Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Part 3 - Secure Strategy Factory Imagine a system that handles medical patient records and all. The records are compressed and encrypted using different algorithms

image text in transcribed
Part 3 - Secure Strategy Factory Imagine a system that handles medical patient records and all. The records are compressed and encrypted using different algorithms and different keys for different sections of the record. The system is designed to allow different users to extract copies of patient records and patient bills based on their user credentials. In this system, there are four classes of users: 1. Patient 2. Primary Care Physician 3. Consulting Physician 4. Administrative Professional There are three levels of patient record that can be produced (extracted and decrypted from one stored record): 1. Patient level (available to the Patient) 2. Primary Care level (available to the Primary Care Physician) 3. Consulting level (available to the Consulting Physician) There are two levels of patient bills that can be produced (extracted and decrypted from one stored record): 1. Patient level (available to the Patient and Administrative Professional) 2. Medical Staff level (available to the Primary Care Physician. Consulting Physician and Administrative Professional) Part 3 - Assignment 1. Implement the system using the Secure Strategy Factory design pattern from the SEI Secure Design Patterns report, drawing the UML class diagram for the pattern portion of the system. (Hint you are going to have to have two strategies, one for patient records and one for patient bills). 2. Code the pattern objects in Java. As we will not actually be running the system. I'm will not be grading based on a clean compile, but instead on an understanding of how the pattern and the security logic work. looking for logic in the code methods. Part 3 - Secure Strategy Factory Imagine a system that handles medical patient records and all. The records are compressed and encrypted using different algorithms and different keys for different sections of the record. The system is designed to allow different users to extract copies of patient records and patient bills based on their user credentials. In this system, there are four classes of users: 1. Patient 2. Primary Care Physician 3. Consulting Physician 4. Administrative Professional There are three levels of patient record that can be produced (extracted and decrypted from one stored record): 1. Patient level (available to the Patient) 2. Primary Care level (available to the Primary Care Physician) 3. Consulting level (available to the Consulting Physician) There are two levels of patient bills that can be produced (extracted and decrypted from one stored record): 1. Patient level (available to the Patient and Administrative Professional) 2. Medical Staff level (available to the Primary Care Physician. Consulting Physician and Administrative Professional) Part 3 - Assignment 1. Implement the system using the Secure Strategy Factory design pattern from the SEI Secure Design Patterns report, drawing the UML class diagram for the pattern portion of the system. (Hint you are going to have to have two strategies, one for patient records and one for patient bills). 2. Code the pattern objects in Java. As we will not actually be running the system. I'm will not be grading based on a clean compile, but instead on an understanding of how the pattern and the security logic work. looking for logic in the code methods

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Options Futures And Other Derivatives

Authors: John C. Hull

7th Edition

0136015867, 9780136015864

More Books

Students also viewed these Finance questions

Question

=+ (a) Show that a trifling set is negligible.

Answered: 1 week ago