Identification and evaluation of the security requirements in medical applications
نویسنده
چکیده
medical applications, security, distributed Computerized medical systems are emerging to help health care professionals cope with the difficult problems of patient data explosion and increasingly complex diagnostic information. The security of these medical information systems is extremely important one catastrophe could hamper their chance of success. The state-of-the-art security mechanisms can not appropriately address the needs of these systems without interfering with the systems' effectiveness and current research efforts are not aimed at the unique needs of the medical industry. This paper summarizes the security aspects of today's medical information systems and evaluates the software security requirements necessary for the computerized systems of tomorrow. The second part of this paper discusses how these concerns are addressed by today's technology.
منابع مشابه
A Narrative Review of Blockchain in Healthcare: Applications and challenges
Introduction: Healthcare as an industry has unique requirements such as patient security and privacy, interoperability, sharing, transmission, and access control of patient data. On the other hand, the advantages of blockchain technology and the compliance of these advantages with the requirements of the health industry have encouraged researchers to investigate the methods of applying blockcha...
متن کاملA Narrative Review of Blockchain in Healthcare: Applications and challenges
Introduction: Healthcare as an industry has unique requirements such as patient security and privacy, interoperability, sharing, transmission, and access control of patient data. On the other hand, the advantages of blockchain technology and the compliance of these advantages with the requirements of the health industry have encouraged researchers to investigate the methods of applying blockcha...
متن کاملInformation Security Requirements for Implementing Electronic Health Records in Iran
Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...
متن کاملInformation Security Requirements for Implementing Electronic Health Records in Iran
Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...
متن کاملSecure FPGA Design by Filling Unused Spaces
Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1992