期刊文献+

云计算在PACS区域医疗中的应用 被引量:1

Application of Cloud Computing in Regional Medical Treatment of PACS
下载PDF
导出
摘要 随着医疗改革的不断推进,区域医疗信息化建设逐渐成为医疗行业发展的重中之重。医学影像存档与通讯系统(PACS)由于数据量巨大很难实现统一存储调阅,影像数据在互联网上传、下载,并且既浪费时间又无法保证数据安全。云计算技术使用户可以动态地从云中获取软硬件资源,所有数据、计算均在云端展示,是未来信息化技术的发展趋势。笔者主要介绍云计算与PACS区域医疗结合的一种实现方法,同时论述云计算在区域医疗中的各种优势。 With the constant advance of medical reform,the informatization establishment of regional medical treatment has been the top priority in the development of medical industry. Because of the huge data in PACS system,it is difficult to make unified storing and selected reading. And the online upload and dow nload of image data wastes too much time. What’s more,there is no guarantee of data safety. Cloud computing can make the users obtain softw are and hardw are resources in the form of dynamic with all the data and computing show n in the air. This is the future development of informatization technique. The authors mainly introduce the realization of cloud computing combined with regional medical treatment of PACS and expound all the advantages of cloud computing in regional medical treatment.
出处 《现代医院管理》 2015年第5期12-14,共3页 Modern Hospital Management
基金 国家高技术研究发展计划(863计划)课题"数字化医疗关键技术集成与应用示范"(2012AA03A612)
关键词 云计算 PACS区域医疗 医院集团 医院信息化平台 cloud computing regional medical treatment of PACS hospital group hospital informatization platform
  • 相关文献

参考文献5

二级参考文献99

  • 1胡新平,张志美,蒋葵,董建成.数字化医院建设体系结构研究[J].中国数字医学,2007,2(9):25-28. 被引量:23
  • 2罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 3Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 4Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 5Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 6Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 7Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 8Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 9Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 10Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.

共引文献2108

同被引文献12

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部