{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T14:24:33Z","timestamp":1725459873109},"publisher-location":"Boston, MA","reference-count":10,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781402081460"},{"type":"electronic","value":"9781402081477"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/1-4020-8147-2_4","type":"book-chapter","created":{"date-parts":[[2006,2,20]],"date-time":"2006-02-20T11:57:38Z","timestamp":1140436658000},"page":"49-66","source":"Crossref","is-referenced-by-count":1,"title":["Smartcard-Based Anonymization"],"prefix":"10.1007","author":[{"given":"Anas Abou","family":"El Kalam","sequence":"first","affiliation":[]},{"given":"Yves","family":"Deswarte","sequence":"additional","affiliation":[]},{"given":"Gilles","family":"Trouessin","sequence":"additional","affiliation":[]},{"given":"Emmanuel","family":"Cordonnier","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"Directive 95\/46\/CE of the European Parliament and the Council of the European union: \u201cOn the protection of individuals\u201d; October 24, 1995."},{"key":"4_CR2","volume-title":"On The Protection of Medical Data Banks","author":"Recommendations R(97)5 of the Council of Europe","year":"1997","unstructured":"Recommendations R(97)5 of the Council of Europe, On The Protection of Medical Data Banks, Council of Europe, Strasbourg, 13 February 1997."},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"A. Pfitzmann, M. K\u00f6hntopp, \u201cdAnonimity, Unobservability, and Pseudonymity-A Proposal for Terminology\u201d, International Workshop on Design Issues in Anonymity and Unobservability, Berkley, CA, USA, July 25\u201326, 2000, Springer.","DOI":"10.1007\/3-540-44702-4_1"},{"key":"4_CR4","unstructured":"Trouessin, G (1999). \u201cDependanility Requirements and Security Architectures for Healthcare\/Medical Sector\u201d, 18\n                  th\n                  International Conference SAFECOMP\u201999, Toulouse, France, September 1999, Springer, pp. 445\u2013458."},{"issue":"3","key":"4_CR5","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1145\/356778.356782","volume":"11","author":"D. Denning et","year":"1979","unstructured":"D. Denning et P. Denning, \u201cData Security\u201d. ACM Computer Survey, vol. 11, no 3, September 1979, ACM Press, ISBN: 0360-0300, pp. 227\u2013249.","journal-title":"ACM Computer Survey"},{"key":"4_CR6","unstructured":"S. Castano, M. G. Fugini, G. Martella, P. Samarati, \u201cDatabase Security\u201d, 1995, ACM press, ISBN: 0201593750, 456 pp."},{"key":"4_CR7","unstructured":"A. Abou El Kalam, \u00abMod\u00e8les et politiques de s\u00e9curit\u00e9 pour les domaines de la sant\u00e9 et des affaires sociales\u00bb, Th\u00e8se de doctoral, Institut National Polytechnique de Toulouse, 190 pp., 4 December 2004."},{"key":"4_CR8","unstructured":"CEN\/TC 251\/WG I, Norme prENV 13606-3: Health Informatics-Electronic Healthcare Record Communication, no 99-046, Comit\u00e9 Europ\u00e9en de Normalisation, 27 May 1999."},{"key":"4_CR9","unstructured":"A. Abou El Kalam, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, R. El-Baida, A. Mi\u00e8ge, C. Saurel, G. Trouessin \u201cOrganization-Based Access Control\u201d, 4th International Workshop on Policies for Distributed Systems and Networks (Policy\u201903), Como, Italy, 4\u20136 June 2003, IEEE Computer Society Press, pp. 120\u2013131."},{"key":"4_CR10","unstructured":"A. Menezes, P. C. Van Oorshot, S. A. Vanstone, \u201cHandbook of Applied Cryptography\u201d, 1997, CRC press, ISBN: 0849385237, pp. 780."}],"container-title":["IFIP International Federation for Information Processing","Smart Card Research and Advanced Applications VI"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/1-4020-8147-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T13:43:34Z","timestamp":1558359814000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/1-4020-8147-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9781402081460","9781402081477"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/1-4020-8147-2_4","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2004]]}}}