EMRlog method for computer security for electronic medical records with logic and data mining
Autor: | Juan Frausto Solís, Sergio Mauricio Martínez Monterrubio, Raúl Monroy Borja |
---|---|
Jazyk: | angličtina |
Rok vydání: | 2015 |
Předmět: |
Article Subject
Quality Assurance Health Care Computer science computer system lcsh:Medicine Security policy computer.software_genre Computer security General Biochemistry Genetics and Molecular Biology Article Consistency (database systems) data base organization and management Electronic Health Records human procedures hospital electronic medical record Mexico Computer Security Predicate logic logic Cloud computing security algorithm General Immunology and Microbiology lcsh:R hospital policy methodology General Medicine data mining electronic health record Computer security model confidentiality Automated theorem proving Security service health care quality 7 INGENIERÍA Y TECNOLOGÍA Information security standards protocol compliance standards hospital planning Data mining Guideline Adherence computer Algorithms Research Article |
Zdroj: | BioMed research international BioMed Research International BioMed Research International, Vol 2015 (2015) |
Popis: | The proper functioning of a hospital computer system is an arduous work for managers and staff. However, inconsistent policies are frequent and can produce enormous problems, such as stolen information, frequent failures, and loss of the entire or part of the hospital data. This paper presents a new method named EMRlog for computer security systems in hospitals. EMRlog is focused on two kinds of security policies: directive and implemented policies. Security policies are applied to computer systems that handle huge amounts of information such as databases, applications, and medical records. Firstly, a syntactic verification step is applied by using predicate logic. Then data mining techniques are used to detect which security policies have really been implemented by the computer systems staff. Subsequently, consistency is verified in both kinds of policies; in addition these subsets are contrasted and validated. This is performed by an automatic theorem prover. Thus, many kinds of vulnerabilities can be removed for achieving a safer computer system. Copyright © 2015 Sergio Mauricio Martínez Monterrubio et al. |
Databáze: | OpenAIRE |
Externí odkaz: |