Cargando…

EMRlog Method for Computer Security for Electronic Medical Records with Logic and Data Mining

The proper functioning of a hospital computer system is an arduous work for managers and staff. However, inconsistent policies are frequent and can produce enormous problems, such as stolen information, frequent failures, and loss of the entire or part of the hospital data. This paper presents a new...

Descripción completa

Detalles Bibliográficos
Autores principales: Martínez Monterrubio, Sergio Mauricio, Frausto Solis, Juan, Monroy Borja, Raúl
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi Publishing Corporation 2015
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4606165/
https://www.ncbi.nlm.nih.gov/pubmed/26495300
http://dx.doi.org/10.1155/2015/542016
_version_ 1782395327335104512
author Martínez Monterrubio, Sergio Mauricio
Frausto Solis, Juan
Monroy Borja, Raúl
author_facet Martínez Monterrubio, Sergio Mauricio
Frausto Solis, Juan
Monroy Borja, Raúl
author_sort Martínez Monterrubio, Sergio Mauricio
collection PubMed
description The proper functioning of a hospital computer system is an arduous work for managers and staff. However, inconsistent policies are frequent and can produce enormous problems, such as stolen information, frequent failures, and loss of the entire or part of the hospital data. This paper presents a new method named EMRlog for computer security systems in hospitals. EMRlog is focused on two kinds of security policies: directive and implemented policies. Security policies are applied to computer systems that handle huge amounts of information such as databases, applications, and medical records. Firstly, a syntactic verification step is applied by using predicate logic. Then data mining techniques are used to detect which security policies have really been implemented by the computer systems staff. Subsequently, consistency is verified in both kinds of policies; in addition these subsets are contrasted and validated. This is performed by an automatic theorem prover. Thus, many kinds of vulnerabilities can be removed for achieving a safer computer system.
format Online
Article
Text
id pubmed-4606165
institution National Center for Biotechnology Information
language English
publishDate 2015
publisher Hindawi Publishing Corporation
record_format MEDLINE/PubMed
spelling pubmed-46061652015-10-22 EMRlog Method for Computer Security for Electronic Medical Records with Logic and Data Mining Martínez Monterrubio, Sergio Mauricio Frausto Solis, Juan Monroy Borja, Raúl Biomed Res Int Research Article The proper functioning of a hospital computer system is an arduous work for managers and staff. However, inconsistent policies are frequent and can produce enormous problems, such as stolen information, frequent failures, and loss of the entire or part of the hospital data. This paper presents a new method named EMRlog for computer security systems in hospitals. EMRlog is focused on two kinds of security policies: directive and implemented policies. Security policies are applied to computer systems that handle huge amounts of information such as databases, applications, and medical records. Firstly, a syntactic verification step is applied by using predicate logic. Then data mining techniques are used to detect which security policies have really been implemented by the computer systems staff. Subsequently, consistency is verified in both kinds of policies; in addition these subsets are contrasted and validated. This is performed by an automatic theorem prover. Thus, many kinds of vulnerabilities can be removed for achieving a safer computer system. Hindawi Publishing Corporation 2015 2015-10-01 /pmc/articles/PMC4606165/ /pubmed/26495300 http://dx.doi.org/10.1155/2015/542016 Text en Copyright © 2015 Sergio Mauricio Martínez Monterrubio et al. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Martínez Monterrubio, Sergio Mauricio
Frausto Solis, Juan
Monroy Borja, Raúl
EMRlog Method for Computer Security for Electronic Medical Records with Logic and Data Mining
title EMRlog Method for Computer Security for Electronic Medical Records with Logic and Data Mining
title_full EMRlog Method for Computer Security for Electronic Medical Records with Logic and Data Mining
title_fullStr EMRlog Method for Computer Security for Electronic Medical Records with Logic and Data Mining
title_full_unstemmed EMRlog Method for Computer Security for Electronic Medical Records with Logic and Data Mining
title_short EMRlog Method for Computer Security for Electronic Medical Records with Logic and Data Mining
title_sort emrlog method for computer security for electronic medical records with logic and data mining
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4606165/
https://www.ncbi.nlm.nih.gov/pubmed/26495300
http://dx.doi.org/10.1155/2015/542016
work_keys_str_mv AT martinezmonterrubiosergiomauricio emrlogmethodforcomputersecurityforelectronicmedicalrecordswithlogicanddatamining
AT fraustosolisjuan emrlogmethodforcomputersecurityforelectronicmedicalrecordswithlogicanddatamining
AT monroyborjaraul emrlogmethodforcomputersecurityforelectronicmedicalrecordswithlogicanddatamining