Making grandma's data secure: A security architecture for home telemedicine

被引:0
|
作者
Starren, J [1 ]
Sengupta, S
Hripcsak, G
Ring, G
Klerer, R
Shea, S
机构
[1] Columbia Univ, Dept Med Informat, New York, NY 10027 USA
[2] Columbia Univ, Dept Med, New York, NY USA
[3] Columbia Univ, Dept Radiol, New York, NY USA
[4] Crosshair Technol, Scarsdale, NY USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Home telemedicine presents special challenges for data security, and privacy. Experience in the Informatics for Diabetes Education And Telemedicine (IDEATel) project has demonstrated that data security is not a one-size-jus-all problem. The IDEA Tel users include elderly patients in their homes, nurse case mangers, physicians, and researchers. The project supports multiple computer systems that require a variety of user interactions, including: data entry, data review, patient education, videoconferencing, and electronic monitoring. To meet these various needs, a number of different of security solutions were utilized, including: UserID/Password, PKI certificates, time-based tokens, IP filtering, VPNs, symmetric and asymmetric encryption schemes, firewalls and dedicated connections. These were combined in different ways to meet the needs of each user groups.
引用
收藏
页码:657 / 661
页数:5
相关论文
共 50 条
  • [31] Security Architecture for Secure Train Control and Monitoring System
    Purwanto, Yudha
    Ruriawan, Muhammad Faris
    Alamsyah, Andry
    Wijaya, Febry Pandu
    Husna, Dewi Nala
    Kridanto, Agri
    Nugroho, Fifin
    Fakhrudin, Anang
    Itqon, Mu'ammar
    Febrianta, Mochamad Yudha
    Widiyanesti, Sri
    Mentari, Fussy
    Gozali, Alfian Akbar
    Romadhony, Ade
    SENSORS, 2023, 23 (03)
  • [32] Making Effective Home Security Available to Everyone - Towards Smart Home Security Communities
    Koehler, Marcus
    Wortmann, Felix
    INTERNET OF THINGS: IOT INFRASTRUCTURES, PT II, 2015, 151 : 312 - 317
  • [33] A secure architecture for the pseudonymization of medical data
    Riedl, Bernhard
    Neubauer, Thomas
    Goluch, Gemot
    Boehm, Oswald
    Reinauer, Gert
    Krumboeck, Alexander
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 318 - +
  • [34] Security Architecture for RFID Application in Home Environment
    Li, Xuemei
    Xu, Gang
    Yu, Degui
    2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 467 - +
  • [35] The U.S. Army Telemedicine and m-Health Program: Making a Difference at Home and Abroad
    Poropatich, Ronald
    Lai, Eva
    McVeigh, Francis
    Bashshur, Rashid
    TELEMEDICINE AND E-HEALTH, 2013, 19 (05) : 380 - 386
  • [36] Network access and data security design for telemedicine applications
    Makris, L
    Argiriou, N
    Strintzis, MG
    SECOND IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 1997, : 523 - 527
  • [37] Architecture for decision making in a home safety system
    Uusitalo, Ilkka
    Mantere, Matti
    FOURTH INTERNATIONAL CONFERENCE ON MACHINE VISION (ICMV 2011): MACHINE VISION, IMAGE PROCESSING, AND PATTERN ANALYSIS, 2012, 8349
  • [38] Security Requirements and Countermeasures for Secure Home Network in Internet of Things
    Moon, Seo Yeon
    Singh, Saurabh
    Park, Jong Hyuk
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2017, 421 : 396 - 400
  • [39] Analysis of the RFID security protocol for secure smart home network
    Kim, Hyun-Seok
    Oh, Jung-Hyun
    Choi, Jin-Young
    2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2006, : 356 - +
  • [40] Wireless sensor network security: A secure sink node architecture
    Muhammad, S
    Furqan, Z
    Guha, R
    CONFERENCE PROCEEDINGS OF THE 2005 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE, 2005, : 371 - 376