WYSIWIS revised: early experiences with multiuser interfaces
ACM Transactions on Information Systems (TOIS)
IEEE Spectrum
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Communications of the ACM
The SI challenge in health care
Communications of the ACM
Encryption wars: early battles
IEEE Spectrum
Securing network software applications: introduction
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Smart Card Developer's Kit
Embedded Java in a Web-Based Teleradiology System
IEEE Internet Computing
Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)
Fast Software Encryption, Cambridge Security Workshop
A Formal Model for Role-Based Access Control with Constraints
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Role-Based Access Control
A three-generation model for teleradiology
IEEE Transactions on Information Technology in Biomedicine
Teleconferencing with dynamic medical images
IEEE Transactions on Information Technology in Biomedicine
IEEE Transactions on Information Technology in Biomedicine
Telematics enabled virtual simulation system for radiation treatment planning
Computers in Biology and Medicine
IEEE Transactions on Information Technology in Biomedicine - Special section on new and emerging technologies in bioinformatics and bioengineering
Hi-index | 0.00 |
A secure framework is described for real-time tele-collaboration on Virtual Simulation procedure of Radiation Treatment Planning. An integrated approach is followed clustering the security issues faced by the system into organizational issues, security issues over the LAN and security issues over the LAN-to-LAN connection. The design and the implementation of the security services are performed according to the identified security requirements, along with the need for real time communication between the collaborating health care professionals. A detailed description of the implementation is given, presenting a solution, which can directly be tailored to other tele-collaboration services in the field of health care. The pilot study of the proposed security components proves the feasibility of the secure environment, and the consistency with the high performance demands of the application.