HEAL DSpace

A monitoring/auditing mechanism for SSL/TLS secured service sessions in Health Care Applications

Αποθετήριο DSpace/Manakin

Εμφάνιση απλής εγγραφής

dc.contributor.author Kavadias, CD en
dc.contributor.author Koutsopoulos, KA en
dc.contributor.author Vlachos, MP en
dc.contributor.author Bourka, A en
dc.contributor.author Kollias, V en
dc.contributor.author Stassinopoulos, G en
dc.date.accessioned 2014-03-01T01:52:56Z
dc.date.available 2014-03-01T01:52:56Z
dc.date.issued 2003 en
dc.identifier.issn 09287329 en
dc.identifier.uri https://dspace.lib.ntua.gr/xmlui/handle/123456789/26788
dc.relation.uri http://www.scopus.com/inward/record.url?eid=2-s2.0-0037279914&partnerID=40&md5=521402d618cbd6e600de34aa23fedce9 en
dc.subject Case studies en
dc.subject Healthcare applications en
dc.subject PKI en
dc.subject Protocol analysis en
dc.subject Public key cryptography en
dc.subject SSL/TLS en
dc.subject.other article en
dc.subject.other computer security en
dc.subject.other health care en
dc.subject.other health care cost en
dc.subject.other information en
dc.subject.other Internet en
dc.subject.other medical audit en
dc.subject.other medical information en
dc.subject.other priority journal en
dc.subject.other reliability en
dc.subject.other risk assessment en
dc.subject.other Computer Communication Networks en
dc.subject.other Computer Security en
dc.subject.other Computer Systems en
dc.subject.other Humans en
dc.subject.other Internet en
dc.subject.other Medical Informatics Applications en
dc.title A monitoring/auditing mechanism for SSL/TLS secured service sessions in Health Care Applications en
heal.type journalArticle en
heal.publicationDate 2003 en
heal.abstract This paper analyzes the SSL/TLS procedures and defines the functionality of a monitoring/auditing entity running in parallel with the protocol, which is decoding, checking the certificate and permitting session establishment based on the decoded certificate information, the network addresses of the endpoints and a predefined access list. Finally, this paper discusses how such a facility can be used for detection impersonation attempts in Health Care applications and provides case studies to show the effectiveness and applicability of the proposed method. en
heal.journalName Technology and Health Care en
dc.identifier.volume 11 en
dc.identifier.issue 1 en
dc.identifier.spage 1 en
dc.identifier.epage 9 en


Αρχεία σε αυτό το τεκμήριο

Αρχεία Μέγεθος Μορφότυπο Προβολή

Δεν υπάρχουν αρχεία που σχετίζονται με αυτό το τεκμήριο.

Αυτό το τεκμήριο εμφανίζεται στην ακόλουθη συλλογή(ές)

Εμφάνιση απλής εγγραφής