Serveur d'exploration sur la télématique

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.
***** Acces problem to record *****\

Identifieur interne : 000215 ( Pmc/Corpus ); précédent : 0002149; suivant : 0002160 ***** probable Xml problem with record *****

Links to Exploration step


Le document en format XML

<record>
<TEI>
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Making grandma's data secure: a security architecture for home telemedicine.</title>
<author>
<name sortKey="Starren, J" sort="Starren, J" uniqKey="Starren J" first="J." last="Starren">J. Starren</name>
</author>
<author>
<name sortKey="Sengupta, S" sort="Sengupta, S" uniqKey="Sengupta S" first="S." last="Sengupta">S. Sengupta</name>
</author>
<author>
<name sortKey="Hripcsak, G" sort="Hripcsak, G" uniqKey="Hripcsak G" first="G." last="Hripcsak">G. Hripcsak</name>
</author>
<author>
<name sortKey="Ring, G" sort="Ring, G" uniqKey="Ring G" first="G." last="Ring">G. Ring</name>
</author>
<author>
<name sortKey="Klerer, R" sort="Klerer, R" uniqKey="Klerer R" first="R." last="Klerer">R. Klerer</name>
</author>
<author>
<name sortKey="Shea, S" sort="Shea, S" uniqKey="Shea S" first="S." last="Shea">S. Shea</name>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">PMC</idno>
<idno type="pmid">11825267</idno>
<idno type="pmc">2243694</idno>
<idno type="url">http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2243694</idno>
<idno type="RBID">PMC:2243694</idno>
<date when="2001">2001</date>
<idno type="wicri:Area/Pmc/Corpus">000215</idno>
<idno type="wicri:explorRef" wicri:stream="Pmc" wicri:step="Corpus" wicri:corpus="PMC">000215</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title xml:lang="en" level="a" type="main">Making grandma's data secure: a security architecture for home telemedicine.</title>
<author>
<name sortKey="Starren, J" sort="Starren, J" uniqKey="Starren J" first="J." last="Starren">J. Starren</name>
</author>
<author>
<name sortKey="Sengupta, S" sort="Sengupta, S" uniqKey="Sengupta S" first="S." last="Sengupta">S. Sengupta</name>
</author>
<author>
<name sortKey="Hripcsak, G" sort="Hripcsak, G" uniqKey="Hripcsak G" first="G." last="Hripcsak">G. Hripcsak</name>
</author>
<author>
<name sortKey="Ring, G" sort="Ring, G" uniqKey="Ring G" first="G." last="Ring">G. Ring</name>
</author>
<author>
<name sortKey="Klerer, R" sort="Klerer, R" uniqKey="Klerer R" first="R." last="Klerer">R. Klerer</name>
</author>
<author>
<name sortKey="Shea, S" sort="Shea, S" uniqKey="Shea S" first="S." last="Shea">S. Shea</name>
</author>
</analytic>
<series>
<title level="j">Proceedings of the AMIA Symposium</title>
<idno type="ISSN">1531-605X</idno>
<imprint>
<date when="2001">2001</date>
</imprint>
</series>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<textClass></textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">
<p>Home telemedicine presents special challenges for data security and privacy. Experience in the Informatics for Diabetes Education And Telemedicine (IDEATel) project has demonstrated that data security is not a one-size-fits-all problem. The IDEATel users include elderly patients in their homes, nurse case managers, physicians, and researchers. The project supports multiple computer systems that require a variety of user interactions, including: data entry, data review, patient education, videoconferencing, and electronic monitoring. To meet these various needs, a number of different of security solutions were utilized, including: UserID/Password, PKI certificates, time-based tokens, IP filtering, VPNs, symmetric and asymmetric encryption schemes, firewalls and dedicated connections. These were combined in different ways to meet the needs of each user groups.</p>
</div>
</front>
</TEI>
<pmc article-type="research-article">
<pmc-comment>The publisher of this article does not allow downloading of the full text in XML form.</pmc-comment>
<front>
<journal-meta>
<journal-id journal-id-type="nlm-ta">Proc AMIA Symp</journal-id>
<journal-id journal-id-type="pmc">procamiasymp</journal-id>
<journal-title>Proceedings of the AMIA Symposium</journal-title>
<issn pub-type="ppub">1531-605X</issn>
<publisher>
<publisher-name>American Medical Informatics Association</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="pmid">11825267</article-id>
<article-id pub-id-type="pmc">2243694</article-id>
<article-id pub-id-type="pii">D010001466</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Research Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Making grandma's data secure: a security architecture for home telemedicine.</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname>Starren</surname>
<given-names>J.</given-names>
</name>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Sengupta</surname>
<given-names>S.</given-names>
</name>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Hripcsak</surname>
<given-names>G.</given-names>
</name>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Ring</surname>
<given-names>G.</given-names>
</name>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Klerer</surname>
<given-names>R.</given-names>
</name>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Shea</surname>
<given-names>S.</given-names>
</name>
</contrib>
</contrib-group>
<aff>Department of Medical Informatics, Columbia University, New York, NY, USA.</aff>
<pub-date pub-type="ppub">
<year>2001</year>
</pub-date>
<fpage>657</fpage>
<lpage>661</lpage>
<abstract>
<p>Home telemedicine presents special challenges for data security and privacy. Experience in the Informatics for Diabetes Education And Telemedicine (IDEATel) project has demonstrated that data security is not a one-size-fits-all problem. The IDEATel users include elderly patients in their homes, nurse case managers, physicians, and researchers. The project supports multiple computer systems that require a variety of user interactions, including: data entry, data review, patient education, videoconferencing, and electronic monitoring. To meet these various needs, a number of different of security solutions were utilized, including: UserID/Password, PKI certificates, time-based tokens, IP filtering, VPNs, symmetric and asymmetric encryption schemes, firewalls and dedicated connections. These were combined in different ways to meet the needs of each user groups.</p>
</abstract>
</article-meta>
</front>
</pmc>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/TelematiV1/Data/Pmc/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000215  | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Pmc/Corpus/biblio.hfd -nk 000215  | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Ticri/CIDE
   |area=    TelematiV1
   |flux=    Pmc
   |étape=   Corpus
   |type=    RBID
   |clé=     
   |texte=   
}}

Wicri

This area was generated with Dilib version V0.6.31.
Data generation: Thu Nov 2 16:09:04 2017. Site generation: Sun Mar 10 16:42:28 2024