• 沒有找到結果。

第五章 結論與未來研究

5.2 未來研究

目前國內並無正式的中西醫藥交互平台,國人面對這方面的問題也缺乏相關 的知識,因此在未來希望會有更完整的中西醫藥交互作用之典範,可以做為實際 診療之用。

本研究提出「以角色為基礎之存取控制模型導入中西醫藥併用之醫療系統」

60

架構之想法,希望中西醫藥併用之醫療系統能夠透過安全的存取控制機制提昇整 體安全性以及便利性,並且解決中、西醫師對同一份病歷資料的權限問題,屏除 中西醫藥併用可能隨之引發的交互作用或其他副作用問題,未來,我們希望本研 究得以繼續延伸於跨醫院之間的中西醫藥併用之醫療協同診治,並期待整體的制 度更加完善。

61

參考文獻

[1] 中西藥交互作用資訊網。http://dhi.cmu.edu.tw/

[2] 江佰璋,「台灣地區各層級醫院資訊系統之探討」,屏東科技大學資訊管理 研究所碩士論文,2000 年。

[3] 吳昭新,「醫療資訊管理學」,偉華書局有限公司,2002 年。

[4] 李文卲,「中年人最怕五十肩 痛到想剁臂」,聯合新聞網,2006 年 9 月 8 日。

http://mag.udn.com/mag/life/storypage.jsp?f_MAIN_ID=207&f_SUB_ID=1407

&f_ART_ID=46086

[5] 奇美藥劑部中西藥交互作用查詢系統。

http://www.chimei.org.tw/main/right/right01/cmh_department/55500/DIS/cdrug_

interaction.asp

[6] 許君強,「醫院行政管理」,桂冠出版社,1994 年。

[7] 陳明豐,「中西醫藥治療糖尿病的差異及結合」,自由時報新聞網,2004 年 11 月 16 日。http://www.libertytimes.com.tw/2003/new/mar/1/today-m3.htm [8] 陳潮宗,「中西合併診治五十肩」,健康新聞網。

http://www.drchen.com.tw/healthy_medicine_center/030.htm

[9] 陳儷穎,「圖形介面存取控制模型實作之研究」,私立中國文化大學資訊管 理研究所碩士論文,2000 年。

[10] 詹智翔,「具情境感知的授權控管模型於智慧型空間之研究」,私立中華大 學資訊管理研究所碩士論文,2007 年。

62

[11] 資 策 會 , 「 論 亞 太 各 國 無 所 不 在 的 網 路 社 會 推 動 政 策 」 , 2005 年 。 http://www.nici.nat.gov.tw/content/application/nici/generala/guest-cnt-browse.ph p?cntgrp_ordinal=1002006100110003&cnt_id=758

[12] 劉良,「中西醫合作抗炎—中醫藥界配合政府更邁進一步」,2003 年。

http://www.clnc.scm.hkbu.edu.hk/ap/chi/discussion/dean_20030509.pdf

[13] 劉敦仁、吳美玉、黃景彰,「以工作為基礎的存取控制之權責區分授權準則 設計」,資訊管理學報,第八卷,第一期,第 61-80 頁,2001 年。

[14] 樊國楨、陳祥輝、蔡敦仁、李長彥,「資料庫濫用軌跡塑模」,電腦與通訊,

74 期,第 62-69 頁,2000 年。

[15] 顏志展,「醫院資訊系統專案管理:完全教戰手冊」,華騰出版社,1999 年。

[16] G. Abowd, C. Atkeson, J. Hong, S. Long, R. Kooper, and M. Pinkerton,

―Cyberguide: A Mobile Context-Aware Tour Guide,‖ ACM Wireless Networks, pp.422-429, 1997.

[17] John Barkley, Konstantin Beznosov, and Jinny Uppal, ―Supporting Relationship in Access Control Using Role Based Access Control,‖ Proceedings of ACM Role-Based Access Control Workshop, Fairfax, Virginia, USA, pp.55-65, 1999.

[18] G. Chen, D. Kotz, ―A Survey of Context-Aware Mobile Computing Research,‖

Technical Report, TR2000-381, Dept. of Computer Science, Dartmouth College, Hanover, N.H., 2000.

[19] Fang Chen, R. S. Sandhu, ―Constraints for Role-Based Access Control,‖

Proceedings of ACM Role-Based Access Control Workshop, pp.39-46, 1996.

63

[20] A.K. Dey, G.D. Abowd, ―Towards A Better Understanding of Context and Context-Awareness,‖ GVU Technical Report GITGVU-99-22, pp304-307, 1999.

[21] Xu Feng, Xie Jun, Huang Hao, and Xie Li, ―Context-Aware Role-Based Access Control Model for Web Services,‖ GCC 2004 Workshops, LNCS 3252, pp.430–436, 2004.

[22] David F. Ferraiolo, John F. Barkley and D. Richard Kuhn, ―A Role Based Access Control Model and Reference Implementation within a Coporate Intranet,‖ ACM Transactions on Information and System Security, Volume 1, Number 2, pp.34-64, 1999.

[23] David F. Ferraiolo, J. Cugini and D. Richard Kuhn, ―Role Based Access Control:

Features and Motivations,‖ In 11th Annual Computer Security Applications Conference, pp.241-248, 1995.

[24] David F. Ferraiolo and D. Richard Kuhn, ―Role-Based Access Control,‖ 15th Na-tional Computer Security Conference, pp.554-563, 1992.

[25] C. K. Georgiadis, I. Mavridis, G. Panglos, and R. K. Thomas, ―Flexible Team-Based Access Control Using Contexts,‖ Proceedings of ACM Symposium on Access Control Models and Technologies, pp. 21-27, Chantilly, VA, May, 2001.

[26] L. Giuri and P. Iglio, ―Role Templates for Content-Based Access Control,‖ 2nd ACM Workshop on Role-Based Access Control, Fairfax, Virginia, pp. 153-159, Nov, 1997.

[27] Sang Yeob Na and SuhHyun Cheon, ―Role Delegation in Role-Based Access Control,‖ Proceedings of the fifth ACM Workshop on Role-Based Access

64

Control, pp. 39-44, 2000.

[28] Ryan, ―Mobile Computing in a Fieldwork Environment: Metadata Elements,‖

Project Working Document, version 0.2., 1997.

[29] Ravi Sandhu, Edward J. Coyne, Hal L. Feinstein and Charles E. Youman,

―Role-Based Access Control Models,‖ IEEE Computer, Volume 29, Number 2, February, pp.38-47, 1996.

[30] Ravi Sandhu, Edward J. Coyne, Hal L. Feinstein and Charles E. Youman,

―Role-Based Access Control: A Multi-Dimensional View,‖ In Proceedings of 10th Annual Computer Security Application Conference, pp.54-62, 1994.

[31] Ravi Sandhu, David F. Ferraiolo and D. Richard Kuhn, ―The NIST Model for Role-Based Access Control: Towards a Unified Standard,‖ In Proceedings of the 5th ACM Workshop on Role-Based Access Control, pp.47-63, 2000.

[32] Ravi S. Sandhu and Pierangela Samarati, ―Access Control: Principles and Practice,‖ IEEE Communication Magazine, Vol. 32, No. 9, pp.40-48, Sep. 1994.

[33] Bill N. Schilit, Norman Adams, and Roy Want, ―Context-Aware Computing Applications,‖ Mobile Computing Systems and Applications - Workshop Proceedings, pp.85-90, 1995.

[34] Bill N. Schilit, Marvin M. Theimer, ―Disseminating Active Map Information to Mobile Hosts,‖ IEEE Network, Vol.8 (5), pp.22-32, 1994.

[35] Schiller and Voisard, ―Location-Based Services,‖ San Francisco, CA: Morgan Kaufmann, 2004.

[36] Honghai Shen, Prasun Dewan, ―Access Control for Collaborative

65

Environments,‖ Proceedings of the ACM Conference on Computer Supported Cooperative Work, pp.51-58, November 1992.

[37] Richard T. Simon and Mary Ellen Zurko, ―Separation of Duty in Role-Based Environments,‖ 10th Computer Security Foundations Workshop, pp.183-194, 1997.

[38] Mikael B. Skov and Rune Th. Høegh, ―Supporting Information Access in a Hospital ward by a Context-Aware Mobile Electronic Patient Record,‖ Personal and Ubiquitous Computing, Springer, Berlin Heidelberg New York, pp.205-214, 2006.

[39] Y. Sumi, T. Etani, S. Fels, N. Simone, K. Kobayashi and K. Mase, ―C-MAP:

Building a Context-Aware Mobile Assistant for Exhibition Tours,‖ Social Interaction and Communityware, Japan, pp138-153, June 1998.

[40] R. K. Thomas, R. S. Sandhu, ―Task-based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Authorization Management,‖ Proceedings of the IFIP Workshop on Database Security, Lake Tahoe, California, pp166-181, 1997.

[41] Marc Wilikens, Simone Feriti, Alberto Sanna, and Marcelo Masera, ―A Context-Related Authorization and Access Control Method Based on RBAC,‖

Proceedings of the seventh ACM Symposium on Access Control Models and Technologies, pp.117-124, 2002.

[42] Longhua Zhang, Gail-Joon Ahn, and Bei-Tseng Chu, ―A Role-Based Delegation Framework for Healthcare Information Systems,‖ Proceedings of the seventh ACM Symposium on Access Control Models and Technologies, Monterey

相關文件