Data Acquisition in a PACS Weina Ma Sep 24 th, 2013.

Slides:



Advertisements
Similar presentations
Web Hosting. The purpose of this Startup Guide is to familiarize you with Own Web Now's Web Hosting. Own Web Now offers two web hosting platforms, one.
Advertisements

Philips iSite 3.5 Administration
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
A CHAT CLIENT-SERVER MODULE IN JAVA BY MAHTAB M HUSSAIN MAYANK MOHAN ISE 582 FALL 2003 PROJECT.
A Guide to Oracle9i1 Introduction To Forms Builder Chapter 5.
(Remote Access Security) AAA. 2 Authentication User named "flannery" dials into an access server that is configured with CHAP. The access server will.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
Definitions, Definitions, Definitions Lead to Understanding.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Boris Tshibangu. What is a proxy server? A proxy server is a server (a computer system or an application) that acts as an intermediary for requests from.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
Overview What are the provisioning methods used in the Australian registry system? How are these provisioning systems secured?
Smart Card Single Sign On with Access Gateway Enterprise Edition
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
The Design Discipline.
JMU GenCyber Boot Camp Summer, Network Sniffing Sometimes it is possible observe/record traffic traveling on a network Network traffic may contain.
DEMIGUISE STORAGE An Anonymous File Storage System VIJAY KUMAR RAVI PRAGATHI SEGIREDDY COMP 512.
思科网络技术学院理事会. 1 Application Layer Functionality and Protocols Network Fundamentals – Chapter 3.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
FTP (File Transfer Protocol) & Telnet
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
What’s New? – BCS 2013 Brett Lonsdale.  Co-founder of Lightning Tools  One of the hosts on the SharePoint Pod Show  Co-organizer of SharePoint Saturday.
World Wide Web Hypertext model Use of hypertext in World Wide Web (WWW) WWW client-server model Use of TCP/IP protocols in WWW.
DICOM Singapore Seminar:
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Troubleshooting Windows Vista Security Chapter 4.
Web HTTP Hypertext Transfer Protocol. Web Terminology ◘Message: The basic unit of HTTP communication, consisting of structured sequence of octets matching.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 Securing a Microsoft ASP.NET Web Application.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
POSTER TEMPLATE BY: Whitewater HTTP Vulnerabilities Nick Berry, Joe Joyce, & Kevin Vaccaro. Syntax & Routing Attempt to capture.
Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Computer Emergency Notification System (CENS)
1 Welcome to CSC 301 Web Programming Charles Frank.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Key Management. Given a computer network with n hosts, for each host to be able to communicate with any other host would seem to require as many as n*(n-1)
Integrating and Troubleshooting Citrix Access Gateway.
© 2010 Computer Science Faculty, Kabul University HTTP CONTINUED… 4 TH LECTURE 2, May, 2010 Baseer Ahmad Baheer.
1 Installing and Maintaining ISA Server Planning an ISA Server Deployment Understand the current network infrastructure. Review company security.
Computer Networking.  The basic tool for observing the messages exchanged between executing protocol entities  Captures (“sniffs”) messages being sent/received.
Implementing ISA Server Caching
Monitoring Troubleshooting TCP/IP Chapter 3. Objectives for this Chapter Troubleshoot TCP/IP addressing Diagnose and resolve issues related to incorrect.
Module 10: Windows Firewall and Caching Fundamentals.
Chapter 5 Introduction To Form Builder. Lesson A Objectives  Display Forms Builder forms in a Web browser  Use a data block form to view, insert, update,
RADIUS What it is Remote Authentication Dial-In User Service
1 State and Session Management HTTP is a stateless protocol – it has no memory of prior connections and cannot distinguish one request from another. The.
When you run a scenario, the Vusers on each host machine use the host’s IP address. You can define multiple IP addresses on a host machine to emulate a.
COMP2322 Lab 1 Introduction to Wireshark Weichao Li Jan. 22, 2016.
TOOLS FOR PROXYING. Tools for Proxying Many available applications provide proxy capabilities. The major commercial vendors have embraced hybrid technologies.
DHCP Vrushali sonar. Outline DHCP DHCPv6 Comparison Security issues Summary.
Integrating the Healthcare Enterprise Improving Clinical Care: Enterprise User Authentication For IT Infrastructure Robert Horn Agfa Healthcare.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
WREC Working Group IETF 49, San Diego Co-Chairs: Mark Nottingham Ian Cooper WREC Working Group.
1 Example security systems n Kerberos n Secure shell.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
11 DEPLOYING AN UPDATE MANAGEMENT INFRASTRUCTURE Chapter 6.
Architecture Review 10/11/2004
Module 3: Enabling Access to Internet Resources
Lesson 6: Configuring Servers for Remote Management
COMP2322 Lab 1 Wireshark Steven Lee Jan. 25, 2017.
COMP2322 Lab 2 HTTP Steven Lee Feb. 8, 2017.
Networks Problem Set 1 Due Oct 3 Bonus Date Oct 2
MICROSOFT Networking with Windows Server VCE
Chapter 3: Windows7 Part 4.
Mobile Agents.
Presentation transcript:

Data Acquisition in a PACS Weina Ma Sep 24 th, 2013

Problems about Data Acquisition How to capture messages in a PACS? Who is the users? What data is accessed? What is the operation on the data?

How to capture messages in a PACS? Network Analyzer Tools, like well-acceppted Wireshark? – Wireshark is based on WinPcap (Windows), which allows capturing, analyzing and even modifying network packages bypassing the protocol stack, but unable to block or redirect packages to a specified destination (e.g. another application or host). After acquisition the messages, we may change the destination, such as forwarding to common infrastructure for authentication (HIAL). – Network analyzer tool can’t address our problem. Multiple Agents? – A proxy server (Intermediary Agent) can be deployed to acts as an intermediary between workstations, modalities and PACS servers (Exam Entry Point). – Intermediary agents provide exactly the same interface with existing DICOM server entry point, and can be inserted into existing PACS through reconfiguration instead of code level change.

CRMRIUSCT PACS Web Server Workstation Web Client Physicians Modalities Radiologist CRMRIUSCT PACS Web Server Workstation Web Client I-Agent Physicians I-Agent DICOM HTTP Modalities Radiologist DICOM Current PACS Agent Deployed

Who is the users? DICOM is based on client-server model. User is authenticated when launching the client application (e.g. display workstation), but the authenticated information is not transmitted between client and server (e.g. PACS Server). A new feature “User Identity Negotiation” (DICOM Part 7, D ) is added as an optional mechanism to send/receive username, username/password, Kerberos or SAML during DICOM association negotiation. The implementation of “User Identity Negotiation” is still rare for PACS. (e.g. dcm4chee supports it but Clear Canvas does not)

Who is the users? “Client Authentication Agent” is pre-installed software on each modality and workstation. When user wants to launch modality or workstation application (SCU), he has to input user name and password through agent’s guide, and then agent will transmit such information to server application (SCP) on behalf of client. There are two options for user identity: – Agent captures DICOM A-ASSOCIATE request sent by SCU, and then inserts user identity items into the DICOM message. – Agent also caches a list of authenticated users, with one record in the form of, representing all applications running on the host, and update them to intermediary agent positively or passively. Consequently, intermediary agent knows who is the user through checking the list by the key. When the user logoff application, client authentication agent should capture such event and contact intermediary agent to delete such entity.

Option1- User Identity Negotiation

Option2- Client Authentication Agent

What data is accessed? The accessed data can be extracted from DICOM message directly.

What is the operation on the data? The operation can be extracted from DICOM message directly.