期刊文献+

基于云计算的健康医疗系统研究 被引量:3

Research on Health Medical System Based on Cloud Computing
在线阅读 下载PDF
导出
摘要 对基于云计算的健康医疗系统进行设计,实现计算、存储、数据等资源的统一管理,将资源池与云计算管理平台分离,提供公众健康服务平台,包括发送健康短信、提供健康评估和专家在线咨询等功能,实现资源共享、节省软硬件资源投入和较为全面的健康医疗服务. The health medical system based on cloud computing was designed, and the integrate management of re- sources such as computing, storage and data was realized. The pools of resources and management platform of cloud computing were separated. The platform supported public health medical service including sending health messa- ges, providing health evaluation and online consultancy of profession. The resources were shared, software and hardware were saving and comprehensive medical service was provided.
出处 《河南教育学院学报(自然科学版)》 2013年第4期40-42,共3页 Journal of Henan Institute of Education(Natural Science Edition)
基金 河南省科技攻关重点项目(112102310377)
关键词 云计算 健康医疗系统 资源池 平台构架 资源共享 cloud computing health medical system pool of resources scheme of platform resources sharing
作者简介 时雨露(1975-),男,河南开封人,中国联合网络通信有限公司北京分公司工程师.
  • 相关文献

参考文献5

二级参考文献38

  • 1云计算[EB/OL].http://en.wikipedia.org/wiki/Cloud_computing.
  • 2ARMBRUST M, FOX A, GRIFFITH R, et al. Above the clouds: A Berkeley view of cloud computingE EB/OL~. http://www, csec. usf. edu/~ anda/PDS/papers/EECS-2009 o28. pdf.
  • 3SHAMIR A. Identity-based cryptosystems and signature schemes[ C ]//Proc of CRYPTO 84 on Advances in Cryptology. New York: Springer-Ver- lag Inc. , 1985.
  • 4SAHAI A, WATERS B. Fuzzy identity-based encryption[ C]//Proc Of EUROCRYPT 2005. Aarhus, 2005.
  • 5CHEUNG L, NEWPORT C. Provably secure ciphertext policy ABE [ C]//Proc of the 14th ACM Conference on Computer and Communications Se- curity. New York,2007.
  • 6BOLDYREVA A, GOYAL V, KUMAR V. Identity-based encryption with efficient revocation[ C ]// Proc of CCS 2008. Alexandria,2008,.
  • 7CHASE M. Multi-authority attribute based encryption[ M]//VADHAN S P. Theory of Cryptography,TCC 2007. Springer:Amsterdam,2007 : 515 - 534.
  • 8BETHENCOURT J, SAHAI A, WATERS B. C iphertext-policy attribute-based encryption[ C ]//Proceedings of the 28th IEEE Symposium on Se- curity and Privacy. Oakland ,2007.
  • 9GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[ C ]//Proc of C CS 2006. Virginia, 2006.
  • 10YU SHUCHENG, WANG CONG,REN KUI,et al. Achieving secure, scalable and fine-grained data access control in cloud computing[ C ]//IN- FOCOM 2010 Proceedings IEEE. Orland,2010.

共引文献39

同被引文献13

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部