{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:47:13Z","timestamp":1725472033115},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540467885"},{"type":"electronic","value":"9783540467908"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11896548_34","type":"book-chapter","created":{"date-parts":[[2006,10,18]],"date-time":"2006-10-18T06:02:49Z","timestamp":1161151369000},"page":"433-444","source":"Crossref","is-referenced-by-count":8,"title":["A Tag-Based Data Model for Privacy-Preserving Medical Applications"],"prefix":"10.1007","author":[{"given":"Surya","family":"Nepal","sequence":"first","affiliation":[]},{"given":"John","family":"Zic","sequence":"additional","affiliation":[]},{"given":"Frederic","family":"Jaccard","sequence":"additional","affiliation":[]},{"given":"Gregoire","family":"Kraehenbuehl","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"34_CR1","first-page":"161","volume":"37","author":"C.M. O\u2019Keefe","year":"2005","unstructured":"O\u2019Keefe, C.M., Greenfield, P., Goodchild, A.: A Decentralised Approach to Electronic Consent and Health Information Access Control. Journal of Research and Practice in Information Technology\u00a037(2), 161\u2013178 (2005)","journal-title":"Journal of Research and Practice in Information Technology"},{"key":"34_CR2","unstructured":"Chadwick, D., Mundy, D.: The secure electronic transfer of prescriptions. Healthcare Computing (2004)"},{"issue":"5","key":"34_CR3","doi-asserted-by":"crossref","first-page":"984","DOI":"10.1542\/peds.98.5.984","volume":"98","author":"Task Force on Medical Informatics","year":"1996","unstructured":"Task Force on Medical Informatics: Safeguard Needed in Transfer of Patient Data. Pediatrics\u00a098(5), 984\u2013986 (1996)","journal-title":"Pediatrics"},{"key":"34_CR4","doi-asserted-by":"crossref","unstructured":"Khayat, E.J., Abdallah, A.E.: A formal model for flat role-based access control. In: IEEE International Conference on Computer Systems and Applications, Tunisia (July 2003)","DOI":"10.1109\/AICCSA.2003.1227507"},{"key":"34_CR5","unstructured":"Evered, M., Bogeholz, S.: A case study in access control requirements for a health information system. In: Australasian Information Security Workshop 2004 (2004)"},{"key":"34_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1007\/3-540-45067-X_35","volume-title":"Information Security and Privacy","author":"J. Reid","year":"2003","unstructured":"Reid, J., Cheong, I., Henricksen, M., Smith, J.: A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol.\u00a02727, pp. 403\u2013415. Springer, Heidelberg (2003)"},{"key":"34_CR7","unstructured":"Stein, L.D.: The Electronic Medical Record: Promises and Threats. Web Journal\u00a02(3) (1997)"},{"issue":"9","key":"34_CR8","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1145\/383694.383712","volume":"44","author":"T. Huston","year":"2001","unstructured":"Huston, T.: Security Issues for Implementation of E-medical Records. Communication of the ACM\u00a044(9), 89\u201394 (2001)","journal-title":"Communication of the ACM"},{"key":"34_CR9","doi-asserted-by":"crossref","unstructured":"Choudhri, A., Kagal, L., Joshi, A., Finin, T., Yesha, Y.: PatientService: Electronic Patient Record Redaction and Delivery in Pervasive Environment. In: Fifth International Workshop on Enterprise Networking and Computing in Healthcare Industry (Healthcom 2003) (2003)","DOI":"10.1109\/HEALTH.2003.1218716"},{"issue":"3","key":"34_CR10","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1109\/TITB.2003.816562","volume":"7","author":"G.H.M.B. Motta","year":"2003","unstructured":"Motta, G.H.M.B., Furuie, S.S.: A Contextual Role-Based Access Control Authorization Model for Electronic Patient Record. IEEE Transactions on Information Technology in Biomedicine\u00a07(3), 202\u2013207 (2003)","journal-title":"IEEE Transactions on Information Technology in Biomedicine"},{"key":"34_CR11","doi-asserted-by":"publisher","first-page":"979","DOI":"10.1016\/S0950-5849(03)00097-1","volume":"45","author":"R. Crook","year":"2003","unstructured":"Crook, R., Ince, D., Nuseibeh, B.: Modelling access policies using roles in requirements engineering. Information and Software Technology\u00a045, 979\u2013991 (2003)","journal-title":"Information and Software Technology"},{"key":"34_CR12","unstructured":"OASIS. eXtensible Access Control Markup Language (XACML) Version 2.0 3 (2005), http:\/\/docs.oasis-open.org\/xacml\/2.0\/access_control-xacml-2.0-core-spec-os.pdf"},{"key":"34_CR13","unstructured":"Ashley, P., Hada, S., Karjoth, G., Powers, C., Schunter, M.: Enterprise Privacy Authorization Language (EPAL 1.1), IBM Technical Report (2003)"},{"key":"34_CR14","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/947380.947385","volume-title":"Proceedings of the 2003 ACM Workshop on Digital Rights Management, DRM 2003","author":"T.S. Messerges","year":"2003","unstructured":"Messerges, T.S., Dabbish, E.A.: Digital rights management in a 3G mobile phone and beyond. In: Proceedings of the 2003 ACM Workshop on Digital Rights Management, DRM 2003, Washington, DC, USA, October 27, pp. 27\u201338. ACM Press, New York (2003), http:\/\/doi.acm.org\/10.1145\/947380.947385"},{"key":"34_CR15","unstructured":"Open Mobile Alliance, DRM Architecture, version 2.0.6 (2004) OMA-DRM-ARCH-V2_0_6-20040820-C.zip at: http:\/\/www.openmobilealliance.org"}],"container-title":["Lecture Notes in Computer Science","Current Trends in Database Technology \u2013 EDBT 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11896548_34.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,7]],"date-time":"2024-02-07T17:20:23Z","timestamp":1707326423000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11896548_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540467885","9783540467908"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/11896548_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}