{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T06:40:24Z","timestamp":1743576024829,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":53,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461436331"},{"type":"electronic","value":"9781461436348"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-1-4614-3634-8_5","type":"book-chapter","created":{"date-parts":[[2012,6,19]],"date-time":"2012-06-19T19:35:34Z","timestamp":1340134534000},"page":"75-113","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Security Model for Virtual Healthcare Communities"],"prefix":"10.1007","author":[{"given":"Anargyros","family":"Chryssanthou","sequence":"first","affiliation":[]},{"given":"Iraklis","family":"Varlamis","sequence":"additional","affiliation":[]},{"given":"Charikleia","family":"Latsiou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,5,23]]},"reference":[{"issue":"4","key":"5_CR1","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), 393\u2013422.","journal-title":"Computer Networks"},{"key":"5_CR2","doi-asserted-by":"crossref","first-page":"367","DOI":"10.4018\/978-1-60566-002-8.ch025","volume-title":"Handbook of research on distributed medical informatics and E-health","author":"I Apostolakis","year":"2009","unstructured":"Apostolakis, I., Chryssanthou, A., & Varlamis, I. (2009). A holistic perspective of security in health related virtual communities. In A. Lazakidou & K. Siassiakos (Eds.), Handbook of research on distributed medical informatics and E-health (pp. 367\u2013381). Hershey, PA: IGI Global."},{"key":"5_CR3","unstructured":"Article 29 Data Protection Working Party. (2010, February). Opinion 1\/2010 on the concepts of \u201ccontroller\u201d and \u201cprocessor\u201d. Brussels, Belgium."},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Becker, M. Y., Fournet, C., & Gordon, A. D. (2007, July 6\u20138). Design and semantics of a decentralized authorization language. In Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSF 07), Venice, Italy (pp. 3\u201315). Washington, DC: IEEE Computer Society.","DOI":"10.1109\/CSF.2007.18"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Becker, M. Y., & Sewell, P. (2004, June 28\u201330). Cassandra: Flexible trust management applied to electronic health records. In Proceedings of the 17th IEEE Workshop on Computer Security Foundations; Asilomar Conference Center, CA, USA, 2004 (pp. 139\u2013154). Washington, DC: IEEE.","DOI":"10.1109\/CSFW.2004.1310738"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Blaze, M., Kannan, S., Lee, I., Sokolsky, O., Smith, J. M., Keromytis, A. D., et al. (2009, February). Dynamic trust management. IEEE Computer Magazine, 42(2), 44\u201352.","DOI":"10.1109\/MC.2009.51"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Chryssanthou, A., Latsiou, C., & Varlamis, I. (2009, June 9\u201313). Security and trust in virtual healthcare communities. In Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments (PETRA 09), Corfu, Greece (pp. 1\u20138). New York: ACM Press.","DOI":"10.1145\/1579114.1579186"},{"issue":"1","key":"5_CR8","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1197\/jamia.M2016","volume":"15","author":"DW Curtis","year":"2008","unstructured":"Curtis, D. W., Pino, E. J., Bailey, J. M., Shih, E. I., Waterman, J., Vinterbo, S. A., et al. (2008). SMART \u2013 An integrated, wireless system for monitoring unattended patients. Journal of the American Medical Informatics Association, 15(1), 44\u201353.","journal-title":"Journal of the American Medical Informatics Association"},{"key":"5_CR9","unstructured":"Cyberinsecure.com. (2008, July 18). Asprox botnet mass attack hits governmental, healthcare, and top business websites [cited 2010 June 4]. Retrieved July 30, 2010, from http:\/\/cyberinsecure.com\/asprox-botnet-mass-attack-hits-governmental-healthcare-and-top-business-websites\/"},{"key":"5_CR10","unstructured":"DataLoss Database. (2010, June). Open security foundation; c2005\u20132010. Available from http:\/\/datalossdb.org"},{"key":"5_CR11","series-title":"Germany-studies in fuzziness and soft computing","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/11311966_4","volume-title":"Intelligent paradigms for healthcare enterprises","author":"G Demiris","year":"2005","unstructured":"Demiris, G. (2005). Virtual communities in health care. In B. Silverman, A. Jain, A. Ichalkaranje, & L. Jain (Eds.), Intelligent paradigms for healthcare enterprises (Germany-studies in fuzziness and soft computing, Vol. 184, pp. 121\u2013137). Berlin\/Heidelberg: Springer."},{"issue":"5","key":"5_CR12","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1177\/104990910402100507","volume":"21","author":"G Demiris","year":"2004","unstructured":"Demiris, G., Parker, O. D., Fleming, D., & Edison, K. (2004). Hospice staff attitudes towards telehospice. The American Journal of Hospice & Palliative Care, 21(5), 343\u2013348.","journal-title":"The American Journal of Hospice & Palliative Care"},{"key":"5_CR13","unstructured":"Dixon P (2006, March 3). Medical identity theft: The information crime that can kill you [cited 2010 January 4]. The World Privacy Forum. First report in a series [Internet]. Cardiff by the Sea, CA, USA: World Privacy Forum. Retrieved May 22, 2011, from http:\/\/www.worldprivacyforum.org\/pdf\/wpf_medicalidtheft2006.pdf"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Ebner, W., Leimeister, J. M., & Krcmar, H. (2004, January 5\u20138). Trust in virtual healthcare communities: Design and implementation of trust-enabling functionalities. In Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS 04) \u2013 Track 7, Big Island, Hawaii (p. 70182). Washington, DC: IEEE.","DOI":"10.1109\/HICSS.2004.1265436"},{"issue":"281","key":"5_CR15","first-page":"31","volume":"38","author":"European Council","year":"1995","unstructured":"European Council. (1995). Directive 95\/46\/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities, 38(281), 31.","journal-title":"Official Journal of the European Communities"},{"key":"5_CR16","volume-title":"Explanatory memorandum to recommendation (97) 5 on the protection of medical data","author":"European Council","year":"1997","unstructured":"European Council. (1997). Explanatory memorandum to recommendation (97) 5 on the protection of medical data. Strasbourg, France: Council of Europe."},{"key":"5_CR17","unstructured":"Federal Trade Commission. (2000). Identity Theft Victim Assistance Workshop. Washington, DC: Federal Trade Commission; c2000\u20132010 [cited 2010 June 4]. Retrieved June 4, 2011, from http:\/\/www.ftc.gov\/bcp\/workshops\/idtheft\/"},{"key":"#cr-split#-5_CR18.1","unstructured":"Hitrustalliance.net. (2009). Frisco, TX: Health Information Trust Alliance [updated 2010"},{"key":"#cr-split#-5_CR18.2","unstructured":"cited 2010 June 4]. Available from https:\/\/www.hitrustcentral.net\/"},{"key":"5_CR19","volume-title":"ISO\/CD 22857:2004: Health informatics \u2013 Guidelines on data protection to facilitate trans-border flows of personal health information","author":"ISO\/CD","year":"2005","unstructured":"ISO\/CD. (2005). ISO\/CD 22857:2004: Health informatics \u2013 Guidelines on data protection to facilitate trans-border flows of personal health information. Geneva, Switzerland: ISO\/CD."},{"key":"5_CR20","volume-title":"ISO\/IEC 27001:2005: Information technology \u2013 Security techniques \u2013 Information security management systems \u2013 Requirements","author":"ISO\/IEC","year":"2005","unstructured":"ISO\/IEC. (2005). ISO\/IEC 27001:2005: Information technology \u2013 Security techniques \u2013 Information security management systems \u2013 Requirements. Geneva, Switzerland: ISO\/IEC."},{"key":"5_CR21","volume-title":"ISO\/IEC 27002:2005: Information technology \u2013 Security techniques \u2013 Code of practice for information security management","author":"ISO\/IEC","year":"2005","unstructured":"ISO\/IEC. (2005). ISO\/IEC 27002:2005: Information technology \u2013 Security techniques \u2013 Code of practice for information security management. Geneva, Switzerland: ISO\/IEC."},{"key":"5_CR22","volume-title":"ISO\/IEC 27005:2008: Information technology \u2013 Security techniques \u2013 Information security risk management","author":"ISO\/IEC","year":"2008","unstructured":"ISO\/IEC. (2008). ISO\/IEC 27005:2008: Information technology \u2013 Security techniques \u2013 Information security risk management. Geneva, Switzerland: ISO\/IEC."},{"key":"5_CR23","volume-title":"ISO\/IEC 27799:2008: Health informatics \u2013Information security management in health using ISO\/IEC 27002","author":"ISO\/IEC","year":"2008","unstructured":"ISO\/IEC. (2008). ISO\/IEC 27799:2008: Health informatics \u2013Information security management in health using ISO\/IEC 27002. Geneva, Switzerland: ISO\/IEC."},{"key":"5_CR24","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/0-387-26559-7_17","volume-title":"M-health emerging mobile health systems","author":"VM Jones","year":"2006","unstructured":"Jones, V. M., van Halteren, A. T., Dokovski, N. T., Koprinkov, G., Peuscher, J., Bults, R., et al. (2006). Mobihealth: Mobile services for health professionals. In R. S. H. Istepanian, S. Laxminarayan, & C. S. Pattichis (Eds.), M-health emerging mobile health systems (pp. \u00ad237\u2013246). New York: Springer."},{"key":"5_CR25","unstructured":"Kaplan, D. (2009, March 2). Group unveils first-of-its-kind standard to secure patient data. SC Magazine, NEWS. Retrieved March 4, 2009, from http:\/\/www.scmagazineus.com\/group-unveils-first-of-its-kind-standard-to-secure-patient-data\/article\/128168\/"},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Kui, M., Yue, W., Xu, Z., Xiaochun, X., & Gengdu, Z. (2005, September 21\u201323). A trust management model for virtual communities. In Proceedings of the 5th International Conference on Computer and Information Technology (CIT 05), Shanghai, China (pp. 741\u2013745). Washington, DC: IEEE.","DOI":"10.1109\/CIT.2005.54"},{"key":"5_CR27","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1186\/1475-925X-2-7","volume":"2","author":"E Kyriacou","year":"2003","unstructured":"Kyriacou, E., Pavlopoulos, S., Berler, A., Neophytou, M., Bourka, A., & Georgoulas, A. (2003). Multipurpose health care telemedicine systems with mobile communication link \u00adsupport. Biomedical Engineering Online, 2, 7.","journal-title":"Biomedical Engineering Online"},{"key":"5_CR28","series-title":"Whitestein series in software agent technologies and autonomic computing","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-7643-8547-7_3","volume-title":"Agent technology and e-health","author":"GB Laleci","year":"2008","unstructured":"Laleci, G. B., Dogac, A., Olduz, M., Tasyurt, I., Yuksel, M., & Okcan, A. (2008). SAPHIRE: A multi-agent system for remote healthcare monitoring through computerized clinical guidelines. In R. Annicchiarico, U. Cort\u00e9s, & C. Urdiales (Eds.), Agent technology and e-health (Whitestein series in software agent technologies and autonomic computing, pp. 25\u201344). Basel, Switzerland: Birkh\u00e4user."},{"key":"5_CR29","unstructured":"Law 2472\/1997: Protection of individuals from personal data processing, Pub. L. No. 2472, Greece (1997)."},{"key":"5_CR30","unstructured":"Law 3418\/2005: Medical code of deontology, Pub. L. No. 3418, Greece (2005)."},{"key":"5_CR31","unstructured":"Law 3471\/2006: Protection of personal data and privacy in the telecommunications sector \u2013 Amendment of Law 2472\/1997, Pub. L. No 3471, Greece (2006)."},{"issue":"4","key":"5_CR32","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MPRV.2004.18","volume":"3","author":"K Lorincz","year":"2004","unstructured":"Lorincz, K., Malan, D. J., Fulford-Jones, T. R. F., Nawoj, A., Clavel, A., Shnayder, V., et al. (2004). Sensor networks for emergency response: Challenges and opportunities. IEEE Pervasive Computing, 3(4), 16\u201323.","journal-title":"IEEE Pervasive Computing"},{"key":"5_CR33","doi-asserted-by":"crossref","unstructured":"Maji, A. K., Mukhoty, A., Majumdar, A. K., Mukhopadhyay, J., Sural, S., Paul, S., et al. (2008, January 29). Security analysis and implementation of web-based telemedicine services with a four-tier-architecture. Proceedings of the 2nd International Workshop on Connectivity, Mobility and Patients\u2019 Comfort (CMPC), Tampere, Finland (pp. 46\u201354). New York: ACM.","DOI":"10.1109\/PCTHEALTH.2008.4571024"},{"key":"5_CR34","volume-title":"Hacking exposed: Network security secrets and solutions","author":"S McClure","year":"2003","unstructured":"McClure, S., Scambray, J., & Kurtz, G. (2003). Hacking exposed: Network security secrets and solutions (4th ed.). Berkeley, CA: McGraw-Hill\/Osborne.","edition":"4"},{"key":"5_CR35","unstructured":"Mondy, J., & Torresi, M. (2008). CIGNA creating a virtual health care community. CIGNA website, News Releases. Retrieved June 4, 2010, from http:\/\/newsroom.cigna.com\/article_display.cfm?article_id=925"},{"key":"5_CR36","doi-asserted-by":"crossref","unstructured":"Mufti, M., Agouridis, D., Din, S., & Mukhtar, A. (2009, June 9\u201313). Ubiquitous wireless infrastructure for elderly care. In Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments (PETRA 09), Corfu, Greece (pp. 1\u20135). New York: ACM Press.","DOI":"10.1145\/1579114.1579136"},{"issue":"2","key":"5_CR37","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/s10550-006-0051-8","volume":"24","author":"HS Ng","year":"2006","unstructured":"Ng, H. S., Sim, M. L., & Tan, C. M. (2006). Security issues of wireless sensor networks in healthcare applications. BT Technology Journal, 24(2), 138\u2013144.","journal-title":"BT Technology Journal"},{"key":"5_CR38","unstructured":"Orrin, S. (2004). The twelve most common application level hack attacks. Watchfire Corporation Whitepaper. Retrieved June 4, 2010, from http:\/\/www.emedia.co.uk\/FM\/GetFile.aspx?id=58740"},{"key":"5_CR39","unstructured":"Parducci, B., Lockhart, H., Levinson, R., & McRae, M. (2005). eXtensible Access Control Markup Language (XACML) Version 2.0 core specification. Billerica, MA: OASIS. Retrieved from www.oasis-open.org\/committees\/xacml\/"},{"key":"5_CR40","unstructured":"Raywood, D. (2009, May 6). Social engineering attack allowed consultant to access com\u00adpany\u2019s data room and steal passwords. SC Magazine, NEWS. Retrieved June 4, 2010, from http:\/\/www.\u00adscmagazineuk.com\/Social-engineering-attack-allowed-consultant-to-access-companys-data-room-and-steal-passwords\/article\/136278"},{"key":"5_CR41","unstructured":"RFC2267 \u2013 Network ingress filtering. Defeating denial of service attacks which employ IP source address spoofing. (2010). Available from Internet Engineering Task Force website. Retrieved January 2, 2004, from http:\/\/www.ietf.org\/rfc\/rfc2267.txt"},{"key":"5_CR42","unstructured":"RFC3882 \u2013 Configuring BGP to block denial-of-service attacks. (2010). Available from Internet Engineering Task Force website. Fremont, CA. Retrieved June 4, 2010, from http:\/\/www.ietf.org\/rfc\/rfc3882.txt"},{"issue":"2","key":"5_CR43","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1089\/tmj.2004.10.243","volume":"10","author":"LH Schopp","year":"2004","unstructured":"Schopp, L. H., Hales, J. W., Quetsch, J. L., Hauan, M. J., & Brown, G. D. (2004). Design of a peer-to-peer telerehabilitation model. Telemedicine Journal and e-Health, 10(2), 243\u2013251.","journal-title":"Telemedicine Journal and e-Health"},{"key":"5_CR44","doi-asserted-by":"crossref","unstructured":"Seamons, K., Winslett, M., Yu, T., Yu, L., & Jarvis, R. (2003). Protecting privacy during on-line trust negotiation. In R. Dingledine & P. Syverson (Eds.), LNCS 2482: Proceedings of the 2nd Workshop on Privacy Enhancing Technologies (PET 2002), April 14\u201315, 2002, San Francisco, USA (pp. 129\u2013143). Berlin: Springer.","DOI":"10.1007\/3-540-36467-6_10"},{"issue":"1","key":"5_CR45","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1258\/1357633981931236","volume":"4","author":"B Stanberry","year":"1998","unstructured":"Stanberry, B. (1998). The legal and ethical aspects of telemedicine: Data protection, security and European law. Journal of Telemedicine and Telecare, 4(1), 18\u201324.","journal-title":"Journal of Telemedicine and Telecare"},{"issue":"2","key":"5_CR46","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1109\/TNSRE.2004.828423","volume":"12","author":"H Stefanov","year":"2004","unstructured":"Stefanov, H., Bien, Z., & Won-Chul, B. (2004). The smart house for older persons and persons with physical disabilities: Structure, technology arrangements, and perspectives. IEEE Transactions on Neural Systems and Rehabilitation Engineering, 12(2), 228\u2013250.","journal-title":"IEEE Transactions on Neural Systems and Rehabilitation Engineering"},{"key":"5_CR47","unstructured":"U.S. Congress. (1996) Health Insurance Portability and Accountability Act, USA. Pub. L No. 104-191, 110 Stat. 1936."},{"key":"5_CR48","volume-title":"Standards for privacy of individually identifiable health information","author":"US Department of Health and Human Services, Office for Civil Rights","year":"2003","unstructured":"US Department of Health and Human Services, Office for Civil Rights. (2003). Standards for privacy of individually identifiable health information. Washington, DC: US Department of Health and Human Services."},{"issue":"1","key":"5_CR49","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1504\/IJWBC.2010.030016","volume":"6","author":"I Varlamis","year":"2010","unstructured":"Varlamis, I., & Apostolakis, I. (2010). Self-supportive virtual communities. International Journal on Web Based Communities, 6(1), 43\u201361. doi:10.1504\/IJWBC.2010.030016.","journal-title":"International Journal on Web Based Communities"},{"key":"5_CR50","doi-asserted-by":"crossref","unstructured":"Vlachos, V., Spinellis, D., & Androutsellis-Theotokis, S. (2009, September 23\u201325). Biological aspects of computer virology. In A. P. Sideridis & C. Z. Patrikakis (Eds.), Proceedings of the 3rd International Conference on e-Democracy, Athens, Greece (pp. 202\u2013219). Berlin: Springer.","DOI":"10.1007\/978-3-642-11631-5_20"},{"key":"5_CR51","doi-asserted-by":"crossref","unstructured":"Wang, X., Lao, G., DeMartini, T., Reddy, H., Nguyen, M., & Valenzuela, E. (2002, November 22). XrML \u2013 eXtensible rights markup language. In Proceedings of ACM Workshop on XML Security (XMLSEC \u201802); Fairfax, VA (pp. 71\u201379). New York: ACM.","DOI":"10.1145\/764792.764803"},{"key":"5_CR52","doi-asserted-by":"crossref","unstructured":"Warren, S., Lebak, J., Yao, J., Creekmore, J., Milenkovic, A., & Jovanov, E. (2005, September 1\u20134). Interoperability and security in wireless body area network infrastructures. In Proceedings of the 27th Annual International Conference of Engineering in Medicine and Biology Society (IEEE-EMBS), Shanghai, China, 4, 3837\u20133840.","DOI":"10.1109\/IEMBS.2005.1615297"}],"container-title":["Annals of Information Systems","Virtual Communities, Social Networks and Collaboration"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-3634-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T06:24:42Z","timestamp":1743575082000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4614-3634-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9781461436331","9781461436348"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-3634-8_5","relation":{},"ISSN":["1934-3221","1934-3213"],"issn-type":[{"type":"print","value":"1934-3221"},{"type":"electronic","value":"1934-3213"}],"subject":[],"published":{"date-parts":[[2012]]},"assertion":[{"value":"23 May 2012","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}