ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å±â¼úº¸°í¼­(TTAR)
Ç¥ÁعøÈ£ TTAR-12.0023 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2016-10-31 ÃÑ ÆäÀÌÁö 28
ÇÑ±Û Ç¥ÁØ¸í ¸ð¹ÙÀÏ µð¹ÙÀ̽º¿¡¼­ ÀüÀڰǰ­±â·ÏÀÇ º¸¾È - Part¥±:°³ÀÎÁ¤º¸(PHI) º¸È£Ã¼°è(±â¼úº¸°í¼­)
¿µ¹® Ç¥Áظí SECURING ELECTRONIC HEALTH RECORDS ON MOBILE DEVICES - Part¥±:Personal Health Information(PHI) Security Architecture(Technical Report)
ÇÑ±Û ³»¿ë¿ä¾à ÀÌ ±â¼úº¸°í¼­´Â ÀÇ·áÁ¤º¸¼­ºñ½º Á¦°øÀÚ ¹× °ü·Ã ±â°üÀÇ Á¤º¸Åë½Å ÃÖ°í´ã´çÀÚ, Á¤º¸º¸È£ ÃÖ°í´ã´çÀÚ ±×¸®°í º¸¾È°ü¸®ÀÚ¿¡°Ô ÀüÀڰǰ­±â·Ï ½Ã½ºÅÛ°ú ¿¬µ¿µÈ ¸ð¹ÙÀÏ µð¹ÙÀ̽º¸¦ »ç¿ëÇÒ ¶§ °í·ÁÇØ¾ß ÇÒ º¸¾È Á¢±Ù¹æ¹ý, ¾ÆÅ°ÅØÃ³ ¹× º¸¾ÈƯ¼ºÀ» Á¦°øÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à The technical report presents the securing approach, architecture and security characteristics which should be considered while using the mobile devices connected to the electrical health records system for the health information service provides, chief engineers for IT, chief staff for information security, security managers.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAR-12.0023.pdf TTAR-12.0023.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
¸ð¹ÙÀÏ µð¹ÙÀ̽º¿¡¼­ ÀüÀڰǰ­±â·ÏÀÇ º¸¾È - Part¥±:°³ÀÎÁ¤º¸(PHI) º¸È£Ã¼°è(±â¼úº¸°í¼­) TTAR-12.0023 2016-10-31 Á¦Á¤ À¯È¿ ¾øÀ½ TTAR-12.0023.pdf