Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å±â¼úº¸°í¼(TTAR) | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Ç¥ÁعøÈ£ | TTAR-12.0023 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
Á¦°³Á¤ÀÏ | 2016-10-31 | ÃÑ ÆäÀÌÁö | 28 | ||||||||||||||
ÇÑ±Û Ç¥Áظí | ¸ð¹ÙÀÏ µð¹ÙÀ̽º¿¡¼ ÀüÀڰǰ±â·ÏÀÇ º¸¾È - Part¥±:°³ÀÎÁ¤º¸(PHI) º¸È£Ã¼°è(±â¼úº¸°í¼) | ||||||||||||||||
¿µ¹® Ç¥Áظí | SECURING ELECTRONIC HEALTH RECORDS ON MOBILE DEVICES - Part¥±:Personal Health Information(PHI) Security Architecture(Technical Report) | ||||||||||||||||
ÇÑ±Û ³»¿ë¿ä¾à | ÀÌ ±â¼úº¸°í¼´Â ÀÇ·áÁ¤º¸¼ºñ½º Á¦°øÀÚ ¹× °ü·Ã ±â°üÀÇ Á¤º¸Åë½Å ÃÖ°í´ã´çÀÚ, Á¤º¸º¸È£ ÃÖ°í´ã´çÀÚ ±×¸®°í º¸¾È°ü¸®ÀÚ¿¡°Ô ÀüÀڰǰ±â·Ï ½Ã½ºÅÛ°ú ¿¬µ¿µÈ ¸ð¹ÙÀÏ µð¹ÙÀ̽º¸¦ »ç¿ëÇÒ ¶§ °í·ÁÇØ¾ß ÇÒ º¸¾È Á¢±Ù¹æ¹ý, ¾ÆÅ°ÅØÃ³ ¹× º¸¾ÈƯ¼ºÀ» Á¦°øÇÑ´Ù. | ||||||||||||||||
¿µ¹® ³»¿ë¿ä¾à | The technical report presents the securing approach, architecture and security characteristics which should be considered while using the mobile devices connected to the electrical health records system for the health information service provides, chief engineers for IT, chief staff for information security, security managers. | ||||||||||||||||
°ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
°ü·ÃÆÄÀÏ |
![]() |
||||||||||||||||
Ç¥ÁØÀÌ·Â |
|