期刊文献+

基于预约诊疗模式下的医院网络安全设计 被引量:3

Design of hospital network security based on reservation and treatment mode
下载PDF
导出
摘要 针对在预约诊疗模式下医院网络的安全性不强,容易导致病人隐私信息泄露的问题,进行医院网络安全设计,基于隐私保护路由协议,提出预约诊疗模式下的医院网络安全设计方法。首先构建医院网络体系结构模型,设计预约诊疗模式下的医院网络路由协议;然后采用网络诊疗信息融合方法进行隐私保护设计,实现医院网络安全设计;最后通过仿真实验进行性能测试。仿真实验结果表明,构架的预约诊疗模式下的医院网络模型对病人的隐私信息保护能力较强,说明抵御攻击性能较好,保障了医院网络安全。 Since the hospital network security based on reservation and treatment mode is poor,and easy to leak the pa?tient privacy information,the hospital network security was designed. On the basis of the privacy protection routing protocol,the design method of the hospital network security based on reservation and treatment mode is put forward. The hospital network ar?chitecture model was constructed. The hospital network routing protocol based on reservation and treatment mode was designed.The network treatment information fusion method is used to design the privacy protection to realize the hospital network security.The performance of the model was tested with simulation experiment. The result shows that the hospital network model based on reservation and treatment mode has strong privacy information protection capability for patients and good performance to against the attacks,and guarantees the hospital network security.
作者 孙琳 潘登 刘荻 SUN Lin;PAN Deng;LIU Di(Beijing Tongren Hospital,Capital Medical University,Beijing 100730,China)
出处 《现代电子技术》 北大核心 2017年第3期82-84,88,共4页 Modern Electronics Technique
关键词 预约诊疗模式 医院网络安全 隐私保护 信息融合 reservation and treatment mode hospital network security privacy protection information fusion
  • 相关文献

参考文献5

二级参考文献57

  • 1Abusalah L, Khokhar A, Guizani M. A survey of secure mobile Ad Hoc routing protocols [ J ]. IEEE Communications Surveys&Tutorials, 2008,10 (4) :78 - 93.
  • 2Brutch P, Ko C. Challenges in Intrusion Detection for Wireless Ad -hoc Networks[ J]. In: 2003 Symposium on Applications and the intemet Workshops (SAINT'03 Workshops),2003.
  • 3Varadharajan V, Shankaran R, Hitchens M. Security for cluster based Ad Hoc networks [ J ]. Computer Communication, 2004,27 (5) :488 -501.
  • 4Yongguang Zhang, Wenke Lee. Intrusion Detection in Wireless AdHoc Networks [C]//Proceedings of the 6thAnnual International Conference on Mobile Computing and Networking. Boston:Massa- chussetts ,2000:6 - 11.
  • 5Jun C, Xiaowei C. Intrusion Detection System Research Based on Data Mining for IPv6 [ C ] //J Information Technology and Applica- tions (IFITA), 2010 International Forum on. IEEE, 2010, 1 : 384 -388.
  • 6Yu Z. Study on intrusion IPv6 detection system on LINUX [ C ]// Computational Intelligence and Industrial Applications, 2009. PA- CIIA 2009. Asia - Pacific Conference on. IEEE, 2009, 2 : 5 - 8.
  • 7Jun C, Xiaowei C. Intrusion Detection System Research Based on Data Mining for IPv6 [ C ] JJ Information Technology and Applica- tions (IFITA), 2010 International Forum on. IEEE, 2010, 1: 384 - 388.
  • 8Li Yan, Liu Yao, Zhang Liang-jie, et al. An exploratory study of Web services on the Internet[C]// Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 07 ). Salt Lake City, UT, USA, 2007, Washington, DC, USA: IEEE Computer Society, 2007 : 380-387.
  • 9Charif-Diebbar Y,Sabouret N. Dynamic service composition and selection through an agent interaction protoeo[C]//Proceedings of the 2006 IEEE/WIC/ACM International Conference onWeb Intelligence and Intelligent Agent Technology Workshops (WI- IATW 06). Washington, DC, USA: IEEE Computer Soeiety, 2006:105-108.
  • 10Shao Ling-shuaag. Research on quality of Web services manage- ment technologies [D]. Beijing:Peking University,2009.

共引文献186

同被引文献28

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部