Figure 2From: Intelligent security and privacy solutions for enabling personalized telepathologyThe layered security modelBack to article page