EMRlog method for computer security for electronic medical records with logic and data mining

Autor: Juan Frausto Solís, Sergio Mauricio Martínez Monterrubio, Raúl Monroy Borja
Jazyk: angličtina
Rok vydání: 2015
Předmět:
Article Subject
Quality Assurance
Health Care

Computer science
computer system
lcsh:Medicine
Security policy
computer.software_genre
Computer security
General Biochemistry
Genetics and Molecular Biology

Article
Consistency (database systems)
data base
organization and management
Electronic Health Records
human
procedures
hospital
electronic medical record
Mexico
Computer Security
Predicate logic
logic
Cloud computing security
algorithm
General Immunology and Microbiology
lcsh:R
hospital policy
methodology
General Medicine
data mining
electronic health record
Computer security model
confidentiality
Automated theorem proving
Security service
health care quality
7 INGENIERÍA Y TECNOLOGÍA
Information security standards
protocol compliance
standards
hospital planning
Data mining
Guideline Adherence
computer
Algorithms
Research Article
Zdroj: BioMed research international
BioMed Research International
BioMed Research International, Vol 2015 (2015)
Popis: The proper functioning of a hospital computer system is an arduous work for managers and staff. However, inconsistent policies are frequent and can produce enormous problems, such as stolen information, frequent failures, and loss of the entire or part of the hospital data. This paper presents a new method named EMRlog for computer security systems in hospitals. EMRlog is focused on two kinds of security policies: directive and implemented policies. Security policies are applied to computer systems that handle huge amounts of information such as databases, applications, and medical records. Firstly, a syntactic verification step is applied by using predicate logic. Then data mining techniques are used to detect which security policies have really been implemented by the computer systems staff. Subsequently, consistency is verified in both kinds of policies; in addition these subsets are contrasted and validated. This is performed by an automatic theorem prover. Thus, many kinds of vulnerabilities can be removed for achieving a safer computer system. Copyright © 2015 Sergio Mauricio Martínez Monterrubio et al.
Databáze: OpenAIRE