Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å±â¼úº¸°í¼(TTAR) | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Ç¥ÁعøÈ£ | TTAR-12.0024 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
Á¦°³Á¤ÀÏ | 2017-11-09 | ÃÑ ÆäÀÌÁö | 100 | ||||||||||||||
ÇÑ±Û Ç¥Áظí | ¸ð¹ÙÀÏ µð¹ÙÀ̽º¿¡¼ ÀüÀڰǰ±â·ÏÀÇ º¸¾È - PART ¥²: º¸¾È½Ç¹«ÀÚµéÀ» À§ÇÑ Áöħ(±â¼úº¸°í¼) | ||||||||||||||||
¿µ¹® Ç¥Áظí | Securing Electronic Health Records on Mobile Devices - PART ¥²: How-To Guides for Security Engineers(Technical Report) | ||||||||||||||||
ÇÑ±Û ³»¿ë¿ä¾à | º» ±â¼úº¸°í¼´Â ÀÇ·áÁ¤º¸¼ºñ½º Á¦°øÀÚ ¹× °ü·Ã ±â°üÀÇ Á¤º¸Åë½Å ÃÖ°í´ã´çÀÚ, Á¤º¸º¸È£ ÃÖ°í´ã´çÀÚ ±×¸®°í º¸¾È °ü¸®ÀÚ¿¡°Ô ÀüÀڰǰ±â·Ï ½Ã½ºÅÛ°ú ¿¬µ¿µÈ ¸ð¹ÙÀÏ µð¹ÙÀ̽º¸¦ »ç¿ëÇÒ ¶§ °í·ÁÇØ¾ß ÇÒ º¸¾È Á¢±Ù¹æ¹ý, ¾ÆÅ°ÅØÃ³ ¹× º¸¾ÈƯ¼º°ú »ç¿ë¹ýÀ» Á¦°øÇÑ´Ù. ¶ÇÇÑ ¸ð¹ÙÀÏ µð¹ÙÀ̽º¿¡¼ ÀüÀڰǰ±â·ÏÀ» ¾ÈÀüÇÏ°Ô Àü¼ÛÇϱâ À§ÇØ ¿ÀǼҽº ¼ÒÇÁÆ®¿þ¾î ±â¹ÝÀÇ ¹ü¿ë ¿¹Á¦ ¼Ö·ç¼ÇÀ» ÅëÇØ ¾î¶»°Ô ±¸ÇöÇߴ°¡¸¦ ±â¼úÇÑ´Ù. º¸¾È ¿µ¿ªÀº ¸Á ±¸Ãà, ¹é¾÷, ±¸¼º°ü¸®, ħÀÔŽÁö½Ã½ºÅÛ, È£½ºÆ® ¹× ¸ð¹ÙÀϵð¹ÙÀ̽º º¸¾È, ID ¹× Á¢±ÙÁ¦¾î, ¿î¿µÃ¼°è¸¦ ¸ðµÎ Æ÷ÇÔÇÑ´Ù. º» º¸°í¼¿¡´Â À̹ø ÂüÁ¶¿¡ Àû¿ëµÈ ¸ðµç Á¦Ç°µéÀ» ´Ù·ç°í ÀÖÁö¸¸ ³Î¸® »ç¿ë °¡´ÉÇÑ °ÍÀ¸·Î ÃßÁ¤µÇ´Â Á¦Á¶¾÷üÀÇ ¼³¸í¼¸¦ ´Ù½Ã ¸¸µéÁö´Â ¾Ê´Â´Ù. ¿ÀÈ÷·Á º» º¸°í¼´Â ¿ì¸®°¡ ÂüÁ¶¿¡ Àû¿ëµÈ Á¦Ç°µéÀ» º¸¾ÈÀ» À§ÇØ ¾î¶»°Ô ÅëÇÕÇß´ÂÁö¸¦ ±â¼úÇÑ´Ù. º» ±â¼úº¸°í¼´Â ¸ð¹ÙÀÏ µð¹ÙÀ̽º¿¡¼ ÀüÀڰǰ±â·ÏÀÇ º¸¾È PART ¥² º¸¾È½Ç¹«ÀÚµéÀ» À§ÇÑ Áöħ(ÀÌÇÏ PART ¥²)À¸·Î¼ º¸¾È½Ç¹«ÀÚµéÀ» À§ÇÑ º¸¾È ¿µ¿ªº° »ç¿ë °¡À̵å¶óÀο¡ ´ëÇØ ´Ù·é´Ù. | ||||||||||||||||
¿µ¹® ³»¿ë¿ä¾à | The technical report provides the security approach, architecture, and security characteristics and usage that should be considered when using the mobile devices associated with the electronic health record system to the chief information and communications managers of the health information service providers and related organizations. | ||||||||||||||||
°ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
°ü·ÃÆÄÀÏ |
![]() |
||||||||||||||||
Ç¥ÁØÀÌ·Â |
|