Security policy management for healthcare system network

被引:0
|
作者
Lee, K [1 ]
Jiang, Z [1 ]
Kim, S [1 ]
Kim, S [1 ]
机构
[1] Kyungpook Natl Univ, Dept Comp Sci, Taejon, South Korea
来源
HEALTHCOM 2005: 7TH INTERNATIONAL WORKSHOP ON ENTERPRISE NETWORKING AND COMPUTING IN HEALTHCARE INDUSTRY, PROCEEDINGS | 2005年
关键词
communication system security; intelligent network; large infrastructure;
D O I
10.1109/HEALTH.2005.1500463
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Healthcare system consist of a number of sub-networks by physically. Since each sub-network has management privileges and policies individually, it is difficult to respond to harmful traffic such as warm viruses that affect entire networks. In this paper, we propose a high-level policy language and a middle-level data structure for the healthcare system. They were named Triton language and Common Access Management Form (CAMF) [1]. It enables the administrator to authorize a policy effectively and rapidly. Healthcare system networks have a number of administrators so that policy collision can occur. Security policy management system selects or adapts the most important policy among colliding policies through a policy importance valuation.
引用
收藏
页码:289 / 292
页数:4
相关论文
共 50 条
  • [1] Automatic management of network security policy
    Burns, J
    Cheng, A
    Gurung, P
    Rajagopalan, S
    Rao, P
    Rosenbluth, D
    Surendran, AV
    Martin, DM
    DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL II, PROCEEDINGS, 2001, : 12 - 26
  • [2] The development of policy proxy agent in policy-based network security management system
    Information Security Research Division, Electronics and Telecommunications Research Institute, 161, Gajeong-dong, Yuseong-gu, Daejeon City 305-350, Korea, Republic of
    WSEAS Trans. Commun., 2007, 1 (236-240):
  • [3] Policy Research of Network Security about Employment Management System in Colleges and Universities
    Luo Lin
    FRONTIERS OF GREEN BUILDING, MATERIALS AND CIVIL ENGINEERING, PTS 1-8, 2011, 71-78 : 4353 - 4356
  • [4] A survey on policy languages in network and security management
    Han, Weili
    Lei, Chang
    COMPUTER NETWORKS, 2012, 56 (01) : 477 - 489
  • [5] Network Security Metrics and Performance for Healthcare Systems Management
    Liu, Vicky
    Tesfamicael, Aklilu Daniel
    Caelli, William
    Sahama, Tony
    2015 17TH INTERNATIONAL CONFERENCE ON E-HEALTH NETWORKING, APPLICATION & SERVICES (HEALTHCOM), 2015, : 189 - 194
  • [6] Network security project management: A security policy-based approach
    Krichene, Jihene
    Boudriga, Noureddine
    2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 784 - 789
  • [7] Design of network security policy information model for policy-based network management
    Sohn, SG
    Kim, J
    Na, JC
    7th International Conference on Advanced Communication Technology, Vols 1 and 2, Proceedings, 2005, : 701 - 705
  • [8] Security Management System for Sensor Network
    Lee, Shinkyung
    Park, Namje
    Choi, Dooho
    ICHIT 2008: INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 806 - 810
  • [9] Research on Key Technologies of Network Security Management Policy
    Tang, Chenghua
    Yu, Shunzheng
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12530 - 12533
  • [10] Security extension to grasshopper for network management based policy
    Yang, B
    Liu, DY
    Yang, K
    Yu, WJ
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 10 - 15