<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>ORCID:</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Security of the Telemedicine System Information Infrastructure</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Aksinya V. Sokolova</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tatiana I. Buldakova</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Bauman Moscow State Technical University</institution>
          ,
          <addr-line>5/1 2nd Baymanskay ul., Moscow, 105005</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2021</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>The requirements for the security of telemedicine systems are considered. The assessment of the health status of a person with dementia is performed based on medical data that is registered by sensors and transmitted to a cloud-based medical information system. Based on the data obtained, the attending physician forms recommendations. Because medical consultations are provided at a distance, there is a need to ensure the reliability of storing and transmitting the patient's medical data. The solutions and methods of protecting the transmitted data that help bringing the developed telemedicine system to the required security standards are determined. It is noted that the presented methods are necessary, but insufficient and additional methods of protecting the transmitted data are required.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Telemedicine</kwd>
        <kwd>network access</kwd>
        <kwd>information infrastructure</kwd>
        <kwd>data protection</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Improvements in the health sector contribute to the fact that people's lives become longer and
healthier. The most popular direction of healthcare today is telemedicine. Within the framework of this
direction, many telemedicine systems are being created that can improve the quality and speed of
receiving medical care through remote interaction with a doctor.</p>
      <p>Telemedicine is a developing type of information technology that does not have many years of
experience. Therefore, some users may be suspicious of telemedicine systems. In addition, some people
are concerned about the safety of information about their medical records, but they will not avoid using
the health system because of these problems. However, for some users, especially doctors, this is the
reason that they do not want to use virtual health at all. That is why the security of the telemedicine
network is an important task.</p>
      <p>
        Taking the described steps to strengthen security in telemedicine is a complex challenge
encompassing clinical technology, digital technology and legal compliance [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Answering that
challenge will require provider organizations to offer innovative new services, protect data, and develop
new applications, business processes, and cloud strategies all at once. And of course, this entire
undertaking is only one of the competing investment needs a provider must balance.
      </p>
      <p>
        Using telemedicine technologies in the provision of medical care is carried out in compliance with
the requirements established by the legislation of the Russian Federation in the field of personal data
and compliance with medical secrecy. However, because the medical consultation is carried out in a
remote format, there is a risk of non-compliance with medical secrecy – the patient's medical data may
end up with third parties. To avoid this, the telemedicine system needs to ensure data protection when
transferring them between the patient and the doctor and storing them in the system [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>This article will identify the requirements for telemedicine systems security and their
implementation on the example of a telemedicine system being developed that can assess people's with
dementia conditions.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Telemedicine system architecture</title>
      <p>
        The developed telemedicine system is presented as a client-server application. It will allow the
patient to communicate with the doctor, providing the system with different research results which are
necessary for the diagnosis of dementia. It is assumed that the system will process the research results
received from the patient and provide this information to the attending physician [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. In addition to
research, the patient can take neuropsychological tests, which are an effective tool for detecting
dementia. In turn, the doctor, using the results of the study and tests, will be able to more accurately
diagnose dementia if it is present and form individual recommendations for the treatment and support
of the patient's condition, based on the received anamnesis. The system makes it easier and faster to
process medical data in order to identify dementia as early as possible and already start planning
therapy, which will be more effective in the early stages.
      </p>
      <p>The developed system is planned to be used as an assistant to facilitate and accelerate the processing
of patient tests by a doctor remotely. Its structure is shown in Figure 1.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Telemedicine system security law</title>
      <p>
        To ensure that the telemedicine system meets all the requirements of the Ministry of Health, it is
necessary to carry out measures to ensure the security of information systems [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. The requirements for
information security are supplemented by the need to comply with Federal Law 187-FZ "On the
Security of the Critical Information Infrastructure of the Russian Federation".
      </p>
      <p>Based on the regulatory documents, the main security measures that should be implemented in the
telemedicine system were identified:</p>
      <p>An example of a bulleted list is as follows.
• prevention of unauthorized access to information, its modification, blocking, copying,
provision and distribution (exclusion of access to unauthorized users);
• the possibility of access to personal medical information within the medical institution itself
should be limited and separated (management and differentiation of access to the system should be
carried out on the basis of user roles);
• the possibility of restoring the information infrastructure by creating and storing backups
(telemedicine systems should function in specialized internal networks, using a backup system in
case some of the data is lost);
• transfer of information to medical institutions or organizations only in encrypted form.</p>
      <p>Below are the solutions, the implementation of which will ensure that the system complies with the
listed safety standards.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Measures to ensure the security of the system</title>
      <p>Since telemedicine systems deal with personal medical data of patients, it is necessary to apply
measures to ensure their protection in order to comply with medical secrecy.</p>
      <p>The primary task of data security is the need to protect the personal account of the telemedicine
system. In addition, patients should be sure that only their attending physicians have access to their
medical data.</p>
      <p>There are several ways to organize such protection. A role-based access control model is configured
for the system, which distributes the existing functionality according to the roles of the system users.
And the use of Multifactor authentication allows you to minimize the risk of authorization of persons
who do not have permission to access the system.</p>
      <p>
        The second task is to control system vulnerabilities with a resource that ensures the operability of
the service itself. This will prevent possible threats and speed up the time to eliminate the vulnerability
that has arisen. Also, do not forget about data protection during their transfer, in such a task,
depersonalization of data will be a good solution. Even if a hacker can get hold of the data, he will not
have the opportunity to understand who this data belongs to [
        <xref ref-type="bibr" rid="ref5 ref6 ref7">5-7</xref>
        ].
4.1.
      </p>
    </sec>
    <sec id="sec-5">
      <title>Role-based access control</title>
      <p>
        Role-based access control (RBAC) refers to the idea of assigning permissions to users based on their
role within a clinic. It offers a simple, manageable approach to access management that is less prone to
error than assigning permissions to users individually. Also, RBAC helps to comply more effectively
with regulatory and statutory requirements for confidentiality and privacy [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>The main task of a telemedicine system data transfer security is to ensure the protection of the
personal account of the system users. It is assumed that only the patient, the patient's representative, the
consultant doctor, the staff of the medical institution, as well as the system administrator can log in
[910]. In this regard, five roles were implemented based on the functional model of the system, which
have the following properties (Table 1).</p>
      <sec id="sec-5-1">
        <title>Adding</title>
        <p>information</p>
      </sec>
      <sec id="sec-5-2">
        <title>Editing</title>
        <p>information</p>
      </sec>
      <sec id="sec-5-3">
        <title>Viewing</title>
        <p>information</p>
      </sec>
      <sec id="sec-5-4">
        <title>Creating medical recommendations for a patient</title>
        <p>+
+
+
+
+</p>
        <p>
          Working with the system's functionality falls on a web application, after logging in to which the user
opens all the functionality provided for his role. This role model allows audit of user privileges and
correct identified issues easily, quickly add and change roles, and realize primary functions [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
4.2.
        </p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Identification of the system user</title>
      <p>Identification is the starting point for ensuring access security, especially for telemedicine systems.
The virtual system being developed requires proof of identity. With so much sensitive medical data
stored within a telemedicine infrastructure, it is critical to be able to tell users apart with the same degree
of accuracy as it is possible with physical identities.</p>
      <p>When a telemedicine system is deployed, the primary goal is to correctly and with the highest
confidence level identify each user wishing to connect to the system. Therefore, users are given unique
identifiers and are known by these personal credentials: their username and password.</p>
      <p>
        Nowadays, the stealing of user credentials is all too common. Simple credentials on their own are
not sufficient to keep a network secure, as it leaves a system vulnerable to dishonest users laying claim
to somebody else's identity. Accurate, reliable identification of users is key to enforcing security
policies and protecting data, and this is why every system user needs to authenticate [
        <xref ref-type="bibr" rid="ref12 ref13">12, 13</xref>
        ].
      </p>
    </sec>
    <sec id="sec-7">
      <title>4.2.1. Multifactor authentication</title>
      <p>When delivering virtual health, a health care professional must be confident the people on the other
end of the line are really who they say they are. Multifactor authentication (MFA) is the way to confirm
patient identity over digital channels. MFA can be expanded with biometrics (touch or facial recognition
in a mobile application), short message service texts, or device fingerprinting. For patients, an additional
benefit of MFA is that it can remove the need for a password as part of using a telemedicine system
[14].</p>
      <p>MFA works by requiring additional verification information (factors). One of the most common
MFA factors that users encounter is receiving a is a one-time password (OTP) via SMS. But SMS is
not a safe way to transfer personal data. Intruders can intercept SMS messages using vulnerabilities in
the SIM card itself or in the phone. In that case, it is better to generate OTP using special physical OTP
tokens. They create a six-digit code periodically, every 30 seconds. The code is generated based upon
a seed value that is assigned to the user when they first register and some other factor which could
simply be a counter that is incremented or a time value [15].</p>
      <p>The developed telemedicine system is based on the following algorithm. A user is entering username
and password, and then he must enter a twelve-character code that consists of two parts – a stable code
and a code generated by OTP token (Figure 2). If the code matches, the user can start work with the
system.</p>
    </sec>
    <sec id="sec-8">
      <title>4.2.2. Electronic digital signature</title>
      <p>Since medical services in telemedicine are provided at a distance, there is a need to switch to
electronic document management. The patient or his legal representative will be able, upon request,
including in electronic form, to receive medical documents reflecting the state of his health, including
extracts from them, and copies of medical records, in the form of electronic documents signed with an
enhanced qualified electronic signature of the doctor [16].</p>
      <p>An electronic digital signature (EDS), a cryptographic software that provides a high degree of data
protection, allows you to identify the system user who signed the document.</p>
      <p>As an algorithm for an electronic signature, a public-key encryption method is used, in which a pair
of keys – public and private-is selected in a particular way for the user (Figure 3). At the same time, the
key selection algorithms ensure that only those documents that were encrypted with the corresponding
private key can be decrypted with a public key. Thus, if the public key of the EDS owner is known and
the document received from him was decrypted, then it is worth asserting that the user is identified [17].</p>
      <p>EDS provides a high degree of data protection and allows you to exclude the possibility of
unauthorized access to the system. Therefore, each user of the system must have a certificate and an
electronic signature key in order to be able to use telemedicine services.
4.3.</p>
    </sec>
    <sec id="sec-9">
      <title>Intrusion Detection System</title>
      <p>Wireless Sensor Networks (WSNs) can be defined as self-configured and infrastructure-less wireless
networks to monitor physical conditions, such as temperature, sound, vibration, pressure or motion and
to cooperatively pass their data through the network to the main location or sink where the data can be
observed and analyzed [18]. WSNs are subject to several types of security attacks at various levels due
to an open wireless channel, a decentralized architecture, and deployment in physically unprotected
zones.</p>
      <p>The developed telemedicine system of assessing the condition of people with dementia contains
several parts. The part of the system, which helps to collect medical data from body sensors, is a kind
of WSNs - Wireless Body Area Network (WBAN). It is a network focused on the human body, which
is formed by connecting body sensors. The network is able to continuously monitor various
physiological parameters of the human body (pulse, body temperature, blood pressure,
electroencephalogram (EEG) and electrocardiogram (ECG), as well as the state of body movement [19,
20]. Data from the network sensors is transmitted to the controller (Figure 4). It is considered the central
command post of a wireless body network. After receiving the data, he pre-processes and sends it to a
remote server via a network gateway.</p>
      <p>Today, a wide range of penetration detection products are available, addressing a wide range of
security purposes. One of them is the Intrusion Detection System (IDS), the main function of which is
to monitor network behavior and user actions at different network levels.</p>
      <p>An Intrusion Detection System (IDS) is software, based on an application designed to monitor
computer or network activity in order to detect any unauthorized actions of intruders and protect
information systems in the WSNs. Monitoring network behavior and user actions at different levels is
the primary function of IDS [21].</p>
      <p>Intrusion detection systems are divided into two main types: network-based intrusion detection
systems (NIDS) and host-based intrusion detection systems (HIDS). In a Figure 5 you can see the
difference between this types of intrusion detection systems.</p>
      <p>The NIDS (Network Intrusion Detection System) technology makes it possible to install the system
in strategically important places of the network and analyze the incoming/outgoing traffic of all network
devices. NIDS analyze traffic at a deep level, "looking" into each packet from the channel layer to the
application layer. NIDS detects any malicious network activity using devices on the network card. The
devices used are passive network sensors that are specially designed to monitor suspicious activity. It
checks the moving traffic on the subnet and compares the traffic transmitted over the subnets with the
library of identified attacks. If an attack is detected or if any suspicious activity is detected, a warning
is sent to the administrator.</p>
      <p>NIDS differs from a firewall in that the firewall captures only attacks coming from outside the
network, while NIDS can also detect an internal threat.</p>
      <p>Network intrusion detection systems are a universal solution because they allow you to control the
entire network and not spend money on additional solutions. But this solution has a significant
drawback: NIDS consumes many resources to track all network traffic. CPU and RAM. This leads to
noticeable delays in data exchange and a decrease in network speed. And you also need to be prepared
for the fact that with large amounts of information, NIDS will be forced to skip some packets, which
makes the network vulnerable.</p>
      <p>HIDS (Host Intrusion Detection System) acts on the basis of information collected from individual
hosts, devices or servers, and not from the entire network, and detects and monitors any visual activity
and notifies the administrator. It is a software-based software application and provides deep visibility
of a critical security system. HIDS also analyze all incoming and outgoing packets, but only for one
device.</p>
      <p>The HIDS system works on the principle of creating snapshots of files: it takes a snapshot of the
current version and compares it with the previous one, thereby identifying possible threats. It is better
to install HIDS on critical machines in the network that rarely change the configuration.</p>
    </sec>
    <sec id="sec-10">
      <title>4.3.1. Deploying IDS</title>
      <p>After the NIDS are placed and functioning, the use of HIDS can additionally be considered to
increase the level of protection of the system. However, installing host intrusion detection systems on
each host of the network may require significant time costs. Therefore, it is recommended that HIDS
be installed on critical servers first of all. This can reduce the overall cost of deployment and will allow
you to focus on responding to alarms concerning the most important hosts. After host-based IDS have
started functioning normally, organizations with increased security requirements can discuss the
possibility of installing host-based IDS on other hosts.</p>
      <p>In the case of providing protection in a telemedicine system, the choice of the method of providing
protection was made in favour of HIDS systems that have centralized management and reporting
functions. Such features can significantly reduce the complexity of managing alarm messages from a
large number of hosts.</p>
      <p>It is also essential to set a schedule for checking IDS results since changing IDS settings during a
malicious attack [22].
4.4.</p>
    </sec>
    <sec id="sec-11">
      <title>Depersonalization of personal data</title>
      <p>Patients' health information plays a significant role in conducting medical research for improving
healthcare quality. Abrupt diagnosis and identification of certain diseases besides preventing
misdiagnosis leads to extensive societal and financial impact, obviously depicting the necessity for
efficient circulation of patient information among experts.</p>
      <p>However, disclosure of health information to researchers raises concerns about privacy
violations. A large volume of personal data (PD) of various security classes is processed in modern
automated systems. Provision of information security requires significant material costs. For cost
minimization, the opportunity of personal data depersonalization in information systems is provided.
Depersonalized data is data stored in information systems in electronic form, the ownership of which
cannot be determined by a specific subject of personal data without additional information. Each data
type changes according to the rules that can be used in the code. For example, if the full name is replaced
with a random hash with special characters and numbers, then the first check of the correctness of the
data will immediately give an error in real testing.</p>
      <p>The following methods of depersonalization are among the most promising and convenient for
practical use [23].</p>
      <p>• introduction of identifiers – replacing part of the information with identifiers with the creation
of a table of matching identifiers to the source data;</p>
      <p>• changing the composition or semantics – changing the design or semantics of personal data by
replacing the results of statistical processing, generalization or deletion of part of the information;
• decomposition – splitting a set of personal data into several parts, followed by separate storage
of subsets;</p>
      <p>• shuffling – rearrangement of individual records and groups of records in the personal data array.</p>
      <p>It usually takes a long time to convert confidential personal data into the anonymous - confidential
sequence. It also has low resistance to attacks and has limits the process of working with a large amount
of personal data. At the same time, anonymous data are used for archival storage without a possibility
of confirming whether they are true and their analytical purposes. The most exciting things are methods
of depersonalization which allow dividing all data into two groups: confidential and anonymous, with
the possibility of checking their data in an anonymous form. It reduces the costs of creating an
information security system at the automation facility; that's why developing a method, an algorithm,
and a software module of personal data's depersonalization is an urgent scientific and technical task.</p>
    </sec>
    <sec id="sec-12">
      <title>4.4.1. Watermarking images</title>
      <p>Confidentiality, integrity and authenticity are of prime concern during transmission of medical
images through the public network and must be simultaneously satisfied. Confidentiality of the
transmitted medical images is ensured so that only authorized users can access them. Integrity validates
whether the digital medical image is intact or tampered with. Authenticity verifies whether the medical
image is from the correct source and belongs to the claimed patient. In the present scenario, the two
significant methodologies, i.e. cryptography and medical image watermarking, are used popularly to
meet these requirements.</p>
      <p>The use of watermarks allows to hide the user's personal information in the image belonging to him.</p>
      <p>The main preference when working with medical images is given to ensuring the security of the
patient's documents as opposed to actions on the part of illegal persons. Telemedicine systems,
including the one being developed, work with different data types, and it is important not to forget to
protect each type used [24].</p>
      <p>Regarding image protection, there are two designed watermark schemes for applying to medical
images: irreversible schemes and reversible schemes. Irreversible watermark schemes are not suitable
for use in the field of telemedicine, since changes caused by the procedure for applying watermarks to
images entail irreversible functions that include bit exchange or truncation. In contrast, Reversible
watermarking schemes re-establish the watermarked images to their original pixel values, thus
permitting for exact diagnosis of medical.</p>
      <p>The information enclosed in the images is not equally disseminated across images. Certain parts of
the images comprise more information compared to other ones. Several schemes are practiced for
separating dissimilar objects/regions in images. From a diagnosis point of view, a medical image is
alienated into two regions; Region of Interest and Region of Non-Interest. The more useful and valuable
part of the medical image is the Region of Interest, which is used for the diagnosis and has to be taken
care of. Therefore, it is correct to insert the watermark in the Region of Non-Interest [25].</p>
    </sec>
    <sec id="sec-13">
      <title>5. Conclusion</title>
      <p>In the course of the work, the requirements for the security of telemedicine systems were considered,
various necessary security methods were analyzed.</p>
      <p>In practice, it was determined that the measures to organize the security of the system provided
access to the system only to authorized and verified users and also allowed for a secure document flow
between the patient and the staff of the medical institution providing consultations. And using
depersonalization of data, their protection will be ensured during transmission; if an attacker gets hold
of the data, he will not have the opportunity to understand who they belong to.</p>
      <p>The specified security requirements were met when designing the client-server architecture of the
system under development, internal services and database structure, as well as their normalization, and
actions were taken to manage vulnerabilities and maintain reports on all user actions in the system.</p>
      <p>The work showed the organization of security measures for a system capable of assessing the
condition of people with dementia, but these measures will be relevant for all telemedicine systems
[26].</p>
    </sec>
    <sec id="sec-14">
      <title>6. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>S.</given-names>
            <surname>Suyatinov</surname>
          </string-name>
          .
          <article-title>Bernstein's Theory of Levels and Its Application for Assessing the Human Operator State</article-title>
          . In: Dolinina O. at al. (Eds.)
          <article-title>Recent Research in Control Engineering and Decision Making. ICIT-2019</article-title>
          .
          <article-title>Studies in Systems, Decision and Control</article-title>
          . Vol.
          <volume>199</volume>
          , Springer, Cham,
          <year>2019</year>
          , pp.
          <fpage>298</fpage>
          -
          <lpage>312</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -12072-6_
          <fpage>25</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>R.</given-names>
            <surname>Maximov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Sokolovsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Telenga</surname>
          </string-name>
          .
          <article-title>Model of client-server information system functioning in the conditions of network reconnaissance</article-title>
          .
          <source>CEUR Workshop Proceedings. Vol2603</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>44</fpage>
          -
          <lpage>51</lpage>
          . URL: http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2603</volume>
          /short1.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Pijush</given-names>
            <surname>Kanti Dutta Pramanik</surname>
          </string-name>
          , Gaurav Pareek,
          <string-name>
            <given-names>Anand</given-names>
            <surname>Nayyar</surname>
          </string-name>
          .
          <article-title>Security and Privacy in Remote Healthcare: Issues, Solutions, and</article-title>
          <string-name>
            <given-names>Standards.Telemedicine</given-names>
            <surname>Technologies</surname>
          </string-name>
          <article-title>: big data, deep learning, robotics, mobile and remote applications for global healthcare</article-title>
          ,
          <year>2019</year>
          , pp.
          <fpage>201</fpage>
          -
          <lpage>225</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>T.</given-names>
            <surname>Buldakova</surname>
          </string-name>
          and
          <string-name>
            <given-names>D.</given-names>
            <surname>Krivosheeva</surname>
          </string-name>
          .
          <article-title>Data Protection During Remote Monitoring of Person's State</article-title>
          . In: Dolinina O. at al. (Eds.)
          <article-title>Recent Research in Control Engineering and Decision Making. ICIT-2019</article-title>
          .
          <article-title>Studies in Systems, Decision and Control</article-title>
          . Vol.
          <volume>199</volume>
          , Springer, Cham,
          <year>2019</year>
          , pp.
          <fpage>3</fpage>
          -
          <lpage>14</lpage>
          . https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -12072-
          <issue>6</issue>
          _
          <fpage>1</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>R.</given-names>
            <surname>Anderson</surname>
          </string-name>
          .
          <article-title>Security Engineering: A Guide to Building Dependable Distributed Systems</article-title>
          , 3nd. ed., Wiley, New York, NY,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.</given-names>
            <surname>Appari</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.E.</given-names>
            <surname>Johnson</surname>
          </string-name>
          . Information Security and Privacy in Healthcare: Current State of Research.
          <source>International Journal of Internet and Enterprise Management</source>
          . Vol.
          <volume>6</volume>
          (
          <issue>4</issue>
          ),
          <year>2010</year>
          , pp.
          <fpage>279</fpage>
          -
          <lpage>314</lpage>
          .
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>V.</given-names>
            <surname>Varenitca</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Markov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Savchenko</surname>
          </string-name>
          .
          <article-title>Recommended Practices for the Analysis of Web Application Vulnerabilities</article-title>
          .
          <source>CEUR Workshop Proceedings</source>
          . Vol-
          <volume>2603</volume>
          ,
          <year>2019</year>
          , pp.
          <fpage>75</fpage>
          -
          <lpage>78</lpage>
          . URL: http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2603</volume>
          /short1.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Auth0</given-names>
            <surname>Documentation</surname>
          </string-name>
          .
          <source>Role-Based Access Control</source>
          .
          <year>2021</year>
          . URL: https://auth0.com/docs/authorization/rbac
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>T.I.</given-names>
            <surname>Buldakova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.V.</given-names>
            <surname>Sokolova</surname>
          </string-name>
          .
          <article-title>Network Services for Interaction of the Telemedicine System Users</article-title>
          .
          <source>Proceedings of 1st International Conference on Control Systems, Mathematical Modelling, Automation and Energy Efficiency (SUMMA)</source>
          .
          <year>2019</year>
          , pp.
          <fpage>387</fpage>
          -
          <lpage>391</lpage>
          . doi:0.1109/SUMMA48161.
          <year>2019</year>
          .
          <volume>8947552</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>T.</given-names>
            <surname>Buldakova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Krivosheeva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Suyatinov</surname>
          </string-name>
          .
          <article-title>Hierarchical Model of the Network Interaction Representation in the Telemedicine System</article-title>
          .
          <source>XXI International Conference Complex Systems: Control and Modeling Problems (CSCMP)</source>
          , Samara, Russia,
          <year>2019</year>
          , pp.
          <fpage>379</fpage>
          -
          <lpage>383</lpage>
          . doi:
          <volume>10</volume>
          .1109/CSCMP45713.
          <year>2019</year>
          .
          <volume>8976743</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>T.I.</given-names>
            <surname>Buldakova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.V.</given-names>
            <surname>Lantsberg</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.I.</given-names>
            <surname>Suyatinov</surname>
          </string-name>
          <article-title>. Multi-Agent Architecture for Medical Diagnostic Systems</article-title>
          .
          <source>Proceedings - 2019 1st International Conference on Control Systems, Mathematical Modelling, Automation and Energy Efficiency (SUMMA)</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>344</fpage>
          -
          <lpage>348</lpage>
          . doi:
          <volume>10</volume>
          .1109/SUMMA48161.
          <year>2019</year>
          .
          <volume>8947489</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>Wallix</given-names>
            <surname>Cybersecurity</surname>
          </string-name>
          . Identify, Authenticate,
          <source>Authorise: The Three Key Steps in Access Security</source>
          ,
          <year>2019</year>
          . URL: https://www.wallix.com/blog/identify-authenticate
          <article-title>-authorize-the-threekey-steps-in-access-security/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>H.</given-names>
            <surname>Cai</surname>
          </string-name>
          and
          <string-name>
            <given-names>K.K.</given-names>
            <surname>Venkatasubramanian</surname>
          </string-name>
          .
          <source>Patient Identity Verification Based on Physiological Signal Fusion</source>
          .
          <source>2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)</source>
          , Philadelphia, PA,
          <year>2017</year>
          , pp.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          90-
          <fpage>95</fpage>
          . doi:
          <volume>10</volume>
          .1109/CHASE.
          <year>2017</year>
          .
          <volume>65</volume>
          .
          <string-name>
            <surname>Deloitte</surname>
          </string-name>
          ,
          <source>Telemedicine privacy risks and security considerations</source>
          ,
          <year>2019</year>
          . URL: https://www2.deloitte.com/us/en/pages/advisory/articles/telemedicine-privacy
          <article-title>-risks-securityconsiderations.html Onelogin, What is Multi-Factor Authentication (MFA) and</article-title>
          How Does it Work?,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          URL: https://www.onelogin.com/learn/what-is-mfa Asma Jebrane,
          <string-name>
            <given-names>N.</given-names>
            <surname>Meddah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Toumanari</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Bousseta New Real Time Cloud Telemedicine Using Digital Signature Algorithm on Elliptic Curves</article-title>
          .
          <source>International Conference on Advanced Information Technology, Services and Systems (AIT2S)</source>
          <year>2017</year>
          :
          <article-title>Advanced Information Technology</article-title>
          ,
          <source>Services and Systems</source>
          ,
          <year>2017</year>
          , pp
          <fpage>324</fpage>
          -
          <lpage>332</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          - 69137-4_29
          <string-name>
            <given-names>A I</given-names>
            <surname>Dzhangarov</surname>
          </string-name>
          ,
          <article-title>M A Suleymanova</article-title>
          .
          <article-title>Electronic digital signature</article-title>
          .
          <source>IOP Conference Series Materials Science and Engineering</source>
          , Vol.
          <volume>862</volume>
          ,
          <year>2020</year>
          . doi:
          <volume>10</volume>
          .1088/
          <fpage>1757</fpage>
          -899X/862/5/052054 M.A.
          <string-name>
            <surname>Matin</surname>
            ,
            <given-names>M.M.</given-names>
          </string-name>
          <string-name>
            <surname>Islam</surname>
          </string-name>
          .
          <article-title>Overview of Wireless Sensor Network</article-title>
          .
          <source>Wireless Sensor Networks - Technology and Protocols</source>
          ,
          <year>2012</year>
          . doi:
          <volume>10</volume>
          .5772/49376 S.
          <article-title>-</article-title>
          <string-name>
            <surname>J. Lee</surname>
            ,
            <given-names>G.-Y.</given-names>
          </string-name>
          <string-name>
            <surname>Cho</surname>
            , and
            <given-names>T.-R.</given-names>
          </string-name>
          <string-name>
            <surname>Lee</surname>
            .
            <given-names>N-WRETS</given-names>
          </string-name>
          :
          <article-title>Near-Lossless Wireless Real-time Efficient Electroencephalogram Transmission Solution to Support Sleep Disorder Monitoring Platforms</article-title>
          . Telemedicine and e-Health. Vol.
          <volume>25</volume>
          , no.
          <issue>2</issue>
          ,
          <issue>2019</issue>
          , pp.
          <fpage>116</fpage>
          -
          <lpage>125</lpage>
          .
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <source>doi:10</source>
          .1089/tmj.
          <year>2017</year>
          .0279.
          <string-name>
            <surname>T.I. Buldakova</surname>
            ,
            <given-names>A.V.</given-names>
          </string-name>
          <string-name>
            <surname>Sokolova</surname>
          </string-name>
          .
          <article-title>Structuring Information about the State of the CyberPhysical System Operator</article-title>
          .
          <source>International Conference on Information Technologies in Engineering Education (Inforino)</source>
          , Moscow, Russia,
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <source>doi:10.1109/Inforino48376</source>
          .
          <year>2020</year>
          .9111654.
          <string-name>
            <surname>J. Veeramreddy</surname>
            ,
            <given-names>K. M.</given-names>
          </string-name>
          <string-name>
            <surname>Prasad</surname>
          </string-name>
          .
          <article-title>Anomaly-Based Intrusion Detection System</article-title>
          . Computer and Network Security.
          <source>IntechOpen</source>
          <year>2020</year>
          , pp.
          <fpage>40</fpage>
          -
          <lpage>55</lpage>
          . doi:
          <volume>10</volume>
          .5772/intechopen.82287
          <string-name>
            <given-names>E. M.</given-names>
            <surname>Rajaallah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Chamkar</surname>
          </string-name>
          , S. Ain El Hayat.
          <article-title>Intrusion Detection Systems: To an Optimal Hybrid Intrusion Detection System</article-title>
          .
          <source>International Conference on Advanced Information Technology, Services and Systems (AIT2S) 2018: Smart Data and Computational Intelligence</source>
          ,
          <year>2018</year>
          , pp
          <fpage>284</fpage>
          -
          <lpage>296</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -11914-0_30
          <string-name>
            <given-names>D. V.</given-names>
            <surname>Primenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. G.</given-names>
            <surname>Spevakov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. V.</given-names>
            <surname>Spevakova</surname>
          </string-name>
          .
          <source>Depersonalization of Personal Data in Information Systems. Proceedings of the International Russian Automation Conference</source>
          , RusAutoCon.
          <year>2019</year>
          , pp.
          <fpage>763</fpage>
          -
          <lpage>770</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -39225-3_83 Priyanka &amp; Sushila
          <string-name>
            <surname>Maheshkar</surname>
          </string-name>
          .
          <article-title>Region-based hybrid medical image watermarking for secure telemedicine applications</article-title>
          .
          <source>Multimedia Tools and Applications</source>
          , Vol.
          <volume>76</volume>
          ,
          <year>2017</year>
          , pp.
          <fpage>3617</fpage>
          -
          <lpage>3647</lpage>
          . doi:
          <volume>10</volume>
          .1007/s11042-016-3913-1
          <string-name>
            <given-names>K.</given-names>
            <surname>Swaraja</surname>
          </string-name>
          .
          <article-title>Medical image region based watermarking for secured telemedicine</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <source>Multimedia Tools and Applications</source>
          . Vol.
          <volume>77</volume>
          (
          <issue>2</issue>
          ),
          <year>2018</year>
          , pp.
          <fpage>28249</fpage>
          -
          <lpage>28280</lpage>
          . doi:
          <volume>10</volume>
          .1007/s11042- 018-6020-7
          <string-name>
            <surname>Buldakova</surname>
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lantsberg</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smolyaninova</surname>
            <given-names>K. Security</given-names>
          </string-name>
          <article-title>Threats in Systems of the Remote Monitoring</article-title>
          .
          <source>Voprosy kiberbezopasnosti [Cybersecurity issues]</source>
          .
          <source>2017, Nо</source>
          <volume>4</volume>
          (
          <issue>22</issue>
          ), pp.
          <fpage>40</fpage>
          -
          <lpage>46</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <source>DOI: 10</source>
          .21681/
          <fpage>2311</fpage>
          -3456-2017-4-
          <fpage>40</fpage>
          -46.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>