Improving the Security Layer logic for a Health Care Information System
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 1
Abstract
Abstract: In a previous paper we suggested an information system to store, manage and treat millions of the gathered patient’s information. We were able to propose a reliable application, which is able to fulfill the most important criterions, mainly measurement, monitoring, guidance, Data management and their analysis. The introduction of the Internet and the related technologies are offering countless opportunities to build an efficient healthcare system, but in the same time, Software-applications are facing adoption and securities challenges.In the software development, end users often lack knowledge of vulnerabilities, attacks and threats. Application designers, developers and testers are discovering and fixing constantly bugs, defects and flaws.The aim of this paper is to highlight the importance of integrating and adding a high level of security to the previously developed application by advocating a reliable and protected information system. To this end, we examine firstthe several possible sources of vulnerability. Secondly, we will present a viewpoint explaining the fundamentals principles that a secured health care system should possess. In a third part we will discuss the proposed strategy and system architecture to defend against attacks. Today, the technology could contribute actively in resolving some of problems. Connected computers are increasingly being introduced into safety -critical healthcare systems and as consequence have being involved in the progress but also in some accidents. Concretely in this study, the objective is to obtain a safely data management system by implementing an additional level oflogical and physical data security.To summarize, this paper presents a software development concept, particularly with a web-based focus. It introduces a common application’s attacks and suggests methods to defend against them.
Authors and Affiliations
Abdelghani El malhi , Mohamed Ahd , Adil Echchelh , Abdelrhani Mokhtari , Soulaymani Bencheik
Smart Blood Bank as a Service on Cloud
Abstract: We all know the working of blood bank management system. A blood bank is a cache or bank of blood or blood components, gathered as a result of blood donation or collection, stored and preserved for later use in...
Challenges to Data Base Security – A Futuristic View
Abstract: In present scenario, database security is on prime consideration, for any organization because of its implementation and complex nature of system. It is generally associated with the dealing of retrieval of dat...
Analysis of Alignment of TEM Image using ECC
Abstract: TEM images are rapidly gaining prominence in various sectors like life sciences, pathology, medical science, semiconductors, forensics, etc. Hence, it is important to analyse the methods which are availab...
Implementation of AES Algorithm in MicroController Using PIC18F452
Security has become an increasingly important feature with the growth of electronic communication which calls for more advanced ways to encrypt the raw data[1]AES-128 is going to be implemented as the encr...
Information and Communication Technology: A Global Tool to Facilitate Teaching and Learning of Business Education in Colleges in Nigeria.
Abstract: Information and Communication Technology (ICTs) occupies a complex position in relations to teaching and learning of Business Education in Colleges. The emergence of ICTs has serious implications on the nature...