期刊文献+
共找到3,962篇文章
< 1 2 199 >
每页显示 20 50 100
A Robust Data Hiding Reversible Technique for Improving the Security in e-Health Care System
1
作者 Saima Kanwal Feng Tao +3 位作者 Ahmad Almogren Ateeq Ur Rehman Rizwan Taj Ayman Radwan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第1期201-219,共19页
The authenticity and integrity of healthcare is the primary objective.Numerous reversible watermarking schemes have been developed to improve the primary objective but increasing the quantity of embedding data leads t... The authenticity and integrity of healthcare is the primary objective.Numerous reversible watermarking schemes have been developed to improve the primary objective but increasing the quantity of embedding data leads to covering image distortion and visual quality resulting in data security detection.A trade-off between robustness,imperceptibility,and embedded capacity is difficult to achieve with current algorithms due to limitations in their ability.Keeping this purpose insight,an improved reversibility watermarking methodology is proposed to maximize data embedding capacity and imperceptibility while maintaining data security as a primary concern.A key is generated by a random path with minimum bit flipping is selected in the 4 × 4 block to gain access to the data embedding patterns.The random path's complex structure ensures data security.Data of various sizes(8 KB,16 KB,32 KB)are used to analyze image imperceptibility and evaluate quality factors.The proposed reversible watermarking methodology performance is tested under standard structures PSNR,SSIM,and MSE.The results revealed that the MRI watermarked images are imperceptible,like the cover image when LSB is 3 bits plane.Our proposed reversible watermarking methodology outperforms other related techniques in terms of average PSNR(49.29).Experiment results show that the suggested reversible watermarking method improves data embedding capacity and imperceptibility compared to existing state-of-the-art approaches. 展开更多
关键词 medical images security data hiding LSB matching hiding capacity IMPERCEPTIBILITY
下载PDF
Encryption with User Authentication Model for Internet of Medical Things Environment
2
作者 K.S.Riya R.Surendran +1 位作者 Carlos Andrés Tavera Romero M.Sadish Sendil 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期507-520,共14页
Internet of Medical Things(IoMT)enabled e-healthcare has the potential to greately improve conventional healthcare services significantly.However,security and privacy become major issues of IoMT because of the restric... Internet of Medical Things(IoMT)enabled e-healthcare has the potential to greately improve conventional healthcare services significantly.However,security and privacy become major issues of IoMT because of the restricted processing abilities,storage,and energy constraints of the sensors.Therefore,it leads to infeasibility of developing traditional cryptographic solutions to the IoMT sensors.In order to ensure security on sensitive medical data,effective encryption and authentication techniques need to be designed to assure security of the patients and healthcare service providers.In this view,this study designs an effective metaheuristic optimization based encryption with user authentication(EMOE-UA)technique for IoMT environment.This work proposes an EMOE-UA technique aims to accomplish mutual authentication for addressing the security issues and reducing the computational complexity.Moreover,the EMOE-UA technique employs optimal multikey homomorphic encryption(OMKHE)technique to encrypt the IoMT data.Furthermore,the improved social spider optimization algorithm(ISSOA)was employed for the optimal multikey generation of the MKHE technique.The experimental result analysis of the EMOE-UA technique takes place using benchmark data and the results are examined under various aspects.The simulation results reported the considerably better performance of the EMOE-UA technique over the existing techniques. 展开更多
关键词 User authentication security PRIVACY internet of medical things homomorphic encryption optimal key generation
下载PDF
On the design of an AI-driven secure communication scheme for internet of medical things environment
3
作者 Neha Garg Rajat Petwal +3 位作者 Mohammad Wazid D.P.Singh Ashok Kumar Das Joel J.P.C.Rodrigues 《Digital Communications and Networks》 SCIE CSCD 2023年第5期1080-1089,共10页
The Internet of Medical Things(IoMT)is a collection of smart healthcare devices,hardware infrastructure,and related software applications,that facilitate the connection of healthcare information technology system via ... The Internet of Medical Things(IoMT)is a collection of smart healthcare devices,hardware infrastructure,and related software applications,that facilitate the connection of healthcare information technology system via the Internet.It is also called IoT in healthcare,facilitating secure communication of remote healthcare devices over the Internet for quick and flexible analysis of healthcare data.In other words,IoMT is an amalgam of medical devices and applications,which improves overall healthcare outcomes.However,this system is prone to securityand privacy-related attacks on healthcare data.Therefore,providing a robust security mechanism to prevent the attacks and vulnerability of IoMT is essential.To mitigate this,we proposed a new Artificial-Intelligence envisioned secure communication scheme for IoMT.The discussed network and threat models provide details of the associated network arrangement of the IoMT devices and attacks relevant to IoMT.Furthermore,we provide the security analysis of the proposed scheme to show its security against different possible attacks.Moreover,a comparative study of the proposed scheme with other similar schemes is presented.Our results show that the proposed scheme outperforms other similar schemes in terms of communication and computation costs,and security and functionality attributes.Finally,we provide a pragmatic study of the proposed scheme to observe its impact on various network performance parameters. 展开更多
关键词 Internet of medical Things(IoMT) security Authentication and key agreement Artificial Intelligence(AI) Big data analytics
下载PDF
Exploration and Practice of Postgraduate Training Mode Based on Medical Imaging Information Security
4
作者 Yi Ding Jiaqi Zhang +2 位作者 Zhen Qin Yang Zhao Mingsheng Cao 《计算机教育》 2023年第12期71-77,共7页
In the process of continuous maturity and development of medical imaging diagnosis,it is common to transmit images through public networks.How to ensure the security of transmission,cultivate talents who combine medic... In the process of continuous maturity and development of medical imaging diagnosis,it is common to transmit images through public networks.How to ensure the security of transmission,cultivate talents who combine medical imaging and information security,and explore and cultivate new discipline growth points are difficult problems and challenges for schools and educators.In order to cope with industrial changes,a new round of scientific and technological revolution,and the challenges of the further development of artificial intelligence in medicine,this article will analyze the existing problems in the training of postgraduates in medical imaging information security by combining the actual conditions and characteristics of universities,and put forward countermeasures and suggestions to promote the progress of technology in universities. 展开更多
关键词 medical imaging Information security Postgraduate training Countermeasures and suggestions
下载PDF
Exploring euthanasia in Malta: an intersectional analysis of medical, legal, and ethical perspectives
5
作者 Renald Blundell Martina Cini +1 位作者 Kimberley Blundell Stefan Vella 《History & Philosophy of Medicine》 2023年第3期25-30,共6页
This paper provides a comprehensive examination of euthanasia from various perspectives,including medical,legal,religious,philosophical,and moral.The study also explores the public perceptions and trends in Malta.The ... This paper provides a comprehensive examination of euthanasia from various perspectives,including medical,legal,religious,philosophical,and moral.The study also explores the public perceptions and trends in Malta.The medical perspective analyses the benefits and risks of euthanasia and its impact on the healthcare system.The legal perspective discusses the legality of euthanasia in Malta and the potential legal implications of legalizing the practice.The religious perspective explores the beliefs of various religious groups in Malta,particularly Catholicism,on euthanasia.The philosophical perspective discusses the ethical and moral considerations of euthanasia.The paper also analyses the results of surveys conducted in Malta,examining the public’s attitudes towards euthanasia.Overall,the study provides a thorough analysis of euthanasia from various angles,shedding light on the complex and controversial nature of the topic. 展开更多
关键词 EUTHANASIA medical legal RELIGIOUS PHILOSOPHICAL moral and Malta
下载PDF
Coordination Mechanism of the Legal Protection of Resource Security with Its Relative Laws
6
作者 Chen Demin Wang Huabing 《Chinese Journal of Population,Resources and Environment》 北大核心 2008年第3期21-26,共6页
The basis of the legal protection of resource security is its relative laws, which have four main characteristics, which are foundational, divergent, comprehensive and of long-term social benefits in view. The coordin... The basis of the legal protection of resource security is its relative laws, which have four main characteristics, which are foundational, divergent, comprehensive and of long-term social benefits in view. The coordination mechanism of the legal protection of resource security with its relative laws meets the needs of the sustainable development of the economy, society and environment. It also facilitates and is facilitated by the modern transformation of the legal system in China, and upholds the legal system as a logically self-perfecting entity. Furthermore, this coordination bears scientific feasibility. 展开更多
关键词 协调机制 法律解释 资源安全 环境管理
下载PDF
The study of basic medical insurance system for urban residents in China
7
作者 GU Yanfang ZHANG Yushuai 《International English Education Research》 2017年第4期60-62,共3页
关键词 医疗保险制度 城镇居民 中国 社会保障体系 组成部分
下载PDF
Severity Based Light-Weight Encryption Model for Secure Medical Information System
8
作者 Firas Abedi Subhi R.M.Zeebaree +10 位作者 Zainab Salih Ageed Hayder M.A.Ghanimi Ahmed Alkhayyat Mohammed A.M.Sadeeq Sarmad Nozad Mahmood Ali S.Abosinnee Zahraa H.Kareem Ali Hashim Abbas Waleed Khaild Al-Azzawi Mustafa Musa Jaber Mohammed Dauwed 《Computers, Materials & Continua》 SCIE EI 2023年第3期5691-5704,共14页
As the amount of medical images transmitted over networks and kept on online servers continues to rise,the need to protect those images digitally is becoming increasingly important.However,due to the massive amounts o... As the amount of medical images transmitted over networks and kept on online servers continues to rise,the need to protect those images digitally is becoming increasingly important.However,due to the massive amounts of multimedia and medical pictures being exchanged,low computational complexity techniques have been developed.Most commonly used algorithms offer very little security and require a great deal of communication,all of which add to the high processing costs associated with using them.First,a deep learning classifier is used to classify records according to the degree of concealment they require.Medical images that aren’t needed can be saved by using this method,which cuts down on security costs.Encryption is one of the most effective methods for protecting medical images after this step.Confusion and dispersion are two fundamental encryption processes.A new encryption algorithm for very sensitive data is developed in this study.Picture splitting with image blocks is nowdeveloped by using Zigzag patterns,rotation of the image blocks,and random permutation for scrambling the blocks.After that,this research suggests a Region of Interest(ROI)technique based on selective picture encryption.For the first step,we use an active contour picture segmentation to separate the ROI from the Region of Background(ROB).Permutation and diffusion are then carried out using a Hilbert curve and a Skew Tent map.Once all of the blocks have been encrypted,they are combined to create encrypted images.The investigational analysis is carried out to test the competence of the projected ideal with existing techniques. 展开更多
关键词 Deep learning ENCRYPTION medical images SCRAMBLING security skew tent map rotation zigzag pattern
下载PDF
Design of an Information Security Service for Medical Artificial Intelligence 被引量:1
9
作者 Yanghoon Kim Jawon Kim Hangbae Chang 《Computers, Materials & Continua》 SCIE EI 2022年第1期679-694,共16页
The medical convergence industry has gradually adopted ICT devices,which has led to legacy security problems related to ICT devices.However,it has been difficult to solve these problems due to data resource issues.Suc... The medical convergence industry has gradually adopted ICT devices,which has led to legacy security problems related to ICT devices.However,it has been difficult to solve these problems due to data resource issues.Such problems can cause a lack of reliability in medical artificial intelligence services that utilize medical information.Therefore,to provide reliable services focused on security internalization,it is necessary to establish a medical convergence environment-oriented security management system.This study proposes the use of system identification and countermeasures to secure systemreliabilitywhen using medical convergence environment information in medical artificial intelligence.We checked the life cycle of medical information and the flow and location of information,analyzed the security threats that may arise during the life cycle,and proposed technical countermeasures to overcome such threats.We verified the proposed countermeasures through a survey of experts.Security requirements were defined based on the information life cycle in the medical convergence environment.We also designed technical countermeasures for use in the security management systems of hospitals of diverse sizes. 展开更多
关键词 medical artificial intelligence medical information security convergence environment
下载PDF
Reversible Watermarking Method with Low Distortion for the Secure Transmission of Medical Images
10
作者 Rizwan Taj Feng Tao +4 位作者 Shahzada Khurram Ateeq Ur Rehman Syed Kamran Haider Akber Abid Gardezi Saima Kanwal 《Computer Modeling in Engineering & Sciences》 SCIE EI 2022年第3期1309-1324,共16页
In telemedicine,the realization of reversible watermarking through information security is an emerging research field.However,adding watermarks hinders the distribution of pixels in the cover image because it creates ... In telemedicine,the realization of reversible watermarking through information security is an emerging research field.However,adding watermarks hinders the distribution of pixels in the cover image because it creates distortions(which lead to an increase in the detection probability).In this article,we introduce a reversible watermarking method that can transmit medical images with minimal distortion and high security.The proposed method selects two adjacent gray pixels whose least significant bit(LSB)is different from the relevant message bit and then calculates the distortion degree.We use the LSB pairing method to embed the secret matrix of patient record into the cover image and exchange pixel values.Experimental results show that the designed method is robust to different attacks and has a high PSNR(peak signal-to-noise ratio)value.The MRI image quality and imperceptibility are verified by embedding a secret matrix of up to 262,688 bits to achieve an average PSNR of 51.657 dB.In addition,the proposed algorithm is tested against the latest technology on standard images,and it is found that the average PSNR of our proposed reversible watermarking technology is higher(i.e.,51.71 dB).Numerical results show that the algorithm can be extended to normal images and medical images. 展开更多
关键词 LSB reversible watermarking medical images security data distortion
下载PDF
Analysis of Internal Control Management Problems in Hospital Finance and Accounting
11
作者 Yan Wang 《Proceedings of Business and Economic Studies》 2024年第3期133-139,共7页
This paper outlines the internal control management of hospital accounting and finance,introducing its concept,importance,and objectives.It then analyzes the problems existing in the internal control management of hos... This paper outlines the internal control management of hospital accounting and finance,introducing its concept,importance,and objectives.It then analyzes the problems existing in the internal control management of hospital accounting and finance,including an unsound management system,insufficient system implementation,inadequate risk assessment and control capabilities,poor information communication,weak internal supervision,and uneven personnel quality.The reasons for these problems are also analyzed,including outdated management concepts,irrational organizational structures,imperfect training and incentive mechanisms,low levels of information technology,and changes in the external environment.This paper proposes improvement measures for the internal control management of hospital accounting,including enhancing the management system,strengthening system implementation,improving risk assessment and control capabilities,enhancing the information communication mechanism,strengthening internal supervision,improving personnel quality,advancing information technology,and adapting to changes in the external environment. 展开更多
关键词 Hospital accounting Internal control management medical system reform Financial security Operational efficiency
下载PDF
Analysis on the Current Situation of Social Security for Landless Farmers Under the Background of Urbanization
12
作者 Taipeng Wang 《Proceedings of Business and Economic Studies》 2021年第4期31-35,共5页
With the rapid development of China's social economy,the economy of various regions has rapidly improved.At the same time,people are paying more attention to the issue of farmers' social security.In order to r... With the rapid development of China's social economy,the economy of various regions has rapidly improved.At the same time,people are paying more attention to the issue of farmers' social security.In order to realize the rapid development of regional economy and form a relatively stable social order,there is a need to improve the social security system of farmers so as to ensure that more people acquire basic social security rights.On this basis,based on the background of urbanization,this article studies the social security status of landless farmers in R city,and analyzes the old-age security as well as the medical insurance of landless farmers in R city. 展开更多
关键词 Landless farmers Old-age security medical insurance
下载PDF
Transborder Personal Security of Chinese Nationals and Its Legal Safeguard
13
作者 GUO NI is a lecturer at the Taiyuan Police Academy 《The Journal of Human Rights》 2012年第2期10-12,共3页
Personal security is an im- portant human right. There would be no human rights to talk about if personalsecurity, including personal safety, were not safeguarded. So long as a person is in the person's own coun- try... Personal security is an im- portant human right. There would be no human rights to talk about if personalsecurity, including personal safety, were not safeguarded. So long as a person is in the person's own coun- try, there will always be a measure of legal safeguard for the person's interests and personal security, ff the person has his or her rights infringed upon when the person is outside the country, there will be more than one province of judicial jurisdiction over the case, and the subsequent legal remedies for the person, if any, in most cases will not be so timely and easily available as provided under the domestic laws of the person's own country. 展开更多
关键词 Transborder Personal security of Chinese Nationals and Its legal Safeguard security
下载PDF
Research on Farmers' Medical Security Based on Supply Theory
14
作者 WANG Linlin 《International English Education Research》 2017年第1期24-26,共3页
关键词 医疗保障 农民 城市化进程 供给 产业结构调整 农村地区 分布格局 农村人口
下载PDF
A Fractional Fourier Based Medical Image Authentication Approach 被引量:2
15
作者 Fayez Alqahtani Mohammed Amoon Walid El-Shafai 《Computers, Materials & Continua》 SCIE EI 2022年第2期3133-3150,共18页
Patient medical information in all forms is crucial to keep private and secure,particularly when medical data communication occurs through insecure channels.Therefore,there is a bad need for protecting and securing th... Patient medical information in all forms is crucial to keep private and secure,particularly when medical data communication occurs through insecure channels.Therefore,there is a bad need for protecting and securing the color medical images against impostors and invaders.In this paper,an optical medical image security approach is introduced.It is based on the optical bit-plane Jigsaw Transform(JT)and Fractional Fourier Transform(FFT).Different kernels with a lone lens and a single arbitrary phase code are exploited in this security approach.A preceding bit-plane scrambling process is conducted on the input color medical images prior to the JT and FFT processes to accomplish a tremendous level of robustness and security.To confirm the efficiency of the suggested security approach for secure color medical image communication,various assessments on different color medical images are examined based on different statistical security metrics.Furthermore,a comparative analysis is introduced between the suggested security approach and other conventional cryptography protocols.The simulation outcomes acquired for performance assessment demonstrate that the suggested security approach is highly secure.It has excellent encryption/decryption performance and superior security results compared to conventional cryptography approaches with achieving recommended values of average entropy and correlation coefficient of 7.63 and 0.0103 for encrypted images. 展开更多
关键词 medical image security ENCRYPTION JT FFT CRYPTOsystem
下载PDF
Integrity Assessment of Medical Devices for Improving Hospital Services 被引量:3
16
作者 Fahad A.Alzahrani Masood Ahmad +2 位作者 Mohd Nadeem Rajeev Kumar Raees Ahmad Khan 《Computers, Materials & Continua》 SCIE EI 2021年第6期3619-3633,共15页
The present study examines the various techniques being used to maintain the integrity of the medical devices,and develops a quantitative framework to list these in the sequence of priority.To achieve the intended obj... The present study examines the various techniques being used to maintain the integrity of the medical devices,and develops a quantitative framework to list these in the sequence of priority.To achieve the intended objective,the study employs the combined procedure of Fuzzy Analytic Network Process(ANP)and Fuzzy Technical for Order Preference by Similarities to Ideal Solution(TOPSIS).We selected fuzzy based decision making techniques for assessing the integrity of medical devices.The suggested methodology was then used for classifying the suitable techniques used to evaluate the integrity of medical devices.Different techniques or the procedures of integrity assessment were ranked according to their satisfaction weights.The rating of the options determined the order of priority for the procedures.As per the findings of the study,among all the options,A1 was assessed to be the most likely option.This means that the integrity of medical devices of A2 is the highest amongst all the chosen alternatives.This analysis will be a corroborative guideline for manufacturers and developers to quantitatively test the integrity of medical devices in order to engineer efficacious devices.The evaluations undertaken with the assistance of the planned procedure are accurate and conclusive.Hence instead of conducting a manual valuation,this experimental study is a better and reliable option for assessing the integrity of the medical devices. 展开更多
关键词 Integrity of the medical devices fuzzy-ANP.TOPSIS security assessment
下载PDF
Role of medical resource level in iodine deficiency disorder 被引量:1
17
作者 Chen Xu Zhen Liang Yong-Jun Luo 《Military Medical Research》 SCIE CAS 2018年第1期53-61,共9页
Background:Iodine deficiency disorders(IDDs)refer to a series of diseases caused by the human body's insufficient iodine intake.Edible salt became iodized in China in 1996,which yielded remarkable results.We have ... Background:Iodine deficiency disorders(IDDs)refer to a series of diseases caused by the human body's insufficient iodine intake.Edible salt became iodized in China in 1996,which yielded remarkable results.We have known that IDDs is associated with iodine in the human body,but it is not clear whether IDDs is related to medical resource level.Methods:We collected the number of IDDs cases and an index for the level of medical resource from 31 provinces,autonomous regions and municipalities directly under the central government in China.All data came from the China Statistical Yearbook of Health and Family Planning issued in 2013 by the Peking Union Medical College Publishing House.Data standardization and linear regression analysis were used.Results:The results showed that IDDs correlated with the number of beds in medical and health institutions,number of medical health personnel,number of medical and health institutions,total health expenditure,average health expenditure per capita,medical insurance for urban resident and new rural cooperative medical rural residents(P<0.01).In a multiple linear regression,IDDs was most significantly associated with the number of beds in hospitals,the number of rural health personnel,the number of basic medical and health institutions and government health expenditure for these institutions. Conclusion:Based on the experimental data,we concluded that IDDs had a positive connection with the medical resource level,and basic and rural areas had a more significant association with IDDs.This analysis provides new and explicit ideas for iodine prevention and control work in China. 展开更多
关键词 Iodine deficiency disorders(IDDs) Health level medical security China
下载PDF
A Collaborative Medical Diagnosis System Without Sharing Patient Data 被引量:1
18
作者 NAN Yucen FANG Minghao +2 位作者 ZOU Xiaojing DOU Yutao Albert Y.ZOMAYA 《ZTE Communications》 2022年第3期3-16,共14页
As more medical data become digitalized,machine learning is regarded as a promising tool for constructing medical decision support systems.Even with vast medical data volumes,machine learning is still not fully exploi... As more medical data become digitalized,machine learning is regarded as a promising tool for constructing medical decision support systems.Even with vast medical data volumes,machine learning is still not fully exploiting its potential because the data usually sits in data silos,and privacy and security regulations restrict their access and use.To address these issues,we built a secured and explainable machine learning framework,called explainable federated XGBoost(EXPERTS),which can share valuable information among different medical institutions to improve the learning results without sharing the patients’ data.It also reveals how the machine makes a decision through eigenvalues to offer a more insightful answer to medical professionals.To study the performance,we evaluate our approach by real-world datasets,and our approach outperforms the benchmark algorithms under both federated learning and non-federated learning frameworks. 展开更多
关键词 explainable machine learning federated learning secured data analysis medical applications
下载PDF
The Importance of Health Records 被引量:1
19
作者 Milena Marinic 《Health》 2015年第5期617-624,共8页
Health records have played an increasingly important role throughout history as an important legal document for the exercise of individuals’ rights. However, domestic legislation fails to define health records as a l... Health records have played an increasingly important role throughout history as an important legal document for the exercise of individuals’ rights. However, domestic legislation fails to define health records as a legally important collection of health data and documents. Recording facts and storing legally important documents are therefore the tasks of the operator. Using the prescriptive method we will determine which laws are governing the management of medical records, their safety and accessibility. Based on the descriptive method, we will describe the process of handling health records by the provider of health treatment, focusing on exposed regulatory gaps in the area of the protection of the rights of an individual. Through the analysis of the laws governing the management of health records, even after death and operator terminating the service, we will carry out inductive reasoning and provide conclusions regarding the attitude towards health records. Considering different results we can conclude that health information, especially documents relevant to the protection of individual’s rights, is not transparent. Above all, the documents in the collection are not recorded properly, thus allowing for their removal. Even the transfer of health records by the provider of health treatment is not defined, which could result in the disposal of the entire health documentation. 展开更多
关键词 Health Records Content security legal Certainty
下载PDF
基于Microsoft威胁建模工具的医疗健康场景下医疗器械网络安全问题分析方法 被引量:1
20
作者 姜宗伯 李澍 刘颖颖 《中国医疗设备》 2023年第12期113-118,共6页
目的 模拟构建医疗健康场景,针对医疗器械设备及整个场景存在的威胁制定检测方法和评分标准,为医疗健康场景下医疗器械网络安全问题提供解决思路。方法 根据医疗健康场景的特殊性,对模拟的医疗健康场景进行分析并构建出数据流图,运用Mic... 目的 模拟构建医疗健康场景,针对医疗器械设备及整个场景存在的威胁制定检测方法和评分标准,为医疗健康场景下医疗器械网络安全问题提供解决思路。方法 根据医疗健康场景的特殊性,对模拟的医疗健康场景进行分析并构建出数据流图,运用Microsoft威胁建模工具根据STRIDE模型生成漏洞列表,对其中的漏洞和风险进行分析,制定针对医疗器械场景特殊性的评分标准和渗透测试方法,提出解决办法并进行风险降级。结果 根据场景的数据流图生成漏洞列表,共66个威胁,包含15个S(假冒)、3个T(篡改)、10个R(否认)、4个I(信息泄露)、14个D(拒绝服务)和20个E(权限提升)。对以上威胁进行分类并分析原因,提出解决办法缓解威胁并进行风险降级。结论 通过Microsoft威胁建模工具对医疗健康场景下医疗器械网络安全进行分析,可以科学有效地分析出场景下可能遇到的网络安全问题,在一定程度上避免或预防由网络安全问题带来的后果及影响。 展开更多
关键词 医疗健康场景 医疗器械 网络安全 威胁建模 STRIDE模型
下载PDF
上一页 1 2 199 下一页 到第
使用帮助 返回顶部