Security of medical multimedia

被引:7
|
作者
Tzelepi, S [1 ]
Pangalos, G [1 ]
Nikolacopoulou, G [1 ]
机构
[1] Aristotle Univ Thessaloniki, Informat Lab, Comp Div, Gen Dept,Fac Technol, GR-54006 Thessaloniki, Greece
来源
关键词
database management systems;
D O I
10.1080/14639230210153730
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The application of information technology to health care has generated growing concern about the privacy and security of medical information. Furthermore, data and communication security requirements in the field of multimedia are higher. In this paper we describe firstly the most important security requirements that must be fulfilled by multimedia medical data, and the security measures used to satisfy these requirements. These security measures are based mainly on modern cryptographic and watermarking mechanisms as well as on security infrastructures. The objective of our work is to complete this picture, exploiting the capabilities of multimedia medical data to define and implement an authorization model for regulating access to the data. In this paper we describe an extended role-based access control model by considering, within the specification of the role-permission relationship phase, the constraints that must be satisfied in order for the holders of the permission to use those permissions. The use of constraints allows role-based access control to be tailored to specifiy very fine-grained and flexible content-, context- and time-based access control policies. Other restrictions, such as role entry restriction also can be captured. Finally, the description of system architecture for a secure DBMS is presented.
引用
收藏
页码:169 / 184
页数:16
相关论文
共 50 条
  • [31] Security broker for multimedia wireless LANs
    Ganz, A
    Park, SH
    Ganz, Z
    COMPUTER COMMUNICATIONS, 2000, 23 (5-6) : 588 - 594
  • [32] Analysis of the Security of Internet of Multimedia Things
    Lv, Zhihan
    Qiao, Liang
    Song, Houbing
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2021, 16 (03)
  • [33] A study of EEG for enterprise multimedia security
    Barjinder Kaur
    Dinesh Singh
    Partha Pratim Roy
    Multimedia Tools and Applications, 2020, 79 : 10805 - 10823
  • [34] The Challenge of Multimedia Social Networks and Security
    Zhang, Zhiyong
    RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2015, 8 (02) : 72 - 73
  • [35] Special issue on multimedia analysis and security
    Shiguo Lian
    Sergio Velastin
    Multimedia Tools and Applications, 2012, 57 : 1 - 4
  • [36] Security for multimedia adaptation: Architectures and solutions
    Zeng, WJ
    Lan, JQ
    Zhuang, XH
    IEEE MULTIMEDIA, 2006, 13 (02) : 68 - 76
  • [37] A study of EEG for enterprise multimedia security
    Kaur, Barjinder
    Singh, Dinesh
    Roy, Partha Pratim
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (15-16) : 10805 - 10823
  • [38] Blockchain-based multimedia security
    Zhang, Yushu
    Li, Ming
    Guo, Shangwei
    Meng, Weizhi
    Li, Hongxiang
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (20) : 30581 - 30581
  • [39] How to (Possibly) Foil Multimedia Security?
    Balado, Felix
    Fournel, Thierry
    2014 13TH WORKSHOP ON INFORMATION OPTICS (WIO), 2014,
  • [40] Scalable Security of Streaming Multimedia Contents
    Almasalha, Fadi
    Khokhar, Ashfaq
    Amin, Afshan
    Baqai, Shahab
    2009 IEEE 34TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2009), 2009, : 977 - +