Title
Integrating Security Considerations in Client Server Architectures of Health Information Systems Development
Abstract
Health Information Systems (HIS) has become more complex and complicate to manage and maintain their secure operations. Many kinds of information security breaches and unintended information disclosures of confidential patient information have reported to warn the important security issues of HIS. Integrating of security considerations for developing complex HIS is emergent to provide a secure system for patients. While system architecture plays an important role in system development, we proposed an approach to enhance secure client-server system architecture for the development of HIS. After applying our approach, the satisfaction of security requirements in architecture can be checked by software and be reported quickly. Architects can modify the architecture to satisfy the corresponding security requirements with the reported descriptions and suggestion.
Year
DOI
Venue
2011
10.1109/IMIS.2011.74
IMIS
Keywords
Field
DocType
system development,corresponding security requirement,important security issue,security,secure system,his,client-server architecture,confidential patient information,information security breach,health information systems development,patient information,health information systems,security requirement,secure client-server system architecture,system architecture,security consideration,client server architectures,integrating security considerations,client-server systems,security requirements,medical administrative data processing,security of data,internet,encyclopedias,satisfiability,client server,indexing terms,electronic publishing,secure computation,health information system,servers,information security,computer architecture,client server architecture
Security testing,Information security standards,Computer science,Computer security,Distributed System Security Architecture,Sherwood Applied Business Security Architecture,Computer network,Security service,Information security management,Security information and event management,Enterprise information security architecture
Conference
ISBN
Citations 
PageRank 
978-0-7695-4372-7
1
0.38
References 
Authors
8
3
Name
Order
Citations
PageRank
Chih-Cheng Lien193.00
Chang-Wu Liu210.38
Yi-An Chen3895.36