{"title":"Identification and evaluation of the security requirements in medical applications","authors":"Deborah L. Hamilton","doi":"10.1109/CBMS.1992.244954","DOIUrl":null,"url":null,"abstract":"The author summarizes the security aspects of today's medical information systems and evaluates the software security requirements necessary for the computerized systems of tomorrow. She then discusses how these concerns are addressed by today's technology. Particular emphasis is placed on the security gaps in today's technology.<<ETX>>","PeriodicalId":197891,"journal":{"name":"[1992] Proceedings Fifth Annual IEEE Symposium on Computer-Based Medical Systems","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1992-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"[1992] Proceedings Fifth Annual IEEE Symposium on Computer-Based Medical Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CBMS.1992.244954","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
The author summarizes the security aspects of today's medical information systems and evaluates the software security requirements necessary for the computerized systems of tomorrow. She then discusses how these concerns are addressed by today's technology. Particular emphasis is placed on the security gaps in today's technology.<>