Security Mechanisms for Network Communications in Medical Mobile Computing Environment

博士 === 國立中興大學 === 資訊科學與工程學系所 === 100 === Due to modern medical advances and patient''s consciousness promotion, urban and countryside compete for the medical resources distribution that could cause the situation of medical material disequilibrium. With different situations and regi...

Full description

Bibliographic Details
Main Authors: Tsung-Chih Hsiao, 蕭宗志
Other Authors: 洪國寶
Format: Others
Language:en_US
Published: 2012
Online Access:http://ndltd.ncl.edu.tw/handle/31470918205003980243
id ndltd-TW-100NCHU5394075
record_format oai_dc
spelling ndltd-TW-100NCHU53940752016-10-23T04:11:29Z http://ndltd.ncl.edu.tw/handle/31470918205003980243 Security Mechanisms for Network Communications in Medical Mobile Computing Environment 醫療行動計算環境中通訊安全之機制 Tsung-Chih Hsiao 蕭宗志 博士 國立中興大學 資訊科學與工程學系所 100 Due to modern medical advances and patient''s consciousness promotion, urban and countryside compete for the medical resources distribution that could cause the situation of medical material disequilibrium. With different situations and regions that could derive from the dissimilar medical environment and resource allocation problems, those issues caused some areas lack of medical materials. Besides, that also results in patient’s treatment, such as medical treatment delays and resources distribution wastes. At present, except for hospitals and other dispensaries, people need not only to solve part of area’s medical insufficient problems, but to maintain considerably medical standards and demands. For example, while patients are in dangerous conditions which need medical handling and remote districts, resources distribution issue and facilities establishment faultiness could cause patients’ life-long injure and death. If people is given some medical recommendations or information in that moment, that could avoid unnecessary damages and death. A modern hospital owns the center of integrity medical record management. All of these medical records provided with law protection and patient privacy security. Therefore, for ensuring the relevance medical data could transmit safety on the Internet and guaranteeing those information’s privacy and integrity. It requires authentication to ensure these privacy information not to be obtained by illegal person. The information should be protected includes the patient’s treatment records and clinical diagnosis research, which related to patient’s privacy. Therefore, this paper is divided into three aspects to integrate medical operational environments, the application of wireless sensor network technology and security authentication, which combined with access control to integrate the whole medical environment. First, using authentication to not only integrate medical environment, but to resist different kinds of malicious attacks, such as Password-guessing attack, Replay attack, Stolen-verifier attack or Impersonation attack. Second, the scheme, which includes a time-bounded characteristic that allows the verified staff to access data without the needs to re-authenticate and re-login into the system within a set period of time. Consequently, the time-bounded property also increases the work efficiency of the system administrators and users. Finally, using hierarchical key management to solve the problems of key production in the organization and the issues of access control; simultaneously, it controlled resources and confidential files to proceed the effectively access control to avoid personal information accessing without unauthorized. Therefore, it provides good medical service quality and takes care of patient’s obligation to ensure the patient’s family and patient’s right. It will be worthy of topic for discussion to confer presently. 洪國寶 2012 學位論文 ; thesis 94 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 博士 === 國立中興大學 === 資訊科學與工程學系所 === 100 === Due to modern medical advances and patient''s consciousness promotion, urban and countryside compete for the medical resources distribution that could cause the situation of medical material disequilibrium. With different situations and regions that could derive from the dissimilar medical environment and resource allocation problems, those issues caused some areas lack of medical materials. Besides, that also results in patient’s treatment, such as medical treatment delays and resources distribution wastes. At present, except for hospitals and other dispensaries, people need not only to solve part of area’s medical insufficient problems, but to maintain considerably medical standards and demands. For example, while patients are in dangerous conditions which need medical handling and remote districts, resources distribution issue and facilities establishment faultiness could cause patients’ life-long injure and death. If people is given some medical recommendations or information in that moment, that could avoid unnecessary damages and death. A modern hospital owns the center of integrity medical record management. All of these medical records provided with law protection and patient privacy security. Therefore, for ensuring the relevance medical data could transmit safety on the Internet and guaranteeing those information’s privacy and integrity. It requires authentication to ensure these privacy information not to be obtained by illegal person. The information should be protected includes the patient’s treatment records and clinical diagnosis research, which related to patient’s privacy. Therefore, this paper is divided into three aspects to integrate medical operational environments, the application of wireless sensor network technology and security authentication, which combined with access control to integrate the whole medical environment. First, using authentication to not only integrate medical environment, but to resist different kinds of malicious attacks, such as Password-guessing attack, Replay attack, Stolen-verifier attack or Impersonation attack. Second, the scheme, which includes a time-bounded characteristic that allows the verified staff to access data without the needs to re-authenticate and re-login into the system within a set period of time. Consequently, the time-bounded property also increases the work efficiency of the system administrators and users. Finally, using hierarchical key management to solve the problems of key production in the organization and the issues of access control; simultaneously, it controlled resources and confidential files to proceed the effectively access control to avoid personal information accessing without unauthorized. Therefore, it provides good medical service quality and takes care of patient’s obligation to ensure the patient’s family and patient’s right. It will be worthy of topic for discussion to confer presently.
author2 洪國寶
author_facet 洪國寶
Tsung-Chih Hsiao
蕭宗志
author Tsung-Chih Hsiao
蕭宗志
spellingShingle Tsung-Chih Hsiao
蕭宗志
Security Mechanisms for Network Communications in Medical Mobile Computing Environment
author_sort Tsung-Chih Hsiao
title Security Mechanisms for Network Communications in Medical Mobile Computing Environment
title_short Security Mechanisms for Network Communications in Medical Mobile Computing Environment
title_full Security Mechanisms for Network Communications in Medical Mobile Computing Environment
title_fullStr Security Mechanisms for Network Communications in Medical Mobile Computing Environment
title_full_unstemmed Security Mechanisms for Network Communications in Medical Mobile Computing Environment
title_sort security mechanisms for network communications in medical mobile computing environment
publishDate 2012
url http://ndltd.ncl.edu.tw/handle/31470918205003980243
work_keys_str_mv AT tsungchihhsiao securitymechanismsfornetworkcommunicationsinmedicalmobilecomputingenvironment
AT xiāozōngzhì securitymechanismsfornetworkcommunicationsinmedicalmobilecomputingenvironment
AT tsungchihhsiao yīliáoxíngdòngjìsuànhuánjìngzhōngtōngxùnānquánzhījīzhì
AT xiāozōngzhì yīliáoxíngdòngjìsuànhuánjìngzhōngtōngxùnānquánzhījīzhì
_version_ 1718388872801419264