The Proceedings of the Second ICST International Conference on Pervasive Computing Technologies for Healthcare 2008
DOI: 10.4108/icst.pervasivehealth2008.2518
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis and Implementation of Web-based Telemedicine Services with a Four-tier Architecture

Abstract: Security of Telemedicine applications is not often given adequate importance by the developers and healthcare administrators primarily to reduce cost. Though some security safeguards are employed by these applications to comply with existing medical data security and privacy regulations, these are not adequate in today's context. Moreover, in a web-based application environment not only the data but also the application itself is vulnerable to attackers. Keeping these concerns in mind, we present the design of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0
2

Year Published

2011
2011
2022
2022

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(18 citation statements)
references
References 10 publications
0
16
0
2
Order By: Relevance
“…Threats related to unauthorized access of classified data can be minimized if the data storage is done behind a firewall in a private-public network architecture. The present system has been designed based on a web based multi tire-architecture proposed by Maji et al [22]. It was chosen to implement the system because it supports data security in a privatepublic network setup.…”
Section: Software Architecture and Functionalitiesmentioning
confidence: 99%
“…Threats related to unauthorized access of classified data can be minimized if the data storage is done behind a firewall in a private-public network architecture. The present system has been designed based on a web based multi tire-architecture proposed by Maji et al [22]. It was chosen to implement the system because it supports data security in a privatepublic network setup.…”
Section: Software Architecture and Functionalitiesmentioning
confidence: 99%
“…Along with this security model, the architecture of the community's ISMS is designed. Multitier architectures (Maji et al, 2008;Chryssanthou et al, 2009) can solve authentication and security issues of the medical community and strengthen the protection of medical data against improper use, unauthorised access or accidental loss.…”
Section: Risk Treatment Planmentioning
confidence: 99%
“…These networked devices provide services such as telemedicine, health information exchange, and precision medicine. As these devices have immediate effects on the lives of patients, security management is critical [2][3][4][5][6][7][8][9][10][11][12]. In particular, data transmission from wired to wireless networks requires specific security guidelines for data processing and management and medical device development [13].…”
Section: Introductionmentioning
confidence: 99%
“…Telemedicine System Architecture A telemedicine system [1] can be divided into two sections according to its components: (1) components accessible to the user (or patient), such as the telemedicine terminal, and (2) components available to the telemedicine service provider only, such as the telemedicine system and medical team. The possible security threat scenarios based on information flow through the various components are summarized below [11,12] (Fig. 1):…”
Section: Introductionmentioning
confidence: 99%