Security of medical multimedia

被引:7
|
作者
Tzelepi, S [1 ]
Pangalos, G [1 ]
Nikolacopoulou, G [1 ]
机构
[1] Aristotle Univ Thessaloniki, Informat Lab, Comp Div, Gen Dept,Fac Technol, GR-54006 Thessaloniki, Greece
来源
关键词
database management systems;
D O I
10.1080/14639230210153730
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The application of information technology to health care has generated growing concern about the privacy and security of medical information. Furthermore, data and communication security requirements in the field of multimedia are higher. In this paper we describe firstly the most important security requirements that must be fulfilled by multimedia medical data, and the security measures used to satisfy these requirements. These security measures are based mainly on modern cryptographic and watermarking mechanisms as well as on security infrastructures. The objective of our work is to complete this picture, exploiting the capabilities of multimedia medical data to define and implement an authorization model for regulating access to the data. In this paper we describe an extended role-based access control model by considering, within the specification of the role-permission relationship phase, the constraints that must be satisfied in order for the holders of the permission to use those permissions. The use of constraints allows role-based access control to be tailored to specifiy very fine-grained and flexible content-, context- and time-based access control policies. Other restrictions, such as role entry restriction also can be captured. Finally, the description of system architecture for a secure DBMS is presented.
引用
收藏
页码:169 / 184
页数:16
相关论文
共 50 条
  • [21] SECURITY ISSUES WITH ENTERPRISE MULTIMEDIA
    SHAIN, M
    COMPUTERS & SECURITY, 1994, 13 (01) : 15 - 22
  • [22] Multimedia Big Data Security
    Chauhan, Preeti
    Choudhary, Arjun
    Gupta, Atul Kumar
    2018 INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN ELECTRICAL, ELECTRONICS & COMMUNICATION ENGINEERING (ICRIEECE 2018), 2018, : 112 - 117
  • [23] Conversational IP multimedia security
    Blom, R
    Carrara, E
    Lindholm, F
    Norrman, K
    Näslund, M
    2002 4TH INTERNATIONAL WORKSHOP ON MOBILE AND WIRELESS COMMUNICATION NETWORK, 2002, : 147 - 151
  • [24] The many colors of multimedia security
    Mercuri, RT
    COMMUNICATIONS OF THE ACM, 2004, 47 (12) : 25 - 29
  • [25] Multimedia Security in Communication (MUSIC)
    Lian, Shiguo
    Zhang, Yan
    Gritzalis, Stefanos
    Chen, Yu
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2009, 15 (02) : 398 - 400
  • [26] The Importance of Medical Multimedia
    Riegler, Michael
    Halvorsen, Pal
    Muenzer, Bernd
    Schoeffmann, Klaus
    PROCEEDINGS OF THE 2018 ACM MULTIMEDIA CONFERENCE (MM'18), 2018, : 2106 - 2108
  • [27] Special Section on Enriched Multimedia - Multimedia Security and Forensics - FOREWORD
    Kawamura, Masaki
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2021, E104D (01): : 1 - 1
  • [28] Special issue on multimedia analysis and security
    Lian, Shiguo
    Velastin, Sergio
    MULTIMEDIA TOOLS AND APPLICATIONS, 2012, 57 (01) : 1 - 4
  • [29] A Framework for Multimedia Data Hiding (Security)
    Akeem, Owoade A.
    Onifade, O. F. W.
    Olatunji, Okesola J.
    Latifat, Abimbola B.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (12): : 99 - 104
  • [30] Blockchain-based multimedia security
    Multimedia Tools and Applications, 2021, 80 : 30581 - 30581