Network and data security design for telemedicine applications. 1997

L Makris, and N Argiriou, and M G Strintzis
Electrical and Computer Engineering Department, Aristotle University of Thessaloniki, Greece.

The maturing of telecommunication technologies has ushered in a whole new era of applications and services in the health care environment. Teleworking, teleconsultation, mutlimedia conferencing and medical data distribution are rapidly becoming commonplace in clinical practice. As a result, a set of problems arises, concerning data confidentiality and integrity. Public computer networks, such as the emerging ISDN technology, are vulnerable to eavesdropping. Therefore it is important for telemedicine applications to employ end-to-end encryption mechanisms securing the data channel from unauthorized access of modification. We propose a network access and encryption system that is both economical and easily implemented for integration in developing or existing applications, using well-known and thoroughly tested encryption algorithms. Public-key cryptography is used for session-key exchange, while symmetric algorithms are used for bulk encryption. Mechanisms for session-key generation and exchange are also provided.

UI MeSH Term Description Entries
D003195 Computer Communication Networks A system containing any combination of computers, computer terminals, printers, audio or visual display devices, or telephones interconnected by telecommunications equipment or cables: used to transmit or receive information. (Random House Unabridged Dictionary, 2d ed) Cognitive Radio,Computer Network Management,Databases, Distributed,Distributed Systems,Extranets,Intranets,Network Communication Protocols,Telecommunication Networks,Cognitive Radios,Communication Network, Computer,Communication Networks, Computer,Communication Protocol, Network,Communication Protocols, Network,Computer Communication Network,Database, Distributed,Distributed Database,Distributed Databases,Distributed System,Extranet,Intranet,Management, Computer Network,Network Communication Protocol,Network Management, Computer,Network, Computer Communication,Network, Telecommunication,Protocol, Network Communication,Radio, Cognitive,System, Distributed,Telecommunication Network
D003219 Confidentiality The privacy of information and its protection against unauthorized disclosure. Patient Data Privacy,Privacy of Patient Data,Privileged Communication,Confidential Information,Secrecy,Communication, Privileged,Communications, Privileged,Data Privacy, Patient,Information, Confidential,Privacy, Patient Data,Privileged Communications
D006801 Humans Members of the species Homo sapiens. Homo sapiens,Man (Taxonomy),Human,Man, Modern,Modern Man
D000465 Algorithms A procedure consisting of a sequence of algebraic formulas and/or logical steps to calculate or determine a given task. Algorithm
D012984 Software Sequential operating programs and data which instruct the functioning of a digital computer. Computer Programs,Computer Software,Open Source Software,Software Engineering,Software Tools,Computer Applications Software,Computer Programs and Programming,Computer Software Applications,Application, Computer Software,Applications Software, Computer,Applications Softwares, Computer,Applications, Computer Software,Computer Applications Softwares,Computer Program,Computer Software Application,Engineering, Software,Open Source Softwares,Program, Computer,Programs, Computer,Software Application, Computer,Software Applications, Computer,Software Tool,Software, Computer,Software, Computer Applications,Software, Open Source,Softwares, Computer Applications,Softwares, Open Source,Source Software, Open,Source Softwares, Open,Tool, Software,Tools, Software
D016247 Information Storage and Retrieval Organized activities related to the storage, location, search, and retrieval of information. Information Retrieval,Data Files,Data Linkage,Data Retrieval,Data Storage,Data Storage and Retrieval,Information Extraction,Information Storage,Machine-Readable Data Files,Data File,Data File, Machine-Readable,Data Files, Machine-Readable,Extraction, Information,Files, Machine-Readable Data,Information Extractions,Machine Readable Data Files,Machine-Readable Data File,Retrieval, Data,Storage, Data
D016494 Computer Security Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data. Computer Viruses,Data Protection,Data Security,Compromising of Data,Computer Hackers,Computer Worms,Cyber Security,Cybersecurity,Data Encryption,Information Protection,Computer Hacker,Computer Virus,Computer Worm,Data Compromising,Data Encryptions,Encryption, Data,Encryptions, Data,Hacker, Computer,Hackers, Computer,Protection, Data,Protection, Information,Security, Computer,Security, Cyber,Security, Data,Virus, Computer,Viruses, Computer,Worm, Computer,Worms, Computer
D017216 Telemedicine Delivery of health services via remote telecommunications. This includes interactive consultative and diagnostic services. Tele-Care,Tele-ICU,Tele-Intensive Care,Tele-Referral,Telecare,Virtual Medicine,Mobile Health,Telehealth,eHealth,mHealth,Health, Mobile,Medicine, Virtual,Tele Care,Tele ICU,Tele Intensive Care,Tele Referral,Tele-Referrals

Related Publications

L Makris, and N Argiriou, and M G Strintzis
January 2006, Conference proceedings : ... Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE Engineering in Medicine and Biology Society. Annual Conference,
L Makris, and N Argiriou, and M G Strintzis
September 2003, Health facilities management,
L Makris, and N Argiriou, and M G Strintzis
January 2001, Proceedings. AMIA Symposium,
L Makris, and N Argiriou, and M G Strintzis
March 2015, Telemedicine journal and e-health : the official journal of the American Telemedicine Association,
L Makris, and N Argiriou, and M G Strintzis
January 2008, Studies in health technology and informatics,
L Makris, and N Argiriou, and M G Strintzis
January 2006, Journal of telemedicine and telecare,
L Makris, and N Argiriou, and M G Strintzis
March 2003, IEEE transactions on information technology in biomedicine : a publication of the IEEE Engineering in Medicine and Biology Society,
L Makris, and N Argiriou, and M G Strintzis
January 2008, Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE Engineering in Medicine and Biology Society. Annual International Conference,
L Makris, and N Argiriou, and M G Strintzis
January 1999, Genetic epidemiology,
Copied contents to your clipboard!