dc.contributor.author |
Kavadias, CD |
en |
dc.contributor.author |
Koutsopoulos, KA |
en |
dc.contributor.author |
Vlachos, MP |
en |
dc.contributor.author |
Bourka, A |
en |
dc.contributor.author |
Kollias, V |
en |
dc.contributor.author |
Stassinopoulos, G |
en |
dc.date.accessioned |
2014-03-01T01:52:56Z |
|
dc.date.available |
2014-03-01T01:52:56Z |
|
dc.date.issued |
2003 |
en |
dc.identifier.issn |
09287329 |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/26788 |
|
dc.relation.uri |
http://www.scopus.com/inward/record.url?eid=2-s2.0-0037279914&partnerID=40&md5=521402d618cbd6e600de34aa23fedce9 |
en |
dc.subject |
Case studies |
en |
dc.subject |
Healthcare applications |
en |
dc.subject |
PKI |
en |
dc.subject |
Protocol analysis |
en |
dc.subject |
Public key cryptography |
en |
dc.subject |
SSL/TLS |
en |
dc.subject.other |
article |
en |
dc.subject.other |
computer security |
en |
dc.subject.other |
health care |
en |
dc.subject.other |
health care cost |
en |
dc.subject.other |
information |
en |
dc.subject.other |
Internet |
en |
dc.subject.other |
medical audit |
en |
dc.subject.other |
medical information |
en |
dc.subject.other |
priority journal |
en |
dc.subject.other |
reliability |
en |
dc.subject.other |
risk assessment |
en |
dc.subject.other |
Computer Communication Networks |
en |
dc.subject.other |
Computer Security |
en |
dc.subject.other |
Computer Systems |
en |
dc.subject.other |
Humans |
en |
dc.subject.other |
Internet |
en |
dc.subject.other |
Medical Informatics Applications |
en |
dc.title |
A monitoring/auditing mechanism for SSL/TLS secured service sessions in Health Care Applications |
en |
heal.type |
journalArticle |
en |
heal.publicationDate |
2003 |
en |
heal.abstract |
This paper analyzes the SSL/TLS procedures and defines the functionality of a monitoring/auditing entity running in parallel with the protocol, which is decoding, checking the certificate and permitting session establishment based on the decoded certificate information, the network addresses of the endpoints and a predefined access list. Finally, this paper discusses how such a facility can be used for detection impersonation attempts in Health Care applications and provides case studies to show the effectiveness and applicability of the proposed method. |
en |
heal.journalName |
Technology and Health Care |
en |
dc.identifier.volume |
11 |
en |
dc.identifier.issue |
1 |
en |
dc.identifier.spage |
1 |
en |
dc.identifier.epage |
9 |
en |