{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:40Z","timestamp":1740099160301,"version":"3.37.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000110"},{"type":"electronic","value":"9783030000127"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00012-7_11","type":"book-chapter","created":{"date-parts":[[2018,9,12]],"date-time":"2018-09-12T14:15:30Z","timestamp":1536761730000},"page":"113-122","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Medical Information Access Control Method Based on Weighted Information Entropy"],"prefix":"10.1007","author":[{"given":"Lijuan","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Linhao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Meng","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Jianyou","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Shaobo","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Zhaoxuan","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,13]]},"reference":[{"issue":"10","key":"11_CR1","first-page":"10","volume":"12","author":"XY Wang","year":"2016","unstructured":"Wang, X.Y., Tian, L.Y., Han, X., et al.: Big data with precision and moderate health care. Commun. CCF 12(10), 10\u201312 (2016)","journal-title":"Commun. CCF"},{"issue":"4","key":"11_CR2","first-page":"292","volume":"10","author":"JH Cai","year":"2013","unstructured":"Cai, J.H., Zhang, T., Zong, W.H.: Challenges and considerations of the big data of medicine. Chin. J. Health Inf. Manag. 10(4), 292\u2013295 (2013)","journal-title":"Chin. J. Health Inf. Manag."},{"key":"11_CR3","first-page":"152","volume":"10","author":"FJ Shen","year":"2016","unstructured":"Shen, F.J.: The exploration and practice of cloud computing in the information of medical industry. Inf. Commun. 10, 152\u2013153 (2016)","journal-title":"Inf. Commun."},{"issue":"6","key":"11_CR4","first-page":"2","volume":"35","author":"Z Zhang","year":"2014","unstructured":"Zhang, Z., Zhou, Y., Du, S.H., et al.: Medical big data and the facing opportunities and challenges. J. Med. Inf. 35(6), 2\u20138 (2014)","journal-title":"J. Med. Inf."},{"key":"11_CR5","first-page":"24","volume":"7","author":"BJ Zou","year":"2014","unstructured":"Zou, B.J.: Bid data analysis and its application in the medical field. Comput. Educ. 7, 24\u201329 (2014)","journal-title":"Comput. Educ."},{"key":"11_CR6","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1186\/s40537-017-0066-7","volume":"4","author":"D Bi","year":"2017","unstructured":"Bi, D., Dong, K.N., Xue, L.N., et al.: Big data analytics in healthcare: promise and potential. Big Data Time 4, 6\u201320 (2017)","journal-title":"Big Data Time"},{"key":"11_CR7","unstructured":"China Website Security Report in 2015. http:\/\/zt.360.cn\/1101061855.php?dtid=1101062368&did=11015364902018\/3\/11"},{"key":"11_CR8","unstructured":"Zhao, Y.Y., Huang, X., Li, J.J.: Contribution title. In: 9th International Proceedings (2017). Prevention and control of internal auditing risk in medical institutions under big data environment. Times Financ. 2, 15\u201321"},{"key":"11_CR9","first-page":"37","volume":"2","author":"B Chen","year":"2015","unstructured":"Chen, B.: Integration and application of information technology for industrial integration \u2013 the application of cloud computing technology in medical and health fields. China Eng. Consul. 2, 37\u201341 (2015)","journal-title":"China Eng. Consul."},{"key":"11_CR10","first-page":"86","volume":"4","author":"K Zhou","year":"2012","unstructured":"Zhou, K., Jiang, X.H., Sun, T.F.: Study on EMR system based on cloud storage and access control policy. Inf. Secur. Commun. Priv. 4, 86\u201389 (2012)","journal-title":"Inf. Secur. Commun. Priv."},{"issue":"11","key":"11_CR11","first-page":"75","volume":"31","author":"CY Huo","year":"2014","unstructured":"Huo, C.Y., Wu, Z.Q.: Patient-oriented privacy protection access control model for HIS. Comput. Appl. Softw. 31(11), 75\u201377 (2014)","journal-title":"Comput. Appl. Softw."},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Khan, A., Mckillop, I.: Privacy-centric access control for distributed heterogeneous medical information systems. In: IEEE International Conference on Healthcare Informatics, vol. 7789, no. 1, pp. 297\u2013306. IEEE (2013)","DOI":"10.1109\/ICHI.2013.42"},{"issue":"1","key":"11_CR13","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/TPDS.2012.97","volume":"24","author":"M Li","year":"2012","unstructured":"Li, M., Yu, S., Zheng, Y., et al.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1), 131\u2013143 (2012)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"3","key":"11_CR14","first-page":"74","volume":"28","author":"S Qu","year":"2011","unstructured":"Qu, S., Sun, T., Zhou, X.: Purpose management-based privacy access control model for his. Comput. Appl. Softw. 28(3), 74\u201376 (2011)","journal-title":"Comput. Appl. Softw."},{"issue":"12","key":"11_CR15","first-page":"200","volume":"36","author":"YT Zhang","year":"2015","unstructured":"Zhang, Y.T., Fu, Y.C., Ming, Y., et al.: Access control scheme for medical data based on PBAC and IBE. J. Commun. 36(12), 200\u2013211 (2015)","journal-title":"J. Commun."},{"issue":"5","key":"11_CR16","first-page":"274","volume":"32","author":"JK Hu","year":"2009","unstructured":"Hu, J.K., Chen, H.H., Hou, T.W.: A hybrid public key infrastructure solution (HPKI) for HIPAA privacy\/security regulations. Comput. Stand. Interfac. 32(5), 274\u2013280 (2009)","journal-title":"Comput. Stand. Interfac."},{"issue":"12","key":"11_CR17","first-page":"190","volume":"36","author":"Z Hui","year":"2015","unstructured":"Hui, Z., Li, H., Zhang, M., et al.: Risk-adaptive access control model for big data in healthcare. J. Commun. 36(12), 190\u2013199 (2015)","journal-title":"J. Commun."},{"issue":"8","key":"11_CR18","first-page":"1891","volume":"27","author":"CG Peng","year":"2016","unstructured":"Peng, C.G., Ding, H.F., Zhu, Y.J., et al.: Information entropy models and privacy metrics methods for privacy protection. J. Softw. 27(8), 1891\u20131903 (2016)","journal-title":"J. Softw."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00012-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T00:01:54Z","timestamp":1571875314000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00012-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000110","9783030000127"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00012-7_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}