Security in Health Care : an Overview

نویسندگان

  • L. VORWERK
  • C. MEINEL
چکیده

SUMMARY This paper describes standards which seek to integr ate security, such as authentication and encryption, into the domain of h ealth care. It also proposes several concepts according to these standards. There are tw o standards which have been developed in the USA. One of these has found accep tance from software developers in Germany. This standard, called DICOM (digital im aging and communication in medicine) [NEM96], is a modular and is often misun derstood. There are two security enhancements of DICOM which are under development. Therefore, a concept, [VLM00], was proposed that uses several definitions of the standard to construct a secure system for the management of patient data. A n editor was implemented to integrate textual reports with images. Finally, a c oncept was developed that describes how to combine encryption and compression in order to make image processing faster.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Dynamic analysis of Health care supply and demand management: A Case Study Hospitals of Social Security Organization

Background: The outlook for hospital care is changing rapidly. Supply and demand stimuli in the health service system are changing dramatically. The health department of the Social Security Administration has also been challenged by the growing number of patients. This study was conducted to help this organization with the aim of designing a conceptual causal model of the interaction between su...

متن کامل

Green Hospital; an Overview of the Most Important Indicators

Health care organizations, like other community organizations, have a significant role to play in the environment. The importance of these centers can be understood by considering the type of activity and how hospitals affect the environment. Over the decades, the international community has designed and developed various models to prevent the harmful effects of the environment by various organ...

متن کامل

An Overview of Group Key Management Issues in IEEE 802.16e Networks

The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...

متن کامل

overview of ways to enhance the security of video surveillance networks using blockchain

In recent decades, video surveillance systems have an increasing development that are used to prevent crime and manage facilities with rapid diffusion of  (CCTV)cameras to prevent crime and manage facilities. The video stored in the video surveillance system should be managed comfortably, but sometimes the movies are leaking out to unauthorized people or by unauthorized people, thus violating i...

متن کامل

Airport Security Versus Patient Security: The “Sickurity” Problem

The massive restrain security measurements at the airports very much impress the health status of the healthy and sick passengers alike. The security check is undisputedly a harassment – the confiscation of fluids, the limited movement on the airplane results in a stressful situation and put a harmful effect on healthy traveler and an even more harmful one on the sick. This kind of problem coul...

متن کامل

Estimation of Production Function of Direct Health Care Services Delivered by Iranian Social Security Organization

Background and Objectives: Social Security Organization (SSO) is the second largest organization to the Ministry of Health and Medical Education (MOHME) in providing health care services in Iran. In recent years the gap between the SSO’s resources and expenditures has shown an unprecedented growing trend due to the rapidly increasing demand. Continuation of this trend may lead ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000