14
Views
7
CrossRef citations to date
0
Altmetric
Research Article

Security of medical multimedia

, &
Pages 169-184 | Published online: 12 Jul 2009

  • WOHLMACHER, P., 1998, Requirements and mechanisms of IT-security including aspects of multimedia security. Proceedings of the Multimedia and Security Workshop at ACM Multimedia '98, Bristol, UK, September 1998, edited by S. Dittmann, P. Wohlmocher, P. Horster, R. Steinmetz, pp. 11-19.
  • SMITH, J. P., 1995, Authentication of digital medical images with digital signature technology, Radiology, 194, 771-774.
  • WONG, S. T. C., 1996, A cryptologic-based trust center for authenticating medical images. J. American Medical Informatics Assoc., 3, 410-421.
  • WOLFGANG, R. B. and DELP, E. J., 1997, Overview of image security techniques with applications in multimedia systems. Proceedings of the SPIE Conference on Multimedia Networks: Security, Displays, Terminals and Gateways, 3228, 2-5 November 1997, Dallas, Texas, pp. 297-308.
  • MACO, B. and DEWEY, F., 1999, Trusted headers for medical images. Proceedings of the DFGVIIIDII Watermarking Workshop 1999, 5-6 October 1999, Erlangen, Germany.
  • BERRY RIT, T., 2000, Digital watermarking and medical imaging. Cryptography Course homepage, 8 November 2000. Available at http://citeseer.nj.com/406247.html.
  • FERNANDEZ, E. B. and NAIR, K. R., 1998, An abstract authorization system for the Internet. Proceedings of the 9th International Workshop on Database and Expert Systems Applications (DEXA'98) (Vienna: IEEE Computer Society) pp. 310-315.
  • MAVRIDIS, I., PANGALOS, G. and KHAIR, M., 1999, eMEDAC: Role-based access control supporting discretionary and mandatory features. Proceedings of the 13th IFIP WG 11.3 Working Conference on Database Security, Seattle, Washington, USA, edited by V. Atluri and J. Hale (Kluwer Academic Publishers), pp. 63-78.
  • THOMAS, R. K., 1997, Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments. Proceedings of the ACM RBAC '97, Fairfax, VA, USA, pp. 13-19.
  • RATIONAL SOFTWARE CORPORATION, 1997, Object Constraint Language Specification, Version 1.1, Available at http://www.rational.com/uml/, September 1997.
  • TCHOUNIKINE, A., 1997, Creation and content-based retrieval in a radiological documentary record. Proceedings of the 3rd Basque International Workshop on Information Technology, Biarritz, France, July 2-4 (IEEE Press) pp. 111-117.
  • MEDENIS, M. M., 1997, Security in teleradiology systems: requirements and proposed mechanisms. Submitted to Dr Ralph Martinez, Electrical and Computer Engineering Department, University of Arizona for ECE678, Integrated Telecommunications Networks Spring Semester, 1997.
  • WOLFGANG, R. B. and DELP, E. J., 1997, Overview of image security techniques with applications in multimedia systems. Proceedings of the SPIE Conference on Multimedia Networks: Security, Displays, Terminals and Gateways, 3228, 2-5 November 1997, Dallas, Texas, pp. 297-3308.
  • GIURI, L. and IGLIO, P., 1997, Role templates for content-based access control. Proceedings of the Second ACM Role-Based Access Control Workshop, November 1997, Fairfax, VA, USA, pp. 153-159.
  • LUPU, E. C. AND SLOMAN, M., 1997, Reconciling role-based management and role-based access control. Proceedings of the Second ACM Role-Based Access Control Workshop, November 1997, Fairfax, VA, USA, pp. 135-141.
  • WONG, S. T. C. and HUANG, H. K., 1996, Design methods and architectural issues of integrated medical image data based systems. Computerized Medical Imaging and Graphics, 20, 285-299.
  • SANDHU, R., COYNEE, E. J., FEINSTEINN, H. L. and YOUMAN, C. E., 1996, Role-based access control models. IEEE Computer, 29, 38-47.
  • STAMATAKIS, E. A., GLABUS, M. F., WYPER, D. J., BARNES, A. and WILSON, J. T. L., 1999, Validation of statistical parametric mapping (SPM) in assessing cerebral lesions: a simulation study. Neuroimage, 10, 397-407.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.