EMRlog Method for Computer Security for Electronic Medical Records with Logic and Data Mining

dc.creatorRaúl Monroy Borja
dc.date2015
dc.date.accessioned2018-10-18T22:08:16Z
dc.date.available2018-10-18T22:08:16Z
dc.descriptionThe proper functioning of a hospital computer system is an arduous work for managers and staff. However, inconsistent policies are frequent and can produce enormous problems, such as stolen information, frequent failures, and loss of the entire or part of the hospital data. This paper presents a new method named EMRlog for computer security systems in hospitals. EMRlog is focused on two kinds of security policies: directive and implemented policies. Security policies are applied to computer systems that handle huge amounts of information such as databases, applications, and medical records. Firstly, a syntactic verification step is applied by using predicate logic. Then data mining techniques are used to detect which security policies have really been implemented by the computer systems staff. Subsequently, consistency is verified in both kinds of policies; in addition these subsets are contrasted and validated. This is performed by an automatic theorem prover. Thus, many kinds of vulnerabilities can be removed for achieving a safer computer system. Copyright © 2015 Sergio Mauricio Martínez Monterrubio et al.
dc.identifier.doi10.1155/2015/542016
dc.identifier.issn23146133
dc.identifier.urihttp://hdl.handle.net/11285/630541
dc.identifier.volume2015
dc.languageeng
dc.publisherHindawi Publishing Corporation
dc.relationhttps://www.scopus.com/inward/record.uri?eid=2-s2.0-84944273741&doi=10.1155%2f2015%2f542016&partnerID=40&md5=2fc2dfd9a705a10b335d9410bcc6d29c
dc.relationInvestigadores
dc.relationEstudiantes
dc.rightsinfo:eu-repo/semantics/openAccess
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0
dc.sourceBioMed Research International
dc.subjectArticle
dc.subjectcomputer security
dc.subjectcomputer system
dc.subjectdata base
dc.subjectdata mining
dc.subjectelectronic medical record
dc.subjecthospital
dc.subjecthospital planning
dc.subjecthospital policy
dc.subjecthuman
dc.subjectlogic
dc.subjectmethodology
dc.subject.classification7 INGENIERÍA Y TECNOLOGÍA
dc.titleEMRlog Method for Computer Security for Electronic Medical Records with Logic and Data Mining
dc.typeArtículo
refterms.dateFOA2018-10-18T22:08:16Z

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
9784343.pdf
Size:
1.68 MB
Format:
Adobe Portable Document Format

Collections

logo

El usuario tiene la obligación de utilizar los servicios y contenidos proporcionados por la Universidad, en particular, los impresos y recursos electrónicos, de conformidad con la legislación vigente y los principios de buena fe y en general usos aceptados, sin contravenir con su realización el orden público, especialmente, en el caso en que, para el adecuado desempeño de su actividad, necesita reproducir, distribuir, comunicar y/o poner a disposición, fragmentos de obras impresas o susceptibles de estar en formato analógico o digital, ya sea en soporte papel o electrónico. Ley 23/2006, de 7 de julio, por la que se modifica el texto revisado de la Ley de Propiedad Intelectual, aprobado

DSpace software copyright © 2002-2026

Licencia