期刊文献+

基于等级保护要求 加强医院信息安全管理 被引量:15

Enhancement of Hospital Information Security Management Based on the Demands of Level Protection
暂未订购
导出
摘要 以2017年6月1日起实施的《中华人民共和国网络安全法》为基础,结合医院信息系统的分类和特点,全面分析医院信息系统安全需求,重点讨论医院信息系统等级保护实施过程中要采取的措施,确保医院信息系统的持续安全运行。 Based on "People's Republic of China' s Law on Network Security" which took effect on June 1, 2017, combining with the classification and characteristics of hospital information system, this paper has comprehensively analyzed requirements of hospital information system security. It focused on the measures to be taken during the implementation of grade protection of hospital information system to ensure the sustaining safely operation of the hospital information system.
出处 《中国卫生信息管理杂志》 2017年第6期843-845,共3页 Chinese Journal of Health Informatics and Management
基金 2012年全军医药卫生科研基金课题(项目编号:CLZ12JB01)
关键词 信息 安全等级 保护 information, Safety level, To protect
  • 相关文献

参考文献5

二级参考文献31

  • 1马中立,张凌.医院信息化对医院现代化建设的作用[J].中华医院管理杂志,2006,22(5):350-351. 被引量:104
  • 2赵玲涛,杨树堂,陆松年,李建华.大规模多用户网络安全监控与审计系统[J].计算机工程与应用,2006,42(32):106-107. 被引量:3
  • 3Sperotto A. An Overview of IP Flow-based Intrusion Detection[J]. IEEE Communications Surveys & Tutorials, 2010, 12(3): 343-356.
  • 4Yang Yahui, Jiang Dianbo, Xia Min. Using Improved GHSOM for Intrusion Detection[J]. Journal of Information Assurance and Security, 2010, 5(3): 232-239.
  • 5Bernaille L, Soule A, Akodjenou I, et al. Blind Application Recognition Through Behavioral Classi?cation[EB/OL]. (2009-02-06). http://www.cl.cam.ac.uk/~awm22/publications/ moore2005discriminators.pdf.
  • 6Bernaille L, Teixeira R, Salamatian K. Early Application Iden- ti?cation[C]//Proc. of International Conference on Emerging Networking Experiments and Technologies. Lisboa, Portugal: [s. n.], 2006.
  • 7Huang Nen-Fu, Jai Gin-Yuan, Chao Han-Chieh. Early Identi- fying Application Traffic with Application Characteristics[C]// Proc. of IEEE International Conference on Communications. [S. l.]: IEEE Press, 2008.
  • 8Kayacik H G, Heywood N Z, Heywood M I. Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD99 Intrusion Detection Datasets[C]//Proc. of the 3rd Annual Conference on Privacy, Security and Trust. [S. l.]: Springer, 2005.
  • 9Li Zhinchun, Gao Yan, Chen Yan, et al. Towards a High-speed Router-based Anomaly/Intrusion Detection System[C]//Proc. of ACM Sigcomm’05. [S. l.]: ACM Press, 2005.
  • 10Gao Yan, Li Zhinchun, Chen Yan. A Dos Resilient Flow-level Intrusion Detection Approach for High-speed Networks[C]// Proc. of the 26th IEEE International Conference on Distributed Computing Systems. [S. l.]: IEEE Press, 2006.

共引文献60

同被引文献101

引证文献15

二级引证文献83

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部