Trusted third party services for deploying secure telemedical applications over the WWW

نویسندگان

  • Diomidis Spinellis
  • Stefanos Gritzalis
  • John Iliadis
  • Dimitris Gritzalis
  • Sokratis K. Katsikas
چکیده

The EUROMED-ETS schema provides a robust security framework for telemedical applications operating over the World Wide Web. It is based on a trusted third party architecture under which certificate authorities store the public-key certificates of participating hospitals and medical practitioners. Digital signatures are used to provide peer and data origin authentication, and, in combination with access control lists, to provide access control. The deployed infrastructure is based on off-the-shelf available clients and servers, and provides functions for electronic registration of participants, session initialisation, user authentication, key generation and personalisation, certificate generation, distribution, storage and retrieval, certificate revocation lists, and auditing. It was found that, as the underlying technologies mature, a Web-based trusted third party architecture provides a viable solution for delivering secure telemedical applications.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using trusted third parties for secure telemedical applications over the WWW: the EUROMED-ETS approach.

This paper reports on the results obtained by the pilot operation of Trusted Third Parties (TTP) for secure telemedical applications over the WWW. The work reported on herein was carried out within the context of EUROMED-ETS, a R&D project funded by the INFOSEC office of Directorate General XIII of the European Union. The paper discusses the platform used, the security needs of the specific app...

متن کامل

Trialling Secure Billing with Trusted Third Party Support for UMTS Applications

We present a protocol developed by the ASPeCT project for secure billing that provides the incontestable charging that is required for UMTS. This protocol realises a payment system for value added services. We describe the protocol and in particular the design features that are of particular relevance to the UMTS environment. We also describe the configuration of a field trial of this protocol ...

متن کامل

Quality assured trusted third parties for deploying secure internet-based healthcare applications

In this paper we present a complete reference framework for the provision of quality assured Trusted Third Party (TTP) services within a medical environment. The main objective is to provide all the basic guidelines towards the development of a quality system for a TTP as an organisation, which could be mapped directly to the requirements of ISO-9000 standards. The important results of the impl...

متن کامل

Trustworthiness in Distributed Electronic Healthcare Records-Basis for Shared Care

Shared Care is the common answer to the challenge for improving health system’s quality and efficiency. This development must be accompanied by implementing shared care information systems moving to extended electronic healthcare record systems which are distributed and have to be interoperable too. Comprehensive communication and co-operation between healthcare establishments is increasingly u...

متن کامل

Typed Computational Email for Serverless Distributed Applications

Peer agents are executable object-oriented email components exchanged between users as a basis of communication for distributed applications. Peer agents, which we implement, are strongly typed and are dispatched to user-installable trusted handlers based on their type. The type mechanism provides the flexible trust management needed to implement secure distributed distributed applications over...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computers & Security

دوره 18  شماره 

صفحات  -

تاریخ انتشار 1999