Making grandma's data secure : a security architecture for home telemedicine

Home telemedicine presents special challenges for data security and privacy. Experience in the Informatics for Diabetes Education And Telemedicine (IDEATel) project has demonstrated that data security is not a one-size-fits-all problem. The IDEATel users include elderly patients in their homes, nurs...

Ausführliche Beschreibung

Bibliographische Detailangaben
Veröffentlicht in:Proceedings. AMIA Symposium. - 1998. - (2001) vom: 11., Seite 657-61
1. Verfasser: Starren, J (VerfasserIn)
Weitere Verfasser: Sengupta, S, Hripcsak, G, Ring, G, Klerer, R, Shea, S
Format: Aufsatz
Sprache:English
Veröffentlicht: 2001
Zugriff auf das übergeordnete Werk:Proceedings. AMIA Symposium
Schlagworte:Journal Article Research Support, U.S. Gov't, P.H.S.
LEADER 01000naa a22002652 4500
001 NLM117123757
003 DE-627
005 20231222175832.0
007 tu
008 231222s2001 xx ||||| 00| ||eng c
028 5 2 |a pubmed24n0391.xml 
035 |a (DE-627)NLM117123757 
035 |a (NLM)11825267 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
100 1 |a Starren, J  |e verfasserin  |4 aut 
245 1 0 |a Making grandma's data secure  |b a security architecture for home telemedicine 
264 1 |c 2001 
336 |a Text  |b txt  |2 rdacontent 
337 |a ohne Hilfsmittel zu benutzen  |b n  |2 rdamedia 
338 |a Band  |b nc  |2 rdacarrier 
500 |a Date Completed 24.05.2002 
500 |a Date Revised 13.11.2018 
500 |a published: Print 
500 |a Citation Status MEDLINE 
520 |a Home telemedicine presents special challenges for data security and privacy. Experience in the Informatics for Diabetes Education And Telemedicine (IDEATel) project has demonstrated that data security is not a one-size-fits-all problem. The IDEATel users include elderly patients in their homes, nurse case managers, physicians, and researchers. The project supports multiple computer systems that require a variety of user interactions, including: data entry, data review, patient education, videoconferencing, and electronic monitoring. To meet these various needs, a number of different of security solutions were utilized, including: UserID/Password, PKI certificates, time-based tokens, IP filtering, VPNs, symmetric and asymmetric encryption schemes, firewalls and dedicated connections. These were combined in different ways to meet the needs of each user groups 
650 4 |a Journal Article 
650 4 |a Research Support, U.S. Gov't, P.H.S. 
700 1 |a Sengupta, S  |e verfasserin  |4 aut 
700 1 |a Hripcsak, G  |e verfasserin  |4 aut 
700 1 |a Ring, G  |e verfasserin  |4 aut 
700 1 |a Klerer, R  |e verfasserin  |4 aut 
700 1 |a Shea, S  |e verfasserin  |4 aut 
773 0 8 |i Enthalten in  |t Proceedings. AMIA Symposium  |d 1998  |g (2001) vom: 11., Seite 657-61  |w (DE-627)NLM098642928  |x 1531-605X  |7 nnns 
773 1 8 |g year:2001  |g day:11  |g pages:657-61 
912 |a GBV_USEFLAG_A 
912 |a SYSFLAG_A 
912 |a GBV_NLM 
912 |a GBV_ILN_350 
951 |a AR 
952 |j 2001  |b 11  |h 657-61