首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到18条相似文献,搜索用时 109 毫秒
1.
目的:备份“军卫一号”中Oracle数据库中的数据。方法:利用Oracle提供的加密特性,如:数据包加密、透明数据加密、Rman备份加密、数据泵导出加密等,从不同层次对“军卫一号”HIS系统中敏感数据进行加密。结果:这些加密方法有效保护了Oracle数据库中的联机数据和备份数据。结论:方法安全、易于实现,可根据系统的安全需要选择多种方式加密数据库中的数据。  相似文献   

2.
本文介绍利用OFFICE办公软件的VBA功能,编制出局域网上文档自动备份程序,并配有相应的文件自动加密功能。使文档的备份管理更加轻松自如。  相似文献   

3.
我院“军卫一号”数据库系统采用Oracle8.1.7版,在NOARCHIVELOG模式下运行,数据采用脱机备份,备份的内容包括全部物理文件,即数据文件、控制文件、初始化文件和联机日志文件[1].恢复数据库的步骤如下。  相似文献   

4.
目的:对“军卫一号”过期数据进行数据转储和恢复,避免大量存储空间的浪费,改善医院信息系统运行的性能。方法:清空备份表,将数据从原表导入备份表,从备份表卸出数据至文件,将文件转储备份,删除原表的有关数据,需要使用时将数据恢复至有关的表中,通过应用程序查询相应数据。结果:数据转储后扩大了存储空间。结论:实行过期数据的转储可以使数据管理更加科学.医院信息系统运行更加顺畅。  相似文献   

5.
卢友传 《医疗设备信息》2004,19(3):20-20,13
本文针对目前多数综合性医院HS系统中所必须面对的后台数据库的备份与恢复的问题,提出了在不购买相关专业软件的前提下如何充分利用后台数据库自身集成的备份与恢复功能达到预期目标的新思路,并结合自己的实际工作经验,设计出了一套既实用又可靠的策略。  相似文献   

6.
目的探讨在二甲医院的管理模式下,怎样保障卫生信息系统数据库的数据安全以及做好灾难备份工作。方法采用双机热备份数据备份技术及存储管理软件。结论采用双机热备份数据备份技术及存储管理软件,完全适合二甲医院的管理模式,对数据的安全起到重要的作用,能提供灾难备份。  相似文献   

7.
目的:讨论Open resetlogs操作对Oracle数据库恢复的影响。方法:利用resetlogs操作前的备份进行数据库恢复.Oracle9i之前主要采用两段式方法执行恢复操作;Oraclelog中利用其归档日志的新格式。结果:2种方法均可以利用resetlogs操作前的备份进行数据库恢复。结论:Oracle9i之前分段实现数据库的恢复,步骤繁琐,建议用resetlogs操作打开数据库后,做一个一致性的全库备份;利用Oracle10g的改进特性,可以轻易地跨越resetlogs点进行恢复。  相似文献   

8.
数据安全和24小时不间断运行是医院网络系统的核心要求。本文利用ORACLE数据库提供的归档日志文件建立备份机,既保证了备份数据的完整性,又能确保在磁盘阵列柜出故障的情况下医院关键业务能在最短时间内恢复工作。  相似文献   

9.
对数据库进行加密后,如何提高密文数据的操作性能是一个非常重要的问题,而基于对偶编码函数的密文过滤技术则可很好地解决此问题。文中在给出对偶编码函数的定义后,着重分析了四种基本查询基于对偶编码函数的转换规则,并利用JAVA语言将基于对偶编码函数的密文过滤技术在医院Oracle数据库中进行了实现,最后通过实验验证了此技术对密文数据操作性能有巨大提升。  相似文献   

10.
李世川 《医疗卫生装备》2012,33(6):52-53,89
目的:设计并实现Oracle数据库自动备份还原器,用于Oracle数据的自动备份和还原。方法:在系统开发过程中,使用了软件工程开发方法,利用Oracle本身逻辑备份和还原理论,同时结合了PowerBuilder强大的开发环境。结果:软件在使用中可以采用Oracle数据库提供的数据接口和底层数据进行通信,有效保证了数据的独立性。结论:软件运行到用户工作环境中,很好地实现了数据的备份和还原功能。  相似文献   

11.
L Lugosi  I Molnar 《Vaccine》1992,10(13):961-963
In accordance with WHO requirements, a specialized software has been developed for personal computers to analyse the potency data of the EPI vaccines and to evaluate the effectiveness of the vaccination. The software has three parts and allows users to create files from control data (BIOSTAT), to check the function of the software and statistical formulae (BIOSDEMO), and to understand the logic and structure of the data processing system and the statistical models (BIOSDOC).  相似文献   

12.
Record linkage, for compiling sameperson records from various source files, can improve the feasibility of epidemiological research using populationbased studies. The question is comply with the European legislation on data privacy and data security. For example, a computerized record hash coding and linkage procedure is described to link medical information within the framework of epidemiological followup. Before their extraction, files are rendered anonymous using a oneway hash coding based on the standard hash algorithm (SHA) function. Once rendered anonymous using the software ANONYMAT, the linkage of patient information can be accomplished by means of a mixture model, taking into account several identification variables. An application of this anonymous record linkage procedure was carried out in order to link medical files on cancer, from 3 hospitals of the French Rh?neAlpes region. This application stresses how the use of the ANONYMAT software allows compliance with the legislation on data confidentiality without entailing problems on data availability.  相似文献   

13.
Virtual microscopy and public-key cryptography for Internet telepathology   总被引:1,自引:0,他引:1  
The Internet is a potentially inexpensive, widely available medium for telepathology, but there are concerns about its reliability and security. Using a digital camera, 41 photomicrographs of transbronchial biopsies, at x 100 optical magnification, were captured and digitized at 2700 x 3400 pixel, 24 bit/pixel resolution. The image files were saved in JPEG format at medium compression, attached to text files with patient information, encrypted for security in the S/MIME format using a digital signature and digital envelope, and transmitted by email. Received email files were decrypted automatically and the images viewed with standard software. Telepathology diagnoses were compared with original interpretations. The images averaged 810 kByte in size. The encryption and decryption did not cause significant delays in overall transmission time and, together with transmission, did not produce noticeable image degradation. The received image files could be viewed in a manner that simulated light microscopy. There was agreement between telepathology and original diagnoses in 92% of the cases. All the discrepancies were due to inadequate area selection because the pathological features of interest were present in histological levels other than those photographed. The use of high-resolution digital photomicrography, the Internet and public-key cryptography offers an effective and relatively inexpensive method of telepathology consultation. The method is best suited for the diagnosis of small biopsy specimens that require the transmission of only a few digital images that represent the majority of the biopsy materials.  相似文献   

14.
目的:实现计量器具周期管理预警功能。方法:通过软件对已有的计量器具记录文件进行访问,获取下次检定的日期,并和系统日期进行比较,对即将到期的计量器具进行报警。结果:通过参数的设定,软件能够方便的访问计量器具记录文件,并能够有效的实施预警功能。结论:应用VisualBasic6.0来实现此软件的开发,且方便快捷,软件占用系统资源少,功能强大,有效地防止了计量器具检定周期过期及漏检的情况发生。  相似文献   

15.
Linkage of different records such as health insurance claims or medical records for the purpose of cohort studies or cancer registration usually requires matching with personal names and other personally identifiable data. The present study was conducted to examine the possibility of performing such privacy-sensitive procedures in a "linkable anonymizing" manner using encryption. While bidirectional communication entails encryption and deciphering, necessitating both senders and receivers sharing a common secret "key", record linkage entails only encryption and not deciphering because researchers do not need to know the identity of the linked person. This unidirectional nature relieves researchers from the historical problem of "key sharing" and enables data holders such as municipal governments and insurers to encrypt personal names in a relatively easy manner. The author demonstrates an encryption technique using readily available spread-sheet software, Microsoft Excel in a step-by-step fashion. Encoding Chinese characters into the numeric JIS codes and replacing the codes with a randomly assigned case-sensitive alphabet, all names of Japanese nationals will be encrypted into gibberish strings of alphabet, which can not be deciphered without the secret key. Data holders are able to release personal data without sacrificing privacy, even when accidental leakage occurs and researchers are still able to link records of the same name because encrypted texts, although gibberish, are unique to each name. Such a technical assurance of privacy protection is expected to satisfy the Privacy Protection Act or the Ethical Guidelines for Epidemiological Research and enhance public health research. Traditional encryption techniques, however, cannot be applied to cancer or stroke registration, because the registrar receives reports from numerous unspecified senders. The new public key encryption technique will enable disease registry in a linkable anonymizing manner. However various technical problems such as complexity, difficulties in registrar inquiries and risk of code-breaking make the encryption technique unsuitable for disease registry in the foreseeable future.  相似文献   

16.
医疗信息外来数据的SAS数据集转换   总被引:1,自引:1,他引:0  
目的:探讨SAS6.12环境下对外来格式数据进行访问的方法。方法:SAS6.12系统的开放式数据库连接器(ODBC)为多种类型数据格式的相互转换提供了可能,我们可以通过两种方式来实现这种转换:(1)在Program Editor窗口通过调用ACCESS过程实现外来数据的访问与转换;(2)利用SAS的向导工具(Wizard)实现外来数据到SAS数据集的转换。结果:运用上述方法,笔者成功访问了EXCEL、dBASE、Lotus1-2-3,Oracle等数据库的数据文件。结论:实现外来数据与SAS数据集的相互转换,丰富了SAS的数据管理功能,使SAS系统更具开放性。  相似文献   

17.
Building a successful enterprise master patient index: a case study   总被引:2,自引:0,他引:2  
To ensure success in building an enterprise master patient index (MPI), an understanding of the complexities of the internal duplicate files and the overlap population is essential. Merging multiple MPIs is complicated and requires time and a commitment to accuracy. Most organizations underestimate the importance of the following ground rules for building an enterprise MPI: Internal duplicates need to be corrected; linking patient files with a statistical weighting algorithm is far superior to using rigid criteria; there are more overlap patient files than an organization usually perceives; an imprecise and incomplete base of demographic data will multiply the error rate for the enterprise; preliminary data analysis is critical to avoid linkage problems during conversion; and accurate data collection and monitoring are imperative for ongoing data integrity. The article discusses the major steps involved in creating an enterprise MPI and recommends solutions to common problems encountered during conversion.  相似文献   

18.
儿童免疫磁卡软件设计   总被引:2,自引:0,他引:2  
儿童免疫磁卡软件是使用FOXPRO2.5数据库系统软件和MASM5.0宏汇编软件混合编程。儿童免疫磁卡软件数据库的关键字段建立了索引文件,既减少了冗长的数据,又实现了合理的数据关系。主控程序利用INKEY()函数实现了平滑下拉式选择操作菜单,屏幕界面操作直观,灵活自如。键盘录入部分利用READKEY()函数实现了全屏窗口式、行编辑式的数据录入,没有字典管理,边浏览边录入,既降低了录入误码率,又提高了录入效率。儿童接种后,监护人利用磁卡输入接种情况,计算机自动完成应种疫苗的数据录入,并在屏幕显示当天以及既往接种情况,实现了儿童监护人与接种医生之间的相互制约。统计汇总结果按统计日期合理存贮并可屏幕显示,打印输出及文本输出。编有对统计结果的管理程序,在不退出儿童免疫磁卡软件系统前题下,调用WPS排版系统编辑打印。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号