요약
ABSTRACT
1. Introduction
2. Medical InformationRecord System
3. Security Policies of MIR systemin Mobile Environment
3.1 Analysis of the vulnerability of MIRsecurity in mobile environment
3.2 Establishing security policies ofMIR system in mobile environment
4. Structure of MIR Security Systemin Mobile Environment
4.1 XML security for user authentication
4.2 Network security system
5. Conclusions
References