期刊文献+

数字签名与加密在基于XML电子病历中的应用 被引量:2

Application of Signature and Encryption to EMR based on XML
下载PDF
导出
摘要 介绍了解决电子病历交换传输中的数据一致性、安全性等问题。利用可扩展标志语言(简称XML)在实现信息标准化、信息统一、信息的交换和共享上有其独特的技术优势研究电子病历系统。提出了一种解决方案,方案由XML Schema验证、数据加密、数字签名组成。该方案保证了电子病历文档书写的正确性、电子病历内容的保密性和不可否认性。 Aim In order to solve the problem of data consistency and security in EMR exchange and transfer. Methods Extensible Markup Language (XML) has its unique technical advantages in standardization of information, uniformity of information , information exchange and sharing. XML technology can be imported in EMR system by using these advantages. Results a solving protocol is proposed in this paper. XML Schema validity check, data eneryption and digital signature are included in the scheme. Conclusion The writing correctness, the content' secrecy and undeniable of EMR paper are ensured in the project.
作者 刘飞 高红艳
出处 《电脑开发与应用》 2009年第6期38-40,共3页 Computer Development & Applications
基金 陕西省教育厅项目资助课题(08JK216)
关键词 电子病历 XML 加密 数字签名 electronic medical record, XML, encryption, digital signature
  • 相关文献

参考文献8

  • 1Bertina Carminati B, Ferrari E. XMI. Security[R].University of lnsubria at Como, Italy, 2001: 44-58.
  • 2Boyd C. Multisignatures based on Zero Knowledge Schemes[J]. Electronic Letters, 1991, 27(22): 2002- 2004.
  • 3Camenisch J. Efficient and Generalized group signatures[C]. Proc. of Euro-Crypt'97,1997,1233: 465-479.
  • 4Erdmann M, Studer R. How to Structure and Access XML Documents with Ontologies[J].Data and Knowledges Engineering, 2000, 36(3):317-335.
  • 5Eastlake D, Reagle J. XML Encryption Syntax and Processing [Z ]. http://www. w3. org/TR/xmlene- core/,2001-06 07.
  • 6Eastlake D, Reagle J. Solo D. XML Signature Syntax and Processing[Z].http://www. w3. org/TR/ xmldsig-core/, 2002-03-24.
  • 7董斌,陈进哲,刘秀玲,张瑜.基于Web的RBAC权限机制在电子病历系统的研究[J].计算机工程与应用,2008,44(26):233-235. 被引量:5
  • 8孟翔,郑重,薛万国.电子病历的加密和解密模型实现—XML的加密和解密[J].计算机工程与应用,2005,41(20):229-232. 被引量:5

二级参考文献12

  • 1王凯戎.电子病历的法律地位及应用的可行性[J].中华医院管理杂志,2005,21(8):554-557. 被引量:44
  • 2蒋友毅,宋靖宇,钟华.P-RBAC:一种门户环境下的访问控制模型[J].计算机工程与应用,2007,43(12):119-123. 被引量:3
  • 3Al-Kahtani M,Sandhu R.A model for attribute-based user-role assignment [C]//The Proceedings of the 18th Annual Computer Security Applications Conference.Las Vegas NV:IEEE,December 2002: 353-362.
  • 4Sandhu R S,park J S.Decentralized user-role assignment for Web-based intranets[C]//The Proceedings of the Third ACM Workshop on Role-Based Access Control.New York:ACM Press,1998.
  • 5Laurent S.Cookies[M].New York:McGraw-Hill,1998.
  • 6Park J S,Sandhu R S.Secure cookies on the Web[J].IEEE Internet Compute, 2000,4(4) : 36-44.
  • 7Ben Galbraith Whitney Hankison 吴旭超 王梨译.Web服务安全性高级编程[M].北京:清华大学出版社,2003..
  • 8W3C.XML-Encryption Syntax and Processing[EB/OL].http://www.w3.org/TR/xmlenc-core/
  • 9W3C.Extensible Markup Language(XML) 1.0[EB/OL].http ://www.w3.org/TR/2004/REC-xml-20040204/
  • 10BlakeDournaee著 周永彬 贺也平 刘娟译.XML安全基础[M].北京:清华大学出版社,2003..

共引文献8

同被引文献12

引证文献2

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部