自动化技术、计算机技术 |
|
|
|
|
区域医疗系统数据真实性保障流程优化 |
周天舒1,李劲松1,杨一兵1,陈运奇2,薛万国2,赵军平2 |
1.浙江大学 数字化医疗工程研究中心, 浙江 杭州 310027; 2.解放军总医院, 北京100853 |
|
Improvement of data authenticity assurance process
in regional health information system |
ZHOU Tian-shu1, LI Jing-song1, YANG Yi-bing1,CHEN Yun-qi2,
XUE Wan-guo2, ZHAO Jun-ping2 |
1. Healthcare Informatics Engineering Research Center, Zhejiang University, Hangzhou 310027, China;
2. Chinese PLA General Hospital, Beijing 100853, China |
引用本文:
周天舒, 李劲松, 杨一兵, 陈运奇, 薛万国, 赵军平. 区域医疗系统数据真实性保障流程优化[J]. J4, 2010, 44(8): 1484-1489.
ZHOU Tian-Shu, LI Jin-Song, YANG Yi-Bing, CHEN Yun-Ai, XUE Mo-Guo, DIAO Jun-Beng. Improvement of data authenticity assurance process
in regional health information system. J4, 2010, 44(8): 1484-1489.
链接本文:
http://www.zjujournals.com/eng/CN/10.3785/j.issn.1008-973X.2010.08.009
或
http://www.zjujournals.com/eng/CN/Y2010/V44/I8/1484
|
[1] LIN Dawei, CHEN YiMing. Dynamic web page protection based on content integrity [J]. International Journal of Services and Standards, 2007, 3(1): 120135.
[2] ZHU Guohun, MIAO Yuqing. Cooperative monitor Web page based on MD5 [C]∥ Proceedings of the Second International Workshop, Grid and Cooperative Computing 2003.Shanghai: Springer Verlag, 2004: 179182.
[3] ZHOU Xiaoqiang, HUANG H, LOU S. Authenticity and integrity of digital mammography images [J]. IEEE Transactions on Medical Imaging, 2001, 20(8): 784791.
[4] Partners HealthCare System, Inc. What is partners?[EB/OL]. [20090321].http:∥www.partners.org/about/about_whatis.html.
[5] TAKADA A, GUO Jinqiu, TANAKA K, et al. Dolphin project:cooperative regional clinical system centered on clinical information center [J]. Journal of Medical Systems, 2005, 29(4): 391400.
[6] 易红军,佘名高.MD5算法与数字签名[J].计算机与数字工程, 2006, 34(5): 4446.
YI Hongjun, SHE Minggao. MD5 arithmetic and digital signature [J]. Computer and Digital Engineering, 2006, 34(5): 4446.
[7] 张振权,罗新民,齐春.数字签名算法MD5和SHA1的比较及其AVR优化实现[J].网络安全技术与应用, 2005(7): 6467.
ZHANG Zhenquan, LUO Xinming, QI Chun. The comparison of MD5 and SHA1 digital signature algorithms and their optimum realization using AVR [J]. Network Security Technology and Application, 2005(7): 6467.
[8] FIPS PUB 1801, Secure Hash standard (SHS) [S]. U.S: NIST, 1995.
[9] WANG Xiaoyun, YU Hongbo. How to break MD5 and other hash functions [C]∥ Proceedings of the 25th Annual International Cryptology Conference, Santa Barbara: SpringerVerlag, 2005: 1935.
[10] WANG Xiaoyun, YIN Yiqun, YU Hongbo. Finding collisions in the full SHA1 [C]∥ Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Aarhus: SpringerVerlag, 2005, 3621: 1736.
[11] RIJMEN V. Current status of SHA1 [EB/OL]. [20070221]. http:∥www.signatur.rtr.at/repository/rtrsha120070221en.pdf.
[12] National Institute for Science and Technology (NIST). NIST brief comments on recent cryptanalytic attacks on secure hashing functions and the continued security provided by SHA1 [EB/OL]. [20040825]. http:∥csrc.nist.gov/groups/ST/toolkit/documents/shs/hash_standards_comments.pdf.
[13] GUO Jinqiu, TAKADA A, TANAKA K, et al. The development of MML (medical markup language) version 30 as a medical document exchange format for HL7 messages [J]. Journal of Medical Systems, 2004, 28(6): 523533. |
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|