Security by IC Card System in Medical Information System
نویسندگان
چکیده
منابع مشابه
Perspectives on hospital information system in medical practice
Introduction: The most effective method of collecting, storage, communication and presentation of huge amount of Information in order to obviate user needs is computer. The comprehensive hospital information system (HIS) resulted in processing of information, operational and hospital control needs in daily practice, and also accelerating and facilitating in planning, budgeting and managem...
متن کاملSmart Card based Robust Security System
In the up to date electronic planet, authentication of an individual is a vital assignment in numerous territories of everyday existence. Smart Cards are secure compact space gadgets utilized for a few requisitions specifically security identified ones including access to framework's database either connected or disconnected from the net. Smartcard are regularly “secure” movable units. It is an...
متن کاملTrend of Autonomous Decentralized System Technologies and Their Application in IC Card Ticket System
The advancement of technology is ensured by step-bystep innovation and its implementation into society. Autonomous Decentralized Systems (ADSs) have been growing since first proposed in 1977. Since then, the ADS technologies and their implementations have interacted with the evolving markets, sciences, and technologies. The ADS concept is proposed on biological analogy, and its technologies hav...
متن کاملInformation System Security Goals
A large part of information systems security approaches is technical in nature with less consideration on people and organizational issues. To this end, there is a need to investigate other means of managing information systems security since most information systems security approaches although valuable they focus on technical oriented solutions, e.g. checklists, risk analysis, evaluation meth...
متن کاملStructuring and Visualising an IC-card Security Standard
The standard way of visualising protocols using pictures with boxes and arrows is insufficient to study the protocols in detail. The problem is that the structuring of the protocols relies on elements not explicit in the standard visual rendering. To solve the problem one should visualise not only the operations and the messages but also the state and the security. Using an object oriented data...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Japanese Journal of Radiological Technology
سال: 1998
ISSN: 0369-4305,1881-4883
DOI: 10.6009/jjrt.kj00003109882