We have located links that may give you full text access.
xPIPE--Reception of DICOM Data from any Sender via the Internet.
PURPOSE: Various technologies have been established for DICOM data exchange in radiology. In addition to the patient CD, online transfers via VPN (virtual private network) or DICOM email are common practice. However, dedicated network solutions are generally not appropriate for data exchange with occasional and spontaneous partners due to missing infrastructure at the partner institutions and/or complex setup procedures. The purpose was to develop a practical solution to complement the established technologies to allow users worldwide to transfer images without registration.
MATERIALS AND METHODS: The development of the xPIPE system is based on Java and various software libraries. A client hosted on a website enables sending DICOM data to a receiving system of the hospital.
RESULTS: The new xPIPE system creates a gateway to a receiving hospital which is accessible from any point worldwide, giving other hospitals, clinics and patients a simple and secure method to transmit DICOM data without intermediate storage on external servers.
CONCLUSION: The system was deployed at the University Hospital Münster and subsequently widely used even without information events and training. Data protection during transfer is ensured by the use of signatures and encryption. From the user's perspective the system has only minor technical requirements and can be used with minimal setup effort.
MATERIALS AND METHODS: The development of the xPIPE system is based on Java and various software libraries. A client hosted on a website enables sending DICOM data to a receiving system of the hospital.
RESULTS: The new xPIPE system creates a gateway to a receiving hospital which is accessible from any point worldwide, giving other hospitals, clinics and patients a simple and secure method to transmit DICOM data without intermediate storage on external servers.
CONCLUSION: The system was deployed at the University Hospital Münster and subsequently widely used even without information events and training. Data protection during transfer is ensured by the use of signatures and encryption. From the user's perspective the system has only minor technical requirements and can be used with minimal setup effort.
Full text links
Related Resources
Get seemless 1-tap access through your institution/university
For the best experience, use the Read mobile app
All material on this website is protected by copyright, Copyright © 1994-2024 by WebMD LLC.
This website also contains material copyrighted by 3rd parties.
By using this service, you agree to our terms of use and privacy policy.
Your Privacy Choices
You can now claim free CME credits for this literature searchClaim now
Get seemless 1-tap access through your institution/university
For the best experience, use the Read mobile app