Thumbnail
Access Restriction
Open

Author Solis, Juan Frausto ♦ Borja, Raúl Monroy ♦ Monterrubio, Sergio Mauricio Martínez
Source Directory of Open Access Journals (DOAJ)
Content type Text
Publisher Hindawi Limited
File Format HTM / HTML
Date Created 2015-10-12
Copyright Year ©2015
Language English
Subject Domain (in LCC) R
Subject Keyword Medicine
Abstract The proper functioning of a hospital computer system is an arduous work for managers and staff. However, inconsistent policies are frequent and can produce enormous problems, such as stolen information, frequent failures, and loss of the entire or part of the hospital data. This paper presents a new method named EMRlog for computer security systems in hospitals. EMRlog is focused on two kinds of security policies: directive and implemented policies. Security policies are applied to computer systems that handle huge amounts of information such as databases, applications, and medical records. Firstly, a syntactic verification step is applied by using predicate logic. Then data mining techniques are used to detect which security policies have really been implemented by the computer systems staff. Subsequently, consistency is verified in both kinds of policies; in addition these subsets are contrasted and validated. This is performed by an automatic theorem prover. Thus, many kinds of vulnerabilities can be removed for achieving a safer computer system.
ISSN 23146133
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG ♦ Career/Technical Study
Learning Resource Type Article
Publisher Date 2015-01-01
e-ISSN 23146133
Journal BioMed Research International
Volume Number 2015


Source: Directory of Open Access Journals (DOAJ)