Making grandma's data secure: A security architecture for home telemedicine

被引:0
|
作者
Starren, J [1 ]
Sengupta, S
Hripcsak, G
Ring, G
Klerer, R
Shea, S
机构
[1] Columbia Univ, Dept Med Informat, New York, NY 10027 USA
[2] Columbia Univ, Dept Med, New York, NY USA
[3] Columbia Univ, Dept Radiol, New York, NY USA
[4] Crosshair Technol, Scarsdale, NY USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Home telemedicine presents special challenges for data security, and privacy. Experience in the Informatics for Diabetes Education And Telemedicine (IDEATel) project has demonstrated that data security is not a one-size-jus-all problem. The IDEA Tel users include elderly patients in their homes, nurse case mangers, physicians, and researchers. The project supports multiple computer systems that require a variety of user interactions, including: data entry, data review, patient education, videoconferencing, and electronic monitoring. To meet these various needs, a number of different of security solutions were utilized, including: UserID/Password, PKI certificates, time-based tokens, IP filtering, VPNs, symmetric and asymmetric encryption schemes, firewalls and dedicated connections. These were combined in different ways to meet the needs of each user groups.
引用
收藏
页码:657 / 661
页数:5
相关论文
共 50 条
  • [21] Robust and Secure Data Hiding Techniques for Telemedicine Applications
    Singh, Amit Kumar
    Kumar, Basant
    Singh, Sanjay Kumar
    Dave, Mayank
    Singh, Vivek Kumar
    Kumar, Pardeep
    Ghrera, S. P.
    Gupta, Pradeep Kumar
    Mohan, Anand
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (05) : 7563 - 7573
  • [22] Accessibility and Vulnerabilty: Ensuring Security of Data in Telemedicine
    Doarn, Charles R.
    Merrell, Ronald C.
    TELEMEDICINE AND E-HEALTH, 2015, 21 (03) : 143 - 144
  • [23] Network and data security design for telemedicine applications
    Makris, L
    Argiriou, T
    Strintzis, NG
    MEDICAL INFORMATICS, 1997, 22 (02): : 133 - 142
  • [25] A security framework for secure home networking in ubiquitous computing
    Lee, Woon-Gu
    Chae, Cheol-Joo
    Kim, Sang-Kuk
    Kang, Mu-Yeong
    Lee, Jae-Kwang
    2007 INTERNATIONAL CONFERENCE ON INTELLIGENT PERVASIVE COMPUTING, PROCEEDINGS, 2007, : 394 - 397
  • [26] IoT based Smart home : Security Aspects and security architecture
    Ray, Abhay Kumar
    Bagwari, Ashish
    2020 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2020), 2020, : 218 - 222
  • [27] Security services architecture for Secure Mobile Grid Systems
    Rosado, David G.
    Fernandez-Medina, Eduardo
    Lopez, Javier
    JOURNAL OF SYSTEMS ARCHITECTURE, 2011, 57 (03) : 240 - 258
  • [28] Designing and modeling security architecture of a secure operating system
    Liang, HL
    Sun, YF
    COMPUTER SCIENCE AND TECHNOLOGY IN NEW CENTURY, 2001, : 202 - 205
  • [29] Applying The Flask Security Architecture to Secure SoC Design
    Hategekimana, Festus
    Bobda, Christophe
    2017 IEEE 25TH ANNUAL INTERNATIONAL SYMPOSIUM ON FIELD-PROGRAMMABLE CUSTOM COMPUTING MACHINES (FCCM 2017), 2017, : 198 - 198
  • [30] Security Architecture and Protocols for Secure MQTT-SN
    Park, Chang-Seop
    Nam, Hye-Min
    IEEE ACCESS, 2020, 8 : 226422 - 226436