Making grandma's data secure: A security architecture for home telemedicine

被引:0
|
作者
Starren, J [1 ]
Sengupta, S
Hripcsak, G
Ring, G
Klerer, R
Shea, S
机构
[1] Columbia Univ, Dept Med Informat, New York, NY 10027 USA
[2] Columbia Univ, Dept Med, New York, NY USA
[3] Columbia Univ, Dept Radiol, New York, NY USA
[4] Crosshair Technol, Scarsdale, NY USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Home telemedicine presents special challenges for data security, and privacy. Experience in the Informatics for Diabetes Education And Telemedicine (IDEATel) project has demonstrated that data security is not a one-size-jus-all problem. The IDEA Tel users include elderly patients in their homes, nurse case mangers, physicians, and researchers. The project supports multiple computer systems that require a variety of user interactions, including: data entry, data review, patient education, videoconferencing, and electronic monitoring. To meet these various needs, a number of different of security solutions were utilized, including: UserID/Password, PKI certificates, time-based tokens, IP filtering, VPNs, symmetric and asymmetric encryption schemes, firewalls and dedicated connections. These were combined in different ways to meet the needs of each user groups.
引用
收藏
页码:657 / 661
页数:5
相关论文
共 50 条
  • [41] Security Architecture and Specification Framework for Safe and Secure Industrial Automation
    Tverdyshev, Sergey
    Blasum, Holger
    Rudina, Ekaterina
    Kulagin, Dmitry
    Dyakin, Pavel
    Moiseev, Stanislav
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2015, 2016, 9578 : 3 - 14
  • [42] Secure Data Storage Architecture on Cloud Environments
    Tran Thi Xuan Trang
    Maruyama, Katsuhisa
    ICSOFT-EA: PROCEEDINGS OF THE 11TH INTERNATIONAL JOINT CONFERENCE ON SOFTWARE TECHNOLOGIES - VOL. 1, 2016, : 39 - 47
  • [43] The efficient security architecture for authentication and authorization in the home network
    Lee, Hyungkyu
    Lee, Jooyoung
    Han, Jongwook
    ICNC 2007: THIRD INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 5, PROCEEDINGS, 2007, : 713 - +
  • [44] Consent Management Architecture for Secure Data Transactions
    Hyysalo, Jarkko
    Hirvonsalo, Harri
    Sauvola, Jaakko
    Tuoriniemi, Samuli
    ICSOFT-EA: PROCEEDINGS OF THE 11TH INTERNATIONAL JOINT CONFERENCE ON SOFTWARE TECHNOLOGIES - VOL. 1, 2016, : 125 - 132
  • [45] A Secure Architecture for Data Storage in the Cloud Environments
    Fu, Chuan
    Yang, Jun
    Liu, Zheli
    Jia, Chunfu
    2015 9TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING IMIS 2015, 2015, : 289 - 291
  • [46] Wireless biomedical home security network -: architecture and modelling
    Volner, R
    Lubomír, P
    38TH ANNUAL 2004 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2004, : 69 - 76
  • [47] FamilyGuard: A Security Architecture for Anomaly Detection in Home Networks
    de Melo, Pedro H. A. D.
    Miani, Rodrigo Sanches
    Rosa, Pedro Frosi
    SENSORS, 2022, 22 (08)
  • [48] Data security threats in the home of environment
    Proctor, T
    Home-Oriented Informatics and Telematics, Proceedings, 2005, 178 : 133 - 144
  • [49] DATA-SECURITY HITS HOME
    WILSON, J
    IEEE MICRO, 1995, 15 (05) : 86 - 88
  • [50] An Architecture for Data Security in Cloud Computing
    Sugumaran, M.
    BalaMurugan, B.
    Kamalraj, D.
    2014 WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT 2014), 2014, : 252 - +