Rapid advances in multimedia and communication technologies now allow for remote sharing of patient data and medical imaging, which can benefit applications like telesurgery and telediagnosis. However, this increased ease of transmission also raises new security issues regarding confidentiality of patient information being accessible only to authorized users, availability of medical information under normal access conditions, and reliability of data through integrity and authentication to verify it has not been altered or attached to the wrong patient.
Rapid advances in multimedia and communication technologies now allow for remote sharing of patient data and medical imaging, which can benefit applications like telesurgery and telediagnosis. However, this increased ease of transmission also raises new security issues regarding confidentiality of patient information being accessible only to authorized users, availability of medical information under normal access conditions, and reliability of data through integrity and authentication to verify it has not been altered or attached to the wrong patient.
Rapid advances in multimedia and communication technologies now allow for remote sharing of patient data and medical imaging, which can benefit applications like telesurgery and telediagnosis. However, this increased ease of transmission also raises new security issues regarding confidentiality of patient information being accessible only to authorized users, availability of medical information under normal access conditions, and reliability of data through integrity and authentication to verify it has not been altered or attached to the wrong patient.
THE rapid evolution of multimedia and communication
technologies offers new means of sharing and remote access
to patient data. In particular, medical imaging is already called to play important roles in applications like telesurgery, telediagnosis, and so on. But at the same time, this ease of transmission and sharing of data increases security issues in terms of 1) confidentiality, which means that only authorized users can access patient data; 2) availability, which guarantees access to medical information in the normal scheduled conditions of access and exercise; 3) reliability, which is based on a) integrity—a proof that the information has not been altered or modified by nonauthorized persons; and b) authentication—a proof of the information origins and of its attachment to one patient. Reliable pieces of information can be used confidently by the physician.