User Authentication to Access Secure Data

被引:0
|
作者
Navratil, Pavel [1 ]
Slavicek, Karel [2 ]
Dostal, Otto [2 ]
机构
[1] Intercom Syst, Nechvilova 1826, Prague 14800 4, Czech Republic
[2] Masaryk Univ, Inst Comp Sci, Brno 60200, Czech Republic
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Since January 2002 the Institute of Computer Science in Masaryk University operates a regional archive of medicine image information. All connected client appliances utilize DICOM standard with pure user authentication capabilities. For authentication purposes IP address of appliance is mostly used. This solution is satisfactory for modalities but not suitable for remote consultants and mobile users. We have bypassed this weakness of DICOM standard by utilizing IPSEC tunnels and assigning client address based on user authentication.
引用
收藏
页码:127 / 132
页数:6
相关论文
共 50 条
  • [1] Secure Multifactor Remote Access User Authentication Framework for IoT Networks
    Alshahrani, Mohammed Mujib
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (03): : 3235 - 3254
  • [2] Secure and Privacy preserving Biometric based User Authentication with Data Access Control System in the Healthcare Environment
    Kaul, Sonam Devgan
    Murty, V. Kumar
    Hatzinakos, Dimitrios
    [J]. 2020 INTERNATIONAL CONFERENCE ON CYBERWORLDS (CW 2020), 2020, : 249 - 256
  • [3] A secure user authentication protocol for sensor network in data capturing
    Zhou Quan
    Tang Chunming
    Zhen Xianghan
    Rong Chunming
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2015, 4
  • [4] The Authentication Game - Secure User Authentication by Gamification?
    Ebbers, Frank
    Brune, Philipp
    [J]. ADVANCED INFORMATION SYSTEMS ENGINEERING (CAISE 2016), 2016, 9694 : 101 - 115
  • [5] An Enhanced Lightweight Authentication Scheme for Secure Access to Cloud Data
    Hammami, Hamza
    Obaidat, Mohammad S.
    Ben Yahia, Sadok
    [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1, 2020, : 110 - 117
  • [6] Distributed authentication system to access data in multiple secure domains
    de Asis Lopez-Fuentes, Francisco
    Alejandro Ibanez-Ramirez, Juan
    Chantes Barrios, Abigail
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (06) : 7595 - 7606
  • [7] Efficient User Authentication and Secure Data Transmission in Wireless Sensor Networks
    Das, Manik Lal
    [J]. PROCEEDINGS OF THE 2008 16TH INTERNATIONAL CONFERENCE ON NETWORKS, 2008, : 240 - 245
  • [8] Secure User Authentication in Cloud Computing
    Javaid, Zeeshan
    Ijaz, Imran
    [J]. PROCEEDINGS OF THE 2013 5TH INTERNATIONAL CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES (ICICT 2013), 2013,
  • [9] A Secure Remote User Authentication Scheme
    Park, Ji-Hye
    Yim, Seong Jun
    Chang, Jik Hyun
    [J]. THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 368 - 373
  • [10] Secure User Authentication Using Honeywords
    Palaniappan, S.
    Parthipan, V
    Kirubakaran, S. Stewart
    Johnson, R.
    [J]. PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 896 - 903