Implementing security on a prototype hospital database.
نویسندگان
چکیده
This paper describes the methodology used and the experience gained from the application of a new secure database design approach and database security policy in a real life hospital environment. The applicability of the proposed database security policy in a major Greek general hospital is demonstrated. Moreover, the security and quality assurance of the developed prototype secure database is examined, taking into consideration the results from the study of the user acceptance.
منابع مشابه
Implementing Belief-Consistent Multilevel Secure Relational Data Model: Issues and Solutions
This paper summarizes our efforts in implementing a working multi-level secure database prototype. We have chosen BeliefConsistent Multilevel Secure Relational Data Model (BCMLS) as a basis for our prototype because of its comprehensive semantics for interpreting all stored information. While semantically superior to other models, this model has not been implemented as a working system before. ...
متن کاملA Comparison of Methods for Implementing Adaptive Security Policies
The security policies for computing resources must match the security policies of the organizations that use them; therefore, computer security policies must be adaptive to meet the changing security environment of their user-base. This paper presents four methods for implementing adaptive security policies for architectures which separate the de nition of the policy in a Security Server from t...
متن کاملStudy on the Impact of Implementing Public-Private Partnership (PPP) at Hasheminejad Kidney Center
Background and Objectives: As with most countries, in the developing communities, providing high quality services in the field of health care is affected by limited financial resources. Applying the positive stimuli germane to the private sector to public hospital may be one solution to the public sector's problems, and the health care system, in general, for reducing hospital construction and ...
متن کاملFT-RC4: A Robust Security Mechanism for Data Stream Systems
Stream database systems are designed to support Ihe fast on-line processing that characterizes many new emergin: applications such as sensor-based environments, on-line business processing and network monitoring. Data stream processing is a highly demanding environment where streams are usually infinite. bursty. and running at high arrival rates. Due lo limited buffer storage or real-time const...
متن کاملAn Authorization Framework for Database Systems
Today, data plays an essential role in all levels of human life, from personal cell phones to medical, educational, military and government agencies. In such circumstances, the rate of cyber-attacks is also increasing. According to official reports, data breaches exposed 4.1 billion records in the first half of 2019. An information system consists of several components, which one of the most im...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Studies in health technology and informatics
دوره 43 Pt A شماره
صفحات -
تاریخ انتشار 1997