2017 4th International Conference on Control, Decision and Information Technologies (CoDIT) 2017
DOI: 10.1109/codit.2017.8102628
|View full text |Cite
|
Sign up to set email alerts
|

Protect healthcare system based on intelligent techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 4 publications
0
3
0
1
Order By: Relevance
“…Finally, EHR electronic health records can be valuable human creations. It can be accessed using a particular domain or malicious codes [15]. reats can be noted and significantly impacted by their presence; threat management is most necessary for every business website and application.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Finally, EHR electronic health records can be valuable human creations. It can be accessed using a particular domain or malicious codes [15]. reats can be noted and significantly impacted by their presence; threat management is most necessary for every business website and application.…”
Section: Literature Reviewmentioning
confidence: 99%
“…e accumulated scheme performance metric could be represented like a complex performance metric with in form of such a set of equations (15) and is represented below.…”
Section: Security and Communication Networkmentioning
confidence: 99%
“…In work performed by (Al-Shaher and al., 2017) in [80], they propose to protect the private healthcare system from known viruses, worms, spyware, and denial-of-service attacks by designing and implementing an Intelligent Healthcare Security System (IHSS). The IHSS integrates the firewall, network intrusion detection subsystem, and web filter.…”
Section: For Transmission Level Securitymentioning
confidence: 99%
“…Penerapan firewall untuk pengamanan data [13] Enkripsi pada data RME, password dan backup sistem [14] Memberikan fitur hide (sembunyi) untuk mengatur mengenai data RME apa saja yang dapat ditampilkan atau disembunyikan dari pihak-pihak yang memiliki wewenang yang berbeda. [15] Enkripsi data, dan membuat data RME menjadi anonimus, jika data tersebut diambil untuk penelitian [16] Firewall, enkripsi dan dekripsi data RME, Audit Log, serta untuk menjaga keamanan data, data-data RME diawasi oleh seorang Chief Information Security Officer [17] Penerapan role-based dan autentifikasi personal dengan menggunakan enkripsi [12] [18] Password, kontrol akses dan firewall [8] Kontrol akses, Penyimpanan data dengan menggunakan Enkripsi, Audit untuk mengetahui siapa saja yang mengakses data dan apa saja perubahan yang dilakukan [19] Kontrol akses, Fungsi Log Audit untuk mengetahui kegiatan apa saja yang dilakukan pada data RME, Fungsi Agregasi data [20] Keamanan dengan menggunakan role-based [21] Role-Based Access Control (RBAC) [22] Skema autentifikasi dengan penggunaan ID [23] Kriptografi (tanda tangan digital, algoritma enkripsi, sertifikasi digital) [24] Mobile agents [25] Protokol kriptografi matriks RBAC [26] Tanda tangan digital [27] Cloud computing [28] Kontrol akses untuk mencegah orang yang tidak bertanggung jawab mengakses data RME.…”
unclassified