Network Security Metrics and Performance for Healthcare Systems Management

被引:0
作者
Liu, Vicky [1 ]
Tesfamicael, Aklilu Daniel [1 ]
Caelli, William [1 ]
Sahama, Tony [1 ]
机构
[1] Queensland Univ Technol, Fac Sci & Engn, Brisbane, Qld, Australia
来源
2015 17TH INTERNATIONAL CONFERENCE ON E-HEALTH NETWORKING, APPLICATION & SERVICES (HEALTHCOM) | 2015年
关键词
network secuirty metrics and performance; network security; e-health systems; security for healthcare systems; IMPLEMENTATION;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
While enhanced cybersecurity options, mainly based around cryptographic functions, are needed overall speed and performance of a healthcare network may take priority in many circumstances. As such the overall security metrics and performance of those cryptographic functions in their embedded context needs to be understood in detail. Understanding those metrics has been the main aim of this research activity. This research reports on an implementation of one network security technology, Internet Protocol Security (IPSec), to evaluate security performance. This research simulates sensitive healthcare information being transferred over a network, and then measures data delivery times with selected security parameters for various communication types running under different operating systems. Based on our performance experiments, this research has indicated a number of network security metrics that need to be considered when designing and managing network security for healthcare-specific or nonhealthcare- specific systems from security, performance and manageability perspectives. This research proposes distinct recommendations based on our test results to contribute to selecting the appropriate security metrics for achieving the correct balance between network security and performance.
引用
收藏
页码:189 / 194
页数:6
相关论文
共 15 条
  • [1] Alanazi H., 2010, J COMPUTING, V2
  • [2] The implementation of electronic health records: A case study of bush computing the Ngaanyatjarra Lands
    Cripps, Helen
    Standing, Craig
    [J]. INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2011, 80 (12) : 841 - 848
  • [3] Dandu Ravi Varma, 2008, Indian J Radiol Imaging, V18, P287, DOI 10.4103/0971-3026.43838
  • [4] Dang Q., 2012, NIST SPECIAL PUBLICA
  • [5] Frankel S., 2008, NIST Special Publication 800-113, Guide to SSL VPNs
  • [6] Implementation of a cloud-based electronic medical record for maternal and child health in rural Kenya
    Haskew, John
    Ro, Gunnar
    Saito, Kaori
    Turner, Kenrick
    Odhiambo, George
    Wamae, Annah
    Sharif, Shahnaaz
    Sugishita, Tomohiko
    [J]. INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2015, 84 (05) : 349 - 354
  • [7] Khamiss N. N., 2014, INT J ENHANCED RES M, V3, P36
  • [8] Laet GertDe., 2005, Network Security Fundamentals
  • [9] Liu V., 2008, AUSTR WORKSH HLTH DA
  • [10] Lohr H., 2010, P ACM IHI 2010, P220, DOI DOI 10.1145/1882992.1883024