Improving the Security Layer logic for a Health Care Information System
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 1
Abstract
Abstract: In a previous paper we suggested an information system to store, manage and treat millions of the gathered patient’s information. We were able to propose a reliable application, which is able to fulfill the most important criterions, mainly measurement, monitoring, guidance, Data management and their analysis. The introduction of the Internet and the related technologies are offering countless opportunities to build an efficient healthcare system, but in the same time, Software-applications are facing adoption and securities challenges.In the software development, end users often lack knowledge of vulnerabilities, attacks and threats. Application designers, developers and testers are discovering and fixing constantly bugs, defects and flaws.The aim of this paper is to highlight the importance of integrating and adding a high level of security to the previously developed application by advocating a reliable and protected information system. To this end, we examine firstthe several possible sources of vulnerability. Secondly, we will present a viewpoint explaining the fundamentals principles that a secured health care system should possess. In a third part we will discuss the proposed strategy and system architecture to defend against attacks. Today, the technology could contribute actively in resolving some of problems. Connected computers are increasingly being introduced into safety -critical healthcare systems and as consequence have being involved in the progress but also in some accidents. Concretely in this study, the objective is to obtain a safely data management system by implementing an additional level oflogical and physical data security.To summarize, this paper presents a software development concept, particularly with a web-based focus. It introduces a common application’s attacks and suggests methods to defend against them.
Authors and Affiliations
Abdelghani El malhi , Mohamed Ahd , Adil Echchelh , Abdelrhani Mokhtari , Soulaymani Bencheik
Detecting multiple Blackhole and Grayhole attacks in MANETS by modifying AODV
Abstract: Ad hoc networking refers to as network with no fixed Infrastructure. When the nodes are assumed to be capable of moving in the network, then networks are referred as MANETs (mobile ad hoc networks).Securi...
Modeling and Processing of Cloud Computing and It’s Performance Measurement
Abstract: Cloud computing is the growing technology of large scale distributed computing. It provides ondemand access to distributed resources, which are available in open environment on paid basis. Because all most all...
Automatic Text Extraction System for Complex Images
Abstract : The Intelligent text extraction system automatically identifies and extracts the text present in different types of images. The growth of digital world Detection and Extraction of text regions in an image are...
Use Map EstimationFor Image Sharpening
This paper presents a various paradigms for estimating a single latent sharp image given multiple blurry and/or noisy observations. Whether employing it to make an unusable image good, a good image better or givi...
An effective citation metadata extraction process based on BibPro parser
There is a dramatic increase in academic publications and these publications are integrated to the digital libraries by making use of citation string. Any author can publish the journals conferences with the help...