共查询到18条相似文献,搜索用时 109 毫秒
1.
目的:备份“军卫一号”中Oracle数据库中的数据。方法:利用Oracle提供的加密特性,如:数据包加密、透明数据加密、Rman备份加密、数据泵导出加密等,从不同层次对“军卫一号”HIS系统中敏感数据进行加密。结果:这些加密方法有效保护了Oracle数据库中的联机数据和备份数据。结论:方法安全、易于实现,可根据系统的安全需要选择多种方式加密数据库中的数据。 相似文献
2.
本文介绍利用OFFICE办公软件的VBA功能,编制出局域网上文档自动备份程序,并配有相应的文件自动加密功能。使文档的备份管理更加轻松自如。 相似文献
3.
4.
5.
本文针对目前多数综合性医院HS系统中所必须面对的后台数据库的备份与恢复的问题,提出了在不购买相关专业软件的前提下如何充分利用后台数据库自身集成的备份与恢复功能达到预期目标的新思路,并结合自己的实际工作经验,设计出了一套既实用又可靠的策略。 相似文献
6.
蔡国春 《中国卫生信息管理》2008,(1):53-56
目的探讨在二甲医院的管理模式下,怎样保障卫生信息系统数据库的数据安全以及做好灾难备份工作。方法采用双机热备份数据备份技术及存储管理软件。结论采用双机热备份数据备份技术及存储管理软件,完全适合二甲医院的管理模式,对数据的安全起到重要的作用,能提供灾难备份。 相似文献
7.
目的:讨论Open resetlogs操作对Oracle数据库恢复的影响。方法:利用resetlogs操作前的备份进行数据库恢复.Oracle9i之前主要采用两段式方法执行恢复操作;Oraclelog中利用其归档日志的新格式。结果:2种方法均可以利用resetlogs操作前的备份进行数据库恢复。结论:Oracle9i之前分段实现数据库的恢复,步骤繁琐,建议用resetlogs操作打开数据库后,做一个一致性的全库备份;利用Oracle10g的改进特性,可以轻易地跨越resetlogs点进行恢复。 相似文献
8.
叶宗敏 《中国卫生信息管理》2007,4(1):73-75
数据安全和24小时不间断运行是医院网络系统的核心要求。本文利用ORACLE数据库提供的归档日志文件建立备份机,既保证了备份数据的完整性,又能确保在磁盘阵列柜出故障的情况下医院关键业务能在最短时间内恢复工作。 相似文献
9.
10.
目的:设计并实现Oracle数据库自动备份还原器,用于Oracle数据的自动备份和还原。方法:在系统开发过程中,使用了软件工程开发方法,利用Oracle本身逻辑备份和还原理论,同时结合了PowerBuilder强大的开发环境。结果:软件在使用中可以采用Oracle数据库提供的数据接口和底层数据进行通信,有效保证了数据的独立性。结论:软件运行到用户工作环境中,很好地实现了数据的备份和还原功能。 相似文献
11.
In accordance with WHO requirements, a specialized software has been developed for personal computers to analyse the potency data of the EPI vaccines and to evaluate the effectiveness of the vaccination. The software has three parts and allows users to create files from control data (BIOSTAT), to check the function of the software and statistical formulae (BIOSDEMO), and to understand the logic and structure of the data processing system and the statistical models (BIOSDOC). 相似文献
12.
Quantin C Allaert FA Bouzelat H Rodrigues JS Trombertpaviot B Brunet-Lecomte P Grémy F Dusserre L 《Revue d'épidémiologie et de santé publique》2000,48(1):89-99
Record linkage, for compiling sameperson records from various source files, can improve the feasibility of epidemiological research using populationbased studies. The question is comply with the European legislation on data privacy and data security. For example, a computerized record hash coding and linkage procedure is described to link medical information within the framework of epidemiological followup. Before their extraction, files are rendered anonymous using a oneway hash coding based on the standard hash algorithm (SHA) function. Once rendered anonymous using the software ANONYMAT, the linkage of patient information can be accomplished by means of a mixture model, taking into account several identification variables. An application of this anonymous record linkage procedure was carried out in order to link medical files on cancer, from 3 hospitals of the French Rh?neAlpes region. This application stresses how the use of the ANONYMAT software allows compliance with the legislation on data confidentiality without entailing problems on data availability. 相似文献
13.
The Internet is a potentially inexpensive, widely available medium for telepathology, but there are concerns about its reliability and security. Using a digital camera, 41 photomicrographs of transbronchial biopsies, at x 100 optical magnification, were captured and digitized at 2700 x 3400 pixel, 24 bit/pixel resolution. The image files were saved in JPEG format at medium compression, attached to text files with patient information, encrypted for security in the S/MIME format using a digital signature and digital envelope, and transmitted by email. Received email files were decrypted automatically and the images viewed with standard software. Telepathology diagnoses were compared with original interpretations. The images averaged 810 kByte in size. The encryption and decryption did not cause significant delays in overall transmission time and, together with transmission, did not produce noticeable image degradation. The received image files could be viewed in a manner that simulated light microscopy. There was agreement between telepathology and original diagnoses in 92% of the cases. All the discrepancies were due to inadequate area selection because the pathological features of interest were present in histological levels other than those photographed. The use of high-resolution digital photomicrography, the Internet and public-key cryptography offers an effective and relatively inexpensive method of telepathology consultation. The method is best suited for the diagnosis of small biopsy specimens that require the transmission of only a few digital images that represent the majority of the biopsy materials. 相似文献
14.
15.
Okamoto E 《[Nihon kōshū eisei zasshi] Japanese journal of public health》2004,51(6):445-451
Linkage of different records such as health insurance claims or medical records for the purpose of cohort studies or cancer registration usually requires matching with personal names and other personally identifiable data. The present study was conducted to examine the possibility of performing such privacy-sensitive procedures in a "linkable anonymizing" manner using encryption. While bidirectional communication entails encryption and deciphering, necessitating both senders and receivers sharing a common secret "key", record linkage entails only encryption and not deciphering because researchers do not need to know the identity of the linked person. This unidirectional nature relieves researchers from the historical problem of "key sharing" and enables data holders such as municipal governments and insurers to encrypt personal names in a relatively easy manner. The author demonstrates an encryption technique using readily available spread-sheet software, Microsoft Excel in a step-by-step fashion. Encoding Chinese characters into the numeric JIS codes and replacing the codes with a randomly assigned case-sensitive alphabet, all names of Japanese nationals will be encrypted into gibberish strings of alphabet, which can not be deciphered without the secret key. Data holders are able to release personal data without sacrificing privacy, even when accidental leakage occurs and researchers are still able to link records of the same name because encrypted texts, although gibberish, are unique to each name. Such a technical assurance of privacy protection is expected to satisfy the Privacy Protection Act or the Ethical Guidelines for Epidemiological Research and enhance public health research. Traditional encryption techniques, however, cannot be applied to cancer or stroke registration, because the registrar receives reports from numerous unspecified senders. The new public key encryption technique will enable disease registry in a linkable anonymizing manner. However various technical problems such as complexity, difficulties in registrar inquiries and risk of code-breaking make the encryption technique unsuitable for disease registry in the foreseeable future. 相似文献
16.
医疗信息外来数据的SAS数据集转换 总被引:1,自引:1,他引:0
目的:探讨SAS6.12环境下对外来格式数据进行访问的方法。方法:SAS6.12系统的开放式数据库连接器(ODBC)为多种类型数据格式的相互转换提供了可能,我们可以通过两种方式来实现这种转换:(1)在Program Editor窗口通过调用ACCESS过程实现外来数据的访问与转换;(2)利用SAS的向导工具(Wizard)实现外来数据到SAS数据集的转换。结果:运用上述方法,笔者成功访问了EXCEL、dBASE、Lotus1-2-3,Oracle等数据库的数据文件。结论:实现外来数据与SAS数据集的相互转换,丰富了SAS的数据管理功能,使SAS系统更具开放性。 相似文献
17.
Lenson CM 《Topics in health information management》1998,19(1):66-71
To ensure success in building an enterprise master patient index (MPI), an understanding of the complexities of the internal duplicate files and the overlap population is essential. Merging multiple MPIs is complicated and requires time and a commitment to accuracy. Most organizations underestimate the importance of the following ground rules for building an enterprise MPI: Internal duplicates need to be corrected; linking patient files with a statistical weighting algorithm is far superior to using rigid criteria; there are more overlap patient files than an organization usually perceives; an imprecise and incomplete base of demographic data will multiply the error rate for the enterprise; preliminary data analysis is critical to avoid linkage problems during conversion; and accurate data collection and monitoring are imperative for ongoing data integrity. The article discusses the major steps involved in creating an enterprise MPI and recommends solutions to common problems encountered during conversion. 相似文献
18.
儿童免疫磁卡软件设计 总被引:2,自引:0,他引:2
儿童免疫磁卡软件是使用FOXPRO2.5数据库系统软件和MASM5.0宏汇编软件混合编程。儿童免疫磁卡软件数据库的关键字段建立了索引文件,既减少了冗长的数据,又实现了合理的数据关系。主控程序利用INKEY()函数实现了平滑下拉式选择操作菜单,屏幕界面操作直观,灵活自如。键盘录入部分利用READKEY()函数实现了全屏窗口式、行编辑式的数据录入,没有字典管理,边浏览边录入,既降低了录入误码率,又提高了录入效率。儿童接种后,监护人利用磁卡输入接种情况,计算机自动完成应种疫苗的数据录入,并在屏幕显示当天以及既往接种情况,实现了儿童监护人与接种医生之间的相互制约。统计汇总结果按统计日期合理存贮并可屏幕显示,打印输出及文本输出。编有对统计结果的管理程序,在不退出儿童免疫磁卡软件系统前题下,调用WPS排版系统编辑打印。 相似文献