1997
DOI: 10.1016/s0169-2607(96)01798-1
|View full text |Cite
|
Sign up to set email alerts
|

How to deal with security issues in teleradiology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0

Year Published

1999
1999
2018
2018

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 32 publications
(15 citation statements)
references
References 1 publication
0
15
0
Order By: Relevance
“…One important feature of the system is its security concept and the implemented data protection measures based on symmetric and public key encryption [2].…”
Section: Methodsmentioning
confidence: 99%
“…One important feature of the system is its security concept and the implemented data protection measures based on symmetric and public key encryption [2].…”
Section: Methodsmentioning
confidence: 99%
“…However, based on the technological and organisational models used in teleradiology, their various security requirements can be outlined below [3,27]:…”
Section: Medical Information Security Requirementsmentioning
confidence: 99%
“…The principle of those requirements imposes three mandatory characteristics for security of medical information [7,27,28]: confidentiality, reliability, and availability.…”
Section: Medical Information Security Requirementsmentioning
confidence: 99%
See 2 more Smart Citations