2018
DOI: 10.1016/j.jbi.2018.08.010
|View full text |Cite
|
Sign up to set email alerts
|

Networked medical data sharing on secure medium – A web publishing mode for DICOM viewer with three layer authentication

Abstract: Growing demand for e-healthcare across the globe has raised concerns towards the secure and authentication enhanced medical image sharing. One of the services offered by health informatics in hospitals include an user interface through the Local Area Network (LAN) for enabling storage and access of medical records. In this paper, a security enhanced DICOM image sharing over a LAN addressing confidentiality, integrity and authentication has been proposed. Initially, the AES encrypted patient history was combine… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 39 publications
(12 citation statements)
references
References 28 publications
0
12
0
Order By: Relevance
“…Attractors have the capacity to describe physical systems in a deterministic fashion and yet give rise to inherently unpredictable solutions. The Lorenz attractor is most famously attributed to the “Butterfly effect”, owing to butterfly like shape that the attractor generates [ 3 ]. This chaotic attractor is derived from the Lorenz System of ordinary differential equations.…”
Section: Proposed Methodologymentioning
confidence: 99%
“…Attractors have the capacity to describe physical systems in a deterministic fashion and yet give rise to inherently unpredictable solutions. The Lorenz attractor is most famously attributed to the “Butterfly effect”, owing to butterfly like shape that the attractor generates [ 3 ]. This chaotic attractor is derived from the Lorenz System of ordinary differential equations.…”
Section: Proposed Methodologymentioning
confidence: 99%
“…Lately, vast concerns are raised about the problem of medical information security due to the rising need for telemedicine services and the known fact that applications of medical frequently handle sensitive patient information. This has become an important and crucial issue as it inevitably involves the transfer of medical information over open networks like the Internet (21)(22)(23). Nowadays, maintaining the privacy of medical information is not only an ethical requirement but also a legal one (18,(24)(25)(26)(27).…”
Section: Methodsmentioning
confidence: 99%
“…Overall, current role-based access control schemes are not concerned with the HI industry. Several studies [35,36] were presented for efficient and secure architecture against the searchable health-information.…”
Section: Hi-forgery /Eavesdroppingmentioning
confidence: 99%