System

The advancement of technology is ensured by step-bystep innovation and its implementation into society. Autonomous Decentralized Systems (ADSs) have been growing since first proposed in 1977. Since then, the ADS technologies and their implementations have interacted with the evolving markets, sciences, and technologies. The ADS concept is proposed on biological analogy, and its technologies hav...

متن کامل

Information System Security Goals

A large part of information systems security approaches is technical in nature with less consideration on people and organizational issues. To this end, there is a need to investigate other means of managing information systems security since most information systems security approaches although valuable they focus on technical oriented solutions, e.g. checklists, risk analysis, evaluation meth...

متن کامل

Structuring and Visualising an IC-card Security Standard

The standard way of visualising protocols using pictures with boxes and arrows is insufficient to study the protocols in detail. The problem is that the structuring of the protocols relies on elements not explicit in the standard visual rendering. To solve the problem one should visualise not only the operations and the messages but also the state and the security. Using an object oriented data...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Japanese Journal of Radiological Technology

سال: 1998

ISSN: 0369-4305,1881-4883

DOI: 10.6009/jjrt.kj00003109882