Rapid advances in multimedia and communication technologies now allow for remote sharing of patient data and medical imaging, which can benefit applications like telesurgery and telediagnosis. However, this increased ease of transmission also raises new security issues regarding confidentiality of patient information being accessible only to authorized users, availability of data as normally required, and reliability of the information being unaltered, authenticated as belonging to the correct patient, and thus able for physicians to use confidently.
Rapid advances in multimedia and communication technologies now allow for remote sharing of patient data and medical imaging, which can benefit applications like telesurgery and telediagnosis. However, this increased ease of transmission also raises new security issues regarding confidentiality of patient information being accessible only to authorized users, availability of data as normally required, and reliability of the information being unaltered, authenticated as belonging to the correct patient, and thus able for physicians to use confidently.
Rapid advances in multimedia and communication technologies now allow for remote sharing of patient data and medical imaging, which can benefit applications like telesurgery and telediagnosis. However, this increased ease of transmission also raises new security issues regarding confidentiality of patient information being accessible only to authorized users, availability of data as normally required, and reliability of the information being unaltered, authenticated as belonging to the correct patient, and thus able for physicians to use confidently.
THE rapid evolution of multimedia and communication
technologies offers new means of sharing and remote access
to patient data. In particular, medical imaging is already called to play important roles in applications like telesurgery, telediagnosis, and so on. But at the same time, this ease of transmission and sharing of data increases security issues in terms of 1) confidentiality, which means that only authorized users can access patient data; 2) availability, which guarantees access to medical information in the normal scheduled conditions of access and exercise; 3) reliability, which is based on a) integrity—a proof that the information has not been altered or modified by nonauthorized persons; and b) authentication—a proof of the information origins and of its attachment to one patient. Reliable pieces of information can be used confidently by the physician.