{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:18:09Z","timestamp":1726003089093},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030053444"},{"type":"electronic","value":"9783030053451"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05345-1_7","type":"book-chapter","created":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T09:07:56Z","timestamp":1544173676000},"page":"84-97","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Service Oriented Healthcare Architecture (SOHA-CC) Based on Cloud Computing"],"prefix":"10.1007","author":[{"given":"Syed Qasim Afser","family":"Rizvi","sequence":"first","affiliation":[]},{"given":"Guojun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jianer","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Arif, M., Abdullah, N.A., Phalianakote, S.K., Ramli, N., Elahi, M.: Maximizing information of multimodality brain image fusion using curvelet transform with genetic algorithm. In: 2014 International Conference on Computer Assisted System in Health (CASH), pp. 45\u201351. IEEE (2014)","key":"7_CR1","DOI":"10.1109\/CASH.2014.11"},{"issue":"2","key":"7_CR2","doi-asserted-by":"crossref","first-page":"235","DOI":"10.24846\/v27i2y201811","volume":"27","author":"M Arif","year":"2018","unstructured":"Arif, M., Wang, G., Balas, V.E.: Secure vanets: trusted communication scheme between vehicles and infrastructure based on fog computing. Stud. Inform. Control 27(2), 235\u2013246 (2018)","journal-title":"Stud. Inform. Control"},{"doi-asserted-by":"crossref","unstructured":"Arif, M., Wang, G., Chen, S.: Deep learning with non-parametric regression model for traffic flow prediction. In: Proceedings of IEEE 16th International Conference on Dependable, Autonomic & Secure Computing, 16th International Conference on Pervasive Intelligence & Computing, 4th International Conference on Big Data Intelligence & Computing, and 3rd Cyber Science & Technology Congress, pp. 681\u2013688. IEEE, August 2018","key":"7_CR3","DOI":"10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.00120"},{"doi-asserted-by":"crossref","unstructured":"Arif, M., Wang, G., Peng, T.: Track me if you can? Query based dual location privacy in VANETs for V2V and V2I. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/12th IEEE International Conference on Big Data Science And Engineering (TrustCom\/BigDataSE), pp. 1091\u20131096. IEEE (2018)","key":"7_CR4","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00152"},{"issue":"4","key":"7_CR5","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1111\/1467-9299.00322","volume":"80","author":"SP Bate","year":"2002","unstructured":"Bate, S.P., Robert, G.: Knowledge management and communities of practice in the private sector: lessons for modernizing the national health service in England and Wales. Public Adm. 80(4), 643\u2013663 (2002)","journal-title":"Public Adm."},{"unstructured":"Benvenuto, C.J.: Galois field in cryptography. University of Washington (2012)","key":"7_CR6"},{"issue":"11","key":"7_CR7","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1056\/NEJMhpr051133","volume":"353","author":"David Blumenthal","year":"2005","unstructured":"Blumenthal, D., Hsiao, W.: Privatization and its discontents the evolving Chinese health care system (2005)","journal-title":"New England Journal of Medicine"},{"unstructured":"Conti, M., Lal, C.: A survey on context-based co-presence detection techniques. arXiv preprint arXiv:1808.03320 (2018)","key":"7_CR8"},{"issue":"2","key":"7_CR9","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/s11606-012-2251-x","volume":"28","author":"M DeCamp","year":"2013","unstructured":"DeCamp, M.: Physicians, social media, and conflict of interest. J. Gen. Intern. Med. 28(2), 299\u2013303 (2013)","journal-title":"J. Gen. Intern. Med."},{"unstructured":"Ginter, P.M., Duncan, W.J., Swayne, L.E.: The Strategic Management of Health Care Organizations. Wiley, Hoboken (2018)","key":"7_CR10"},{"issue":"2","key":"7_CR11","doi-asserted-by":"publisher","first-page":"335","DOI":"10.5210\/ojphi.v2i2.3213","volume":"2","author":"SJ Grannis","year":"2010","unstructured":"Grannis, S.J., Stevens, K.C., Merriwether, R.: Leveraging health information exchange to support public health situational awareness: the Indiana experience. Online J. Public Health Inform. 2(2), 335\u2013344 (2010)","journal-title":"Online J. Public Health Inform."},{"issue":"9","key":"7_CR12","doi-asserted-by":"publisher","first-page":"1102","DOI":"10.3390\/s6091102","volume":"6","author":"A Hande","year":"2006","unstructured":"Hande, A., Polk, T., Walker, W., Bhatia, D.: Self-powered wireless sensor networks for remote patient monitoring in hospitals. Sensors 6(9), 1102\u20131117 (2006)","journal-title":"Sensors"},{"issue":"6","key":"7_CR13","doi-asserted-by":"publisher","first-page":"e134","DOI":"10.2196\/jmir.4365","volume":"17","author":"H Hao","year":"2015","unstructured":"Hao, H.: The development of online doctor reviews in China: an analysis of the largest online doctor review website in China. J. Med. Internet Res. 17(6), e134 (2015)","journal-title":"J. Med. Internet Res."},{"issue":"1","key":"7_CR14","doi-asserted-by":"publisher","first-page":"29","DOI":"10.22581\/muet1982.1801.03","volume":"37","author":"Q Javaid","year":"2018","unstructured":"Javaid, Q., Arif, M., Shah, M.A., Nadeem, M., et al.: A hybrid technique for de-noising multi-modality medical images by employing cuckoo\u2019s search with curvelet transform. Mehran Univ. Res. J. Eng. Technol. 37(1), 29 (2018)","journal-title":"Mehran Univ. Res. J. Eng. Technol."},{"unstructured":"Kretzschmar, U.: Aes128-ac implementation for encryption and decryption. TI-White Paper (2009)","key":"7_CR15"},{"unstructured":"Lee, H., Lee, K., Shin, Y.: AES implementation and performance evaluation on 8-bit microcontrollers. arXiv preprint arXiv:0911.0482 (2009)","key":"7_CR16"},{"doi-asserted-by":"crossref","unstructured":"Leijdekkers, P., Gay, V.: Personal heart monitoring and rehabilitation system using smart phones. In: International Conference on Mobile Business, ICMB 2006, p. 29. IEEE (2006)","key":"7_CR17","DOI":"10.1109\/ICMB.2006.39"},{"doi-asserted-by":"crossref","unstructured":"Mai, L., et al.: NetAgg: using middleboxes for application-specific on-path aggregation in data centres. In: Proceedings of the 10th ACM International on Conference on Emerging Networking Experiments and Technologies, pp. 249\u2013262. ACM (2014)","key":"7_CR18","DOI":"10.1145\/2674005.2674996"},{"key":"7_CR19","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1016\/j.future.2017.10.045","volume":"82","author":"G Manogaran","year":"2018","unstructured":"Manogaran, G., Varatharajan, R., Lopez, D., Kumar, P.M., Sundarasekar, R., Thota, C.: A new architecture of internet of things and big data ecosystem for secured smart healthcare monitoring and alerting system. Future Gen. Comput. Syst. 82, 375\u2013387 (2018)","journal-title":"Future Gen. Comput. Syst."},{"issue":"8","key":"7_CR20","first-page":"1202","volume":"17","author":"H Mousannif","year":"2011","unstructured":"Mousannif, H., Khalil, I., Al Moatassime, H.: Cooperation as a service in VANETs. J. UCS 17(8), 1202\u20131218 (2011)","journal-title":"J. UCS"},{"doi-asserted-by":"crossref","unstructured":"Muhammad, A., Guojun, W.: Segmentation of calcification and brain hemorrhage with midline detection. In: 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA\/IUCC), pp. 1082\u20131090. IEEE (2017)","key":"7_CR21","DOI":"10.1109\/ISPA\/IUCC.2017.00164"},{"unstructured":"Piai, S., Claps, M.: Bigger data for better healthcare. IDC Health Insights (2013)","key":"7_CR22"},{"key":"7_CR23","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1016\/j.eswa.2017.06.027","volume":"87","author":"MI Pramanik","year":"2017","unstructured":"Pramanik, M.I., Lau, R.Y., Demirkan, H., Azad, M.A.K.: Smart health: big data enabled health paradigm within smart cities. Expert Syst. Appl. 87, 370\u2013383 (2017)","journal-title":"Expert Syst. Appl."},{"doi-asserted-by":"crossref","unstructured":"Selmane, N., Guilley, S., Danger, J.L.: Practical setup time violation attacks on AES. In: Seventh European Dependable Computing Conference, EDCC 2008, pp. 91\u201396. IEEE (2008)","key":"7_CR24","DOI":"10.1109\/EDCC-7.2008.11"},{"issue":"2","key":"7_CR25","doi-asserted-by":"publisher","first-page":"e19","DOI":"10.2196\/jmir.1549","volume":"12","author":"P Wicks","year":"2010","unstructured":"Wicks, P., et al.: Sharing health data for better outcomes on PatientsLikeMe. J. Med. Internet Res. 12(2), e19 (2010)","journal-title":"J. Med. Internet Res."},{"issue":"1","key":"7_CR26","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/JSYST.2015.2460747","volume":"11","author":"Y Zhang","year":"2017","unstructured":"Zhang, Y., Qiu, M., Tsai, C.W., Hassan, M.M., Alamri, A.: Health-CPS: healthcare cyber-physical system assisted by cloud and big data. IEEE Syst. J. 11(1), 88\u201395 (2017)","journal-title":"IEEE Syst. J."},{"issue":"9","key":"7_CR27","doi-asserted-by":"publisher","first-page":"399","DOI":"10.3390\/sym10090399","volume":"10","author":"C Zhu","year":"2018","unstructured":"Zhu, C., Wang, G., Sun, K.: Cryptanalysis and improvement on an image encryption algorithm design using a novel chaos based S-Box. Symmetry 10(9), 399 (2018)","journal-title":"Symmetry"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05345-1_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T20:00:58Z","timestamp":1573070458000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05345-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030053444","9783030053451"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05345-1_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/space2018.cse.iitk.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}