Publication detail
User Authentication to Access Secure Data
DOSTÁL, O. SLAVÍČEK, K.
Original Title
User Authentication to Access Secure Data
English Title
User Authentication to Access Secure Data
Type
conference paper
Language
en
Original Abstract
Since January 2002 the Institute of Computer Science in Masaryk University operates a regional archive of medicine image information. All connected client appliances utilize DICOM standard with pure authentication capabilities. For authentication purposes IP address of appliance is mostly used. This solution is satisfactory for modalities but not suitable for remote consultans and mobile users. This weakness of DICOM standatd is bypased by utilizing IPSEC tunnels and assigning client address on user authentications.
English abstract
Since January 2002 the Institute of Computer Science in Masaryk University operates a regional archive of medicine image information. All connected client appliances utilize DICOM standard with pure authentication capabilities. For authentication purposes IP address of appliance is mostly used. This solution is satisfactory for modalities but not suitable for remote consultans and mobile users. This weakness of DICOM standatd is bypased by utilizing IPSEC tunnels and assigning client address on user authentications.
Released
06.03.2006
Publisher
CESNET z.s.p.o.
Location
Praha
ISBN
80-239-6533-6
Book
CESNET
Pages from
127
Pages to
131
Pages count
5
Documents
BibTex
@inproceedings{BUT18203,
author="Otto {Dostál} and Karel {Slavíček}",
title="User Authentication to Access Secure Data",
annote="Since January 2002 the Institute of Computer Science in Masaryk University operates a regional archive of medicine image information. All connected client appliances utilize DICOM standard with pure authentication capabilities. For authentication purposes IP address of appliance is mostly used. This solution is satisfactory for modalities but not suitable for remote consultans and mobile users. This weakness of DICOM standatd is bypased by utilizing IPSEC tunnels and assigning client address on user authentications.",
address="CESNET z.s.p.o.",
booktitle="CESNET",
chapter="18203",
institution="CESNET z.s.p.o.",
year="2006",
month="march",
pages="127",
publisher="CESNET z.s.p.o.",
type="conference paper"
}