跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.84) 您好!臺灣時間:2025/01/20 19:35
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:鄭思漢
研究生(外文):Cheng, Szu-Han
論文名稱:可提供E化醫療服務的安全行動代理之研究
論文名稱(外文):A Study of Secure Mobile Agent for E-health Services
指導教授:陳澤雄陳澤雄引用關係劉嘉惠劉嘉惠引用關係
口試委員:鄭富國游原龍陳志賢陳澤雄鐘玉芳
口試日期:2011-06-23
學位類別:碩士
校院名稱:東海大學
系所名稱:資訊管理學系
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2011
畢業學年度:99
語文別:英文
論文頁數:50
中文關鍵詞:醫療資訊系統電子病歷行動代理人整合式安全系統資訊安全
外文關鍵詞:Health information systemsElectronic patient recordMobile agentSecure integrated systemInformation security
相關次數:
  • 被引用被引用:0
  • 點閱點閱:304
  • 評分評分:
  • 下載下載:33
  • 收藏至我的研究室書目清單書目收藏:1
隨著資訊科技快速的發展,傳統紙張的醫療記錄已逐漸改為電子格式。許多醫療機構已經開始利用資訊技術來控制醫療成本,促進醫療服務效率和質量,並投入大量人力和預算發展多樣化的醫療資訊系統,像是電子病歷,影像儲存系統及護理資訊系統。然而,為了節省醫療資源,希望讓病患的醫療資訊能共享到其它醫療院所並享有安全的環境,但在不同的醫療機構會使用不同的系統,因此在格式上面當然也就不同。在本研究中,並不會大幅度的改變當前醫療資訊系統也不會增加高額的成本,藉著虛擬式整合醫療資訊系統(VIMS)會協助各醫院在資訊的交流,此外透過行動代理人可以安全的收集分散在各個醫療機構的病歷資料。虛擬式整合醫療資訊系統(VIMS)是一個虛擬的電子整合系統並結合行動代理人技術。行動代理人擁有獨立性,適應性強和自主性,可克服來自於異質性系統的問題。另外,行動代理人可以確保即時性和實用性,從醫療記錄,醫生可以作出最適當的評估與診斷。該系統不僅可以提高醫療護理質量,這將可避免醫療資源的浪費,如重複用藥等,而可進一步成為參考諮詢或健康檢查的參考。
With the rapid development of information technology, paper-based medical records have gradually been changed to electronic forms. A lot of medical organizations have started to utilize information technology to promote service efficiency and medical quality that they have started to invest manpower and budget in developing diverse medical information systems, such as Electronic Patient Record, Nursing Information System. Nevertheless, different systems or medical organizations present individual system specifications and data-saving formats so that the medical information of the same patient cannot be exchanged, shared, and securely accessed. In order not to largely change the present medical information systems as well as not to increase abundant costs, Virtual Integrated Medical-information Systems (VIMS) is proposed to assist various hospitals in information exchange. Furthermore, with Mobile Agent, the dispersed medical information can be securely integrated. It presents confidentiality, non-repudiation, source authentication, and integrity in network transmission. Virtual Integrated Medical-information Systems (VIMS) is a virtual electronic integration system combined with Mobile Agent technology. With the features of independence, adaptability, mobility, objectives, and autonomy, Mobile Agent is applied to overcome the problems from heterogeneous systems. With the features, the over-dispersed medical records can be integrated. Moreover, Mobile Agent can ensure the instantaneity and usability of medical records from which doctors can make the most appropriate evaluation and diagnoses. It will avoid the waste of medical resources.
誌謝 I
中文摘要 II
Abstract III
Content IV
List of figure VI
1. Introduction 1
1.1 Research background 1
1.2 Research motivations 2
1.3 Research objectives 3
1.4 Research findings 4
2.Literature reviews 5
2.1 Electronic patient record (EPR) 5
2.2 Introduction to health information systems (HIS) 9
2.3 Introduction to mobile agent 10
2.4 Applications of mobile agent to health information system 12
3.Security of medical systems 16
3.1 Security requirements for medical systems 16
3.2 Secure medical system networks 18
4.The proposed system 25
4.1 System structure 26
4.2 Migration of mobile agent in the VIMS 30
5.System analysis 33
5.1 Virtualized data integration 33
5.2 Seamless inter-system operation 34
5.3 Secure and efficient data-sharing 35
6.Conclusion 37
REFERENCES 39

[1]Mildon J. and Cohen T., “Drivers in the Electronic Medical Records Market,” Health Management Technology, Vol. 22, No. 5, pp. 14-16, 2001.
[2]Institute Of Medicine , The National Academies, “Key Capabilities of an Electronic Health Record System,”, Washington, DC: National Academy Press, July, 2003.
[3]Yamazaki, S. and Y. Satomura, “Standard Method for Describing an Electronic Patient Record Template: Application of XML to Share Domain Knowledge,” Methods of Information in Medicine, pp. 50-55, 2000.
[4]K.A. Kuhn and D.A. Giuse, “From Hospital Information Systems to Health Information Systems,” Problems, challenges, perspectives, Methods of Information in Medicine, Vol. 40, No. 4, pp. 275-287, 2001.
[5]R. Haux, “Health Information Systems—Past, Present, Future,” International Journal of Medical Informatics, Vol. 75, pp. 268-281, 2006.
[6]S.J. Dwyer III, “A Personalized View of the History of PACS in the USA,” In Medical Imaging 2000: PACS Design and Evaluation: Engineering and Clinical Issues, G. James Blame, Eliot L. Siegel, Editors, Proceedings of SPIE, Vol. 3980, pp. 2-9, 2000.
[7]K. Kahl, L. Irancin and M. Fuhrmann, “Automated Nursing Documentation System Provides a Favorable Return on Investment,” The Journal of nursing administration, Vol. 21, No. 11, pp. 44-51, 1991.
[8]Vagelatos, A. and Sarivougioukas, J. “Lessons Learned from the Introduction of a Laboratory Information Systems in a State Hospital of Athens, Greece,” 36th Hawaii International Conference on System Sciences HICSS, USA, 2003.
[9]Thomas R. Brown, Handbook of institutional pharmacy practice, 4th Edition, American Society of Health-System Pharmacists, 2006.
[10]N. M. Karnik and A. R. Tripathi, “Design Issues in Mobile-Agent Programming Systems.” IEEE Concurrency, Vol.6, No. 3, pp. 52-61, 1998.
[11]V. A. Pham and A. Karmouch, “Mobile Software Agents: An Overview,” IEEE Communications Magazine, Vol.36, No.7, pp. 26-37, 1998.
[12]N. Borselius, “Mobile Agent Security,” Electronics & Communication Engineering Journal, Vol. 14, No. 5, pp. 211-218, 2002.
[13]C. Garrigues, S. Robles and J. Borrell, G. Navarro-Arribas “Promoting the Development of Secure Mobile Agent Applications,” Journal of Systems and Software (JSS), Vol. 83, No. 6, pp. 959-971, 2010.
[14]N.R. Jennigs, K. Sycara and M. Wooldridge, “A Roadmap of Agent Research and Development,” Autonomous Agents and Multi-Agent Systems, Vol. 1, No. 1, pp. 7-38, 1998.
[15]Y.F. Chung, T.S. Chen and M.W. Lai, “Efficient Migration Access Control for Mobile Agents,” Computer Standards & Interfaces, Vol. 31, No. 6, pp. 1061-1068, 2009.
[16]D. B. Lange and M. Oshima, “Seven Good Reasons for Mobile Agents,” Communication of The ACM, Vol. 42, No. 3, pp. 88-89, 1999.
[17]N. R. Jennings and M. Wooldridge, “Applications of Intelligent Agents,” Agent Technology Foundations, Applications and Markets, 1998.
[18]M. G. Geruti, “Mobile Agents in Network-Centric Warfare,” International Symposium Autonomous Decentralized Systems, pp. 243-246, 2001.
[19]NIST (National Institute of Standards and Technology) 1995. An Introduction to Computer Security: The NIST Handbook. (Special Publication 800-12).
[20]Taxonomy of Threats and Security Services for Information Systems, Gulachenski and Cost, (Working paper: Project No.:8353Z, Contract No.:DAAB07-94-C-H601), MITRE, 1994.
[21]N.L. Snee and K.A. McCormick, “The Case for Integrating Public Health Informatics Networks,” Engineering in Medicine and Biology Magazine, Vol. 23, No. 1, pp. 81-88, 2004.
[22]D.E. Detmer, “Building the National Health Information Infrastructure for Personal Health, Health Care Services, Public Health and Research,” BMC Medical Informatics and Decision Making, Vol. 3, No. 1, 2003.
[23]M. Shepherd, “Challenges in Health Informatics,” The 40th Annual Hawaii International Conference on System Sciences, pp. 135, 2007.
[24]ISO TS 17090 Health Informatics, Public key infrastructure, Part 1, framework and overview, Part 2, certification profiles, Part 3, policy management of certification authority (revised towards an ISO standards by ISO TC 215 WG 4 in 2004).
[25]P. Povalej, M. Leni, M. Zoman, P. Kokol and D. Dinevski, “Accuracy of Intelligent Medical Systems,” Computer Methods and Programs in Biomedicine, Vol. 80, pp. S95-S105, 2005.
[26]“NIST - Guide to Intrusion Detection and Prevention Systems (IDPS).” 2007-02. Retrieved 2010-06-25.
[27]Robert C. Newman, “Computer Security: Protecting Digital Resources,” Jones & Bartlett Learning. pp. 273-274. ISBN 9780763759940. Retrieved 25 June 2010.
[28]Idaho National Laboratory, “Control System Cyber Security: Defense in Depth Strategies”, Control Systems Security Center, U.S. Department of Homeland Security, May 2006.
[29]C.H. Liu, Y.F. Chung, T.S. Chen and S.D. Wang, “The Enhancement of Security in Healthcare Information System,” Journal of medical systems, 2010.
[30]D. E. Gobuty, “Defending Medical Information Systems Against Malicious Software,” International Congress Series, Vol. 1268, pp. 96-107, 2004.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top