請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/23660
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 王勝德 | |
dc.contributor.author | Chia-Hui Liu | en |
dc.contributor.author | 劉嘉惠 | zh_TW |
dc.date.accessioned | 2021-06-08T05:06:51Z | - |
dc.date.copyright | 2011-07-07 | |
dc.date.issued | 2011 | |
dc.date.submitted | 2011-06-28 | |
dc.identifier.citation | [1] H. Zhu, K. Lu and R. Jin, 'A practical mandatory access control model for XML databases,' Information Sciences, Vol.179, Nol.8, pp.1116-1133, 2009.
[2] J. Luo, X. Ni, J. Yong, 'A trust degree based access control in grid environments,' Information Sciences, Vol.179, No.15, pp.2618-2628, 2009. [3] D. R. Ferraiolo, S. Sandhu, D. R. Kuhn and R. Chandramouli, 'Proposed NIST standard for role-based access control,' ACM Transactions on Information System Security, Vol.4, Nol.3, pp.224-274, 2001. [4] J. Bacon, K. Moody and W. Yao, 'A model of OASIS role-based access control and its support for active security,' ACM Transactions on Information System Security, Vol.5, No,4, pp.492-540, 2002. [5] R.Steele, and M. Kyongho, 'Role-based access to portable personal health records,' International Conference on Management and Service Science, China, pp.1-4, 2009. [6] R. Jason, C. Ian,H. Matthew and S. Jason, 'A novel use of RBAC to protect privacy in distributed health care information systems,' Information security and privacy, LNCS, Vol.2727, 220, pp.403-415, 2003. [7] F. K. Uckert and H. Prokoschl, 'Implementing security and access control mechanisms for an electronic healthcare record,' Proceedings AMIA Symposium, pp. 825-829, 2002. [8] D. Boneh and M. Franklin, 'Identity-based encryption from the Weil pairing,' CRYPTO 2001, LNCS 2139, pp.213-229, 2001. [9] D. Chess, B. Grosof, C. Harrison, D. Levine, C. Parris, and G. Tsudik, 'Itinerant agents for mobile computing,' IEEE Personal Communications, Vol.2, No.5, pp.34-49, 1995. [10] A. Corradi, R. Montanari, and C. Stefanelli, 'Security issues in mobile agent technology,' Proceedings of the 7th IEEE Workshop on Future Trends of Distributed Computing Systems, Cape Town, South Africa, pp.3-8, 1999. [11] N. M. Karnik and A. R. Tripathi, 'A security architecture for mobile agents in Ajanta,' Proceedings of the the 20th International Conference on Distributed Computing Systems, Taiwan, pp.402-409, 2000. [12] A. Karmouch, 'Mobile software agents for telecommunications,' IEEE Communications Magazine, Vol.36, No.7, pp.24-25, 1998. [13] K.A. Kuhn & D.A. Giuse, 'From hospital information systems to health information systems,' Problems, challenges, perspectives, Methods of Information in Medicine, Vol.40, No.4, pp.275-287, 2001. [14] R. Haux, “Health information systems-past, present, future,' International Journal of Medical Informatics, Vol. 75, pp.268-281, 2006. [15] S.J. Dwyer III, 'A personalized view of the history of PACS in the USA,' In Medical Imaging 2000: PACS Design and Evaluation: Engineering and Clinical Issues, Proceedings of SPIE, Vol.3980, pp.2-9, 2000. [16] K. Kahl, L. Irancin & M. Fuhrmann, 'Automated nursing documentation system provides a favorable return on investment,' The Journal of nursing administration, Vol.21, No.11, pp.44-51, 1991. [17] Vagelatos, A. & Sarivougioukas, J. 'Lessons learned from the introduction of a laboratory information systems in a state hospital of Athens, Greece,' 36th Hawaii International Conference on System Sciences HICSS, USA, 2003. [18] Thomas R. Brown, Handbook of institutional pharmacy practice, 4th Edition, 2006. [19] The state of HIPAA privacy and security compliance, AHIMA, 2005, http://library.ahima.org/. [20] M. C. Rash, 'Privacy concerns hinder electronic medical records,' The Business Journal of the Greater Triad Area, April 4, 2005. [21] Institute of Medicine, “The computer-based patient record: An essential technology for health care,' National Academy Press, Washington, DC, 1991. [22] NVN-ENV 12924, 1997 Medical informatics, Division of Security and Protection of Information Systems in Health Care. [23] S.G. Akl and P.D. Taylor, 'Cryptographic solution to a problem of access control in a hierarchy,' ACM Transactions on Computer Systems, Vol.1, No.3, pp.239-248, 1983. [24] J. Z. Yan, J. F. Ma and H. Y. Liu, 'Key hierarchies for hierarchical access control in secure group communications,' Computer Networks: The International Journal of Computer and Telecommunications Networking, Vol.53, No.3, pp. 353-364, February, 2009. [25] M. J. Atallah, M. Blanton, N. Fazio and K. B. Frikken, 'Dynamic and efficient key management for access hierarchies,' ACM Transactions on Information and System Security (TISSEC), Vol.12, No.3, pp.1-43, January, 2009. [26] H. R. Hassen, A. Bouabdallah, H. Bettahar and Y. Challal, 'Key management for content access control in a hierarchy,' Computer Networks: The International Journal of Computer and Telecommunications Networking, Vol.51, No.11, pp.3197-3219, August, 2007. [27] R. Volker and J. S. Mehrdad, 'Access control and key management for mobile agents,' Computer Graphics, Vol.22, Issue 4, pp.457-461, 1998. [28] L. C. Lin, H. H. Ou and M. S. Hwang, 'Efficient access control and key management schemes for mobile agents,' Computer Standards & Interfaces, Vol.26, No.5, pp.423-433, 2004. [29] ISO/TS 17090 Health Informatics –Public Key Infrastructure – Part 1 to3, http://www.iso.org. [30] C. C. Chang and D. J. Buehrer, 'Access control in a hierarchy using a one-way trapdoor function,' Computers and Mathematics with Applications Vol.26, No.5, pp.71-76, 1993. [31] Y. Huo, W. Li, and D. Yang, 'On dynamic mechanisms of mobile services adoption in social network,' ICIC Express Letters, Vol.3, No.1, pp.79-84, 2009. [32] Y. J. Choie, E. K. Jeong, and E. J. Lee, 'Efficient identity-based authenticated key agreement protocol from pairings,' Applied Mathematics and Computation, Vol.162, Issue1, pp.179-188, 2005. [33] C. C. Chang and I. C. Lin, 'A new solution for assigning cryptographic keys to control access in mobile agent environments,' Wireless Communications and Mobile Computing, Vol.6, No.1, pp.137-146, Jan. 2006. [34] M. S. Hwang, C. C. Lee, S. K. Chong, and J. W. Lo, 'A key management for wireless communications, international journal of innovative computing,' Information and Control, Vol.4, No.8, pp.2045-2056, 2008. [35] P. Barreto, H. Y. Kim, B. Lynn, and M. Scott, 'Efficient algorithms for pairing-based cryptosystems,' CRYPTO 2002, LNCS 2442, pp.354-368, 2002. [36] S. Lee, Y. Kim, K. Kim, and D. H. Ryu, 'An efficient tree-based group key agreement using bilinear map,' Applied Cryptography and Network Security, Vol.2846, pp.357-371, 2003. [37] W. Stallings, Cryptography and Network Security, principles and practice, 3rd Edition. Prentice Hall, 2003. [38] AIM (Advance Informatics in Medicine, Secure Environment for Information Systems in medicine, SEISMED (A2033)/SP14/HILD/05.07. 95. [39] N.L. Snee and K.A. McCormick, 'The case for integrating public health informatics networks,' Engineering in Medicine and Biology Magazine, Vol.23, Issue.1, pp.81-88, 2004. [40] D.E. Detmer, 'Building the national health information infrastructure for personal health, health care services, public health and research,' BMC Medical Informatics and Decision Making, Vol.3, No.1, 2003. [41] M. Shepherd, 'Challenges in health informatics,' The 40th Annual Hawaii International Conference on System Sciences, pp.135, 2007. [42] ISO TS 17090 Health Informatics, Public key infrastructure, Part 1, framework and overview, Part 2, certification profiles, Part 3, policy management of certification authority. [43] P. Povalej, M. Leni, M. Zoman, P. Kokol and D. Dinevski, 'Accuracy of intelligent medical systems,' Computer Methods and Programs in Biomedicine, Vol.80, pp.S95-S105, 2005. [44] P. Kokol, S.H. Babic, V. Podgorelec and M. Zorman, “some ideas about intelligent medical system design,' The 12th IEEE Symposium on Computer-Based Medical Systems, pp.48-52, 1999. [45] P. Kokol, 'Method engineering-a framework for improved computer based medical systems design,' Ninth IEEE Symposium on Computer-Based Medical Systems, pp.41-46, 1996. [46] M.M. Ross and C. Kyusuk, “Current issues in health care informatics,' Journal of Medical Systems, Vol.30, Issue.1, pp. 1-2, February 2006. [47] J. Benaloh, M. Chase, E. Horvitz and K. Lauter, 'Patient controlled encryption: ensuring privacy of electronic medical records,' Proceedings of the 2009 ACM workshop on Cloud computing security, November, 2009. [48] The state of HIPAA privacy and security compliance, AHIMA, April 2005. [49] R. Panko, 'Corporate computer and network security,' Englewood Cliffs, NJ: Prentice-Hall, 2003. [50] L. Tao, 'Introduction to network security,' Beijing: Electronic Industry Press. pp.107-111, 2003. [51] Y. Bartal, A. Mayer, K. Nissim and A. Wool, 'Firmato: a novel firewall management toolkit,' ACM Transactions on Computer Systems, Vol.22, Issue 4, pp.381-420, November 2004. [52] D. Chapman and E. Zwicky, 'Building internet firewalls, second edition,' Orielly & Associates Inc., 2000. [53] W. Cheswick and S. Belovin, 'Firewalls and internet security,' Addison-Wesley, 1995. [54] A. Mayer, A. Wool and E. Ziskind, 'Fang: a firewall analysis engine,' The 2000 IEEE Symposium on Security and Privacy, pp.177, May 2000. [55] S. Ioannidis, A. Keromytis, S. Bellovin, and J. Smith, 'Implementing a distributed firewall,' Conference on Computer and Communications Security, pp.190-199, November 2000. [56] W.J. hua, C.X. Su, Z.Y. Zhu and N. Jun, 'A flexible policy-based firewall management framework,' International Conference on Cyberworlds, pp.192-194, 2008. [57] H. Wang, X. H. Wang, Y. Y. Cai, W. Hui and J. Li, 'Connecting migration in mobile agent systems,' Applied Artificial Intelligence, Vol.23, No.8, pp.772-780, 2009. [58] B. Chen, D. Linz, H. H. Cheng, 'XML-based agent communication, migration and computation in mobile agent systems,' Journal of Systems and Software,Vol.81, No.8, pp.1364-1376, 2008. [59] Y. F. Chung, T. S. Chen and C. H. Liu, 'Efficient hierarchical key management scheme for access control in the mobile agent,' International Journal of Innovative Computing, Information and Control, Vol.4, No.9, pp.2375-2390, 2008. [60] J. Y. Huang, Y. F. Chung, T. S. Chen and I. E. Liao, 'A secure time-bound hierarchical key management scheme based on ECC for mobile agents,' International Journal of Innovative Computing, Information and Control, Vol.6, No.5, pp.2159-2170, 2010. [61] Y. L. Lin and C. L. Hsu, 'Cryptanalysis and improvement of a hierarchical key management scheme for access control in the mobile agent,' ICIC Express Letters, Vol.4, No.1, pp.183-188, 2010. [62] H. Y. Chen, Efficient time-bound hierarchical key assignment scheme,' IEEE Transactions on Knowledge and Data Engineering, Vol.16, No.10, pp.1302-1304, 2004. [63] X. Yi, 'Security of Chien’s efficient time-bound hierarchical key assignment scheme,' IEEE Transactions on Knowledge and Data Engineering, Vol.17, No.9, pp.1298-1299, 2005. [64] N. Shang and J. S. Wagstaff, 'An efficient time-bound hierarchical key management scheme for secure broadcasting,' IEEE Transactions on Dependable and Secure Computing, Vol.5, No.2, pp.65-70, 2008. [65] FIPS PUB 198 Standard, 'The keyed-hash message authentication code,' National Institute of Standards and Technology 2008. | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/23660 | - |
dc.description.abstract | 隨著網際網路蓬勃發展的影響,無線網路相關應用與技術也隨之崛起,也由於無線網路基礎建設與行動設備的進步,行動計算已在日常生活中發展出多樣化的應用,它允許使用者在行進間也能進行運算或透過網路存取遠端資訊,也因此如何確保使用者能安全的存取資訊是一個重要的議題;特別是應用在醫療資訊系統時,由於醫療資訊是記載病患重要資訊,可能包含醫師對疾病的診斷、治療和病情追蹤,以及護理人員對患者的護理措施、醫技部門的各項檢查結果,醫護人員如能在移動間也能迅速的掌握了解病患完整醫療資訊,將可以對病患做出更精確的診斷及提供更適當的治療。然而以往傳統的醫療資訊已面臨著許多問題:缺乏統一格式、資料流動性低、儲存空間及保存困難、轉移不易。為了改善這些缺點並降低醫療成本與提升醫療品質,目前各醫療機構已逐漸將資訊電子化,但是透過網路在各異質系統構成的醫療資訊系統間欲達到安全的遠端行動存取醫療資料,需要克服的最大問題在於要能確保醫療資訊能安全的傳送及存取,不會被惡意者攔截或是被未授權的醫護人員竊取資訊。因此,本論文提出使用有效且安全的遠端存取機制以解決此問題;首先是整合行動代理人在醫療資訊系統中,用以控制使用者存取醫療資訊的權限。接著,更進一步提出了改良式、有效率的安全管理機制,主要是植基於橢圓曲線上雙線性配對的概念,運用在遠端存取醫療資訊以確保隱私和存取控制權限的管理。最後提出一個限制使用者僅能在合法時間內存取資訊的存取控制機制以提高遠端醫療資訊存取的安全性。由安全分析得知這些機制能夠有效抵擋惡意者攻擊,達到安全的密鑰管理並提供有效且安全的遠端存取資訊在醫療資訊系統中,同時也促進了整體醫療品質。 | zh_TW |
dc.description.abstract | For the rapid development of wireless networks, mobile computing has greatly in the past few years and would be continue that trend into the future. With advancing computation and storage capacity of mobile devices, the applications of mobile computing also become more various and popular in our lives. It enables mobile users to compute and access information from anywhere, anytime. Therefore, deploying secure remote access is the most important issue when mobile computing applications haves become critical roles of network technology, especially in mobile Health Information Systems (HIS).
Because the health information is inherently sensitive, remote access of mobile environment in HIS must be computationally efficient, secure, and require minimal storage capacity. With the abilities of higher autonomy and mobility, a mobile agent is an important breakthrough on the related techniques and applications of mobile computing environment and becomes the most suitable technology for establishing secure remote access in HIS. However, remote access of mobile computing in HIS with mobile agent requires concerning the performance, efficiency, effective computational ability and security issues. Hence, this study proposed an effective and secure remote access in HIS with mobile agent, an improvement strategy for efficient migration of mobile agent and an enhance strategy for HIS in medical networks. The remote access scheme in HIS with mobile agent of this study could allow physicians immediately securely and efficiently obtaining data from different medical organizations. Then, this study proposed an enhanced architecture for the mobile agent in HIS. The scheme, based on the bilinear pairing over elliptic curves, takes the concept of identity-based access control on a hierarchical key management. Furthermore, adapting time-sensitive key management scheme in this study would enhance efficiency and security of access control. This study also proposed secure medical managerial strategies being applied to the mobile computation environments of the HIS so as to avoid the external or internal information security events, allow the medical system to work smoothly and safely that not only benefits the patients, but also allows the doctors to use it more conveniently, and further promote the overall medical quality. From the above proposed three strategies, it can achieve secure mobile computation for remote access in HIS. | en |
dc.description.provenance | Made available in DSpace on 2021-06-08T05:06:51Z (GMT). No. of bitstreams: 1 ntu-100-D96921027-1.pdf: 1289885 bytes, checksum: e88cec0ad6367a238bb45611f72874df (MD5) Previous issue date: 2011 | en |
dc.description.tableofcontents | Contents
中文摘要 ........................................................................................................................ I Abstract ....................................................................................................................…... II Chapter 1 — Introduction 1 1.1 Research motivation 1 1.2 Research objective 3 1.3 Organization of the dissertation 5 Chapter 2 — Preliminary 6 2.1 Basic concepts of bilinear pairing 6 2.2 Brief introduction of a mobile agent 6 2.3 Health information systems 10 Chapter 3 — Mobile agent application and integration in HIS 12 3.1 Introduction 12 3.2 The mobile agent in the health care system structure 17 3.3 The proposed method 19 3.3.1 Key generation 22 3.3.2 Key derivation 25 3.4 Security analysis 27 3.4.1 External collaborative attack 27 3.4.2 Reverse attack 28 3.4.3 Collusive attack 29 3.5 Summary 30 Chapter 4 — An improved access control and key management of mobile agent 32 4.1 Introduction 32 4.2 Related work 35 4.3 The proposed scheme 39 4.4 Security and performance analysis 42 4.4.1 Reverse attacks 43 4.4.2 Cooperative attacks 43 4.4.3 External collective attacks 44 4.4.4 Equation hacking attacks 44 4.4.5 Performance analysis 45 4.5 Summary 49 Chapter 5 — A design of ID-based access control system with time-sensitive key for mobile agent 50 5.1 Introduction 50 5.2 Time-bound hierarchical key assignment scheme 53 5.3 Proposed time-sensitive hierarchical key assignment scheme 55 5.3.1 Initialization 57 5.3.2 Key derivation 58 5.3.3 Example 59 5.4 Analysis of security 60 5.4.1 External attack 60 5.4.2 Reverse attack 61 5.4.3 Collusion attack 61 5.4.4 Equation hacking attack 62 5.5 Summary 63 Chapter 6 — The study of enhancement security in health information systems 65 6.1 Introduction 65 6.2 Categories of medical systems network attack models 72 6.2.1 Classification of hacker attacks 73 6.2.2 Satisfactory conditions of information security 75 6.3 Sample models of attacks 76 6.4 Firewall structure for medical use and its functions 80 6.5 The arrangement strategy of firewall in HIS 91 6.6 Summary 93 Chapter 7 — Conclusion and future works 95 Bibliography 97 | |
dc.language.iso | en | |
dc.title | 醫療資訊系統中之安全遠端存取 | zh_TW |
dc.title | Secure Remote Mobile Access in Health Information Systems | en |
dc.type | Thesis | |
dc.date.schoolyear | 99-2 | |
dc.description.degree | 博士 | |
dc.contributor.oralexamcommittee | 顏嗣鈞,郭斯彥,賴飛羆,雷欽隆,陳澤雄,鐘玉芳 | |
dc.subject.keyword | 醫療資訊系統,行動代理人,遠端存取,行動計算,電子醫療, | zh_TW |
dc.subject.keyword | Health Information Systems,Remote Access,Mobile Computing,E-medicine,Mobile Agent, | en |
dc.relation.page | 100 | |
dc.rights.note | 未授權 | |
dc.date.accepted | 2011-06-28 | |
dc.contributor.author-college | 電機資訊學院 | zh_TW |
dc.contributor.author-dept | 電機工程學研究所 | zh_TW |
顯示於系所單位: | 電機工程學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-100-1.pdf 目前未授權公開取用 | 1.26 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。