{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:58:36Z","timestamp":1740099516238,"version":"3.37.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030283735"},{"type":"electronic","value":"9783030283742"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-28374-2_31","type":"book-chapter","created":{"date-parts":[[2019,8,27]],"date-time":"2019-08-27T19:02:44Z","timestamp":1566932564000},"page":"357-368","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Extended Authentication Process in the Environment of the Laboratory Information and Management System"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0704-3989","authenticated-orcid":false,"given":"Pavel","family":"Blazek","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5992-2574","authenticated-orcid":false,"given":"Ondrej","family":"Krejcar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,9]]},"reference":[{"issue":"10","key":"31_CR1","doi-asserted-by":"publisher","first-page":"3826","DOI":"10.1007\/s11227-015-1610-x","volume":"72","author":"Q Jiang","year":"2016","unstructured":"Jiang, Q., Khan, M.K., Lu, X., Ma, J., He, D.: A privacy preserving three-factor authentication protocol for e-Health clouds. J. Supercomput. 72(10), 3826\u20133849 (2016). \n                      https:\/\/doi.org\/10.1007\/s11227-015-1610-x\n                      \n                    . ISSN 0920-8542","journal-title":"J. Supercomput."},{"key":"31_CR2","doi-asserted-by":"publisher","unstructured":"Kammergruber, R., Robold, S., Karli\u04ab, J., Durner, J.: The future of the laboratory information system \u2013 what are the requirements for a powerful system for a laboratory data management?. Clin. Chem. Lab. Med. (CCLM) 52(11) (2014). \n                      https:\/\/doi.org\/10.1515\/cclm-2014-0276","DOI":"10.1515\/cclm-2014-0276"},{"key":"31_CR3","unstructured":"ISO\/IEC 17025 - General requirements for the competence of testing and calibration laboratories"},{"key":"31_CR4","unstructured":"ISO 9001 \u201cQuality management\u201d"},{"key":"31_CR5","unstructured":"Personal Information Protection and Electronic Documents Act, Second Session, Thirty-six Parliament, 48\u201349 Elizabeth II, 1999\u20132000, Statutes of Canada (2000)"},{"key":"31_CR6","unstructured":"Law on the Protection of Personal Information, promulgated by the Diet of Japan on May 30 (2003)"},{"key":"31_CR7","unstructured":"TSO (THE STATIONARY OFFICE): ITIL foundation handbook. 3rd ed. TSO, London (2012). ISBN: 978-0-11-331349-5"},{"key":"31_CR8","unstructured":"GAMP 5: A Risk-based Approach to Compliant GxP Computerized Systems. ISPE Headquarters, Tampa (2008). ISBN 1-931879-77-X"},{"key":"31_CR9","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.chemolab.2012.07.001","volume":"118","author":"PJ Prasad","year":"2012","unstructured":"Prasad, P.J., Bodhe, G.L.: Trends in laboratory information management system. Chemometr. Intell. Lab. Syst. 118, 187\u2013192 (2012). \n                      https:\/\/doi.org\/10.1016\/j.chemolab.2012.07.001","journal-title":"Chemometr. Intell. Lab. Syst."},{"key":"31_CR10","doi-asserted-by":"publisher","unstructured":"Quo, C.F., Wu, B., Wang, M.D.: Development of a laboratory information system for cancer collaboration projects. In: IEEE Engineering in Medicine and Biology 27th Annual Conference (2005). \n                      https:\/\/doi.org\/10.1109\/iembs.2005.1617070","DOI":"10.1109\/iembs.2005.1617070"},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"Ekins, S.: Computer Applications in Pharmaceutical Research and Development, pp. 57\u201361. Wiley, Hoboken (2006). ISBN 0-471-73779-8","DOI":"10.1002\/0470037237"},{"key":"31_CR12","doi-asserted-by":"publisher","first-page":"2518","DOI":"10.4028\/www.scientific.net\/AMR.605-607.2518","volume":"605-607","author":"Yu Hu","year":"2012","unstructured":"Hu, Y.: Development of information management system used in laboratory advanced materials research. In: Engineering in Medicine and Biology Society, IEEE-EMBS 2005, 27th Annual International Conference, Shanghai, pp. 2859\u20132862. IEEE (2012). \n                      https:\/\/doi.org\/10.4028\/www.scientific.net\/AMR.605-607.2518\n                      \n                    . ISBN: 0-7803-8741-4","journal-title":"Advanced Materials Research"},{"issue":"2","key":"31_CR13","doi-asserted-by":"publisher","first-page":"e26","DOI":"10.1016\/j.ijmedinf.2010.10.001","volume":"80","author":"Sebastian Haas","year":"2011","unstructured":"Haas, S., Wohlgemuth, S., Echizen, I., Sonehara, N., M\u00fcller, G.: Aspects of privacy for electronic health records. Int. J. Med. Inf. 80(2) (2011). \n                      https:\/\/doi.org\/10.1016\/j.ijmedinf.2010.10.001","journal-title":"International Journal of Medical Informatics"},{"key":"31_CR14","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/978-3-319-24306-1_37","volume-title":"Computational Collective Intelligence","author":"P Blazek","year":"2015","unstructured":"Blazek, P., Kuca, K., Jun, D., Krejcar, O.: Development of information and management system for laboratory based on open source licensed software. In: N\u00fa\u00f1ez, M., Nguyen, N.T., Camacho, D., Trawi\u0144ski, B. (eds.) ICCCI 2015. LNCS (LNAI), vol. 9330, pp. 377\u2013387. Springer, Cham (2015). \n                      https:\/\/doi.org\/10.1007\/978-3-319-24306-1_37"},{"issue":"2","key":"31_CR15","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.3233\/jifs-169145","volume":"32","author":"P Blazek","year":"2017","unstructured":"Blazek, P., Kuca, K., Jun, D., Krejcar, O.: Development of information and management system for laboratory based on open source licensed software with security logs extension. J. Intell. Fuzzy Syst. 32(2), 1497\u20131508 (2017). \n                      https:\/\/doi.org\/10.3233\/jifs-169145","journal-title":"J. Intell. Fuzzy Syst."},{"key":"31_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1007\/978-3-319-56148-6_54","volume-title":"Bioinformatics and Biomedical Engineering","author":"P Blazek","year":"2017","unstructured":"Blazek, P., Kuca, K., Krenek, J., Krejcar, O.: Increasing of data security and workflow optimization in information and management system for laboratory. In: Rojas, I., Ortu\u00f1o, F. (eds.) IWBBIO 2017. LNCS, vol. 10208, pp. 602\u2013613. Springer, Cham (2017). \n                      https:\/\/doi.org\/10.1007\/978-3-319-56148-6_54"},{"key":"31_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1007\/978-3-319-78723-7_30","volume-title":"Bioinformatics and Biomedical Engineering","author":"P Blazek","year":"2018","unstructured":"Blazek, P., Kuca, K., Krejcar, O.: Concept of a module for physical security of material secured by LIMS. In: Rojas, I., Ortu\u00f1o, F. (eds.) IWBBIO 2018. LNCS, vol. 10813, pp. 352\u2013363. Springer, Cham (2018). \n                      https:\/\/doi.org\/10.1007\/978-3-319-78723-7_30\n                      \n                    . ISBN 978-3-319-78722-0"},{"key":"31_CR18","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.chb.2018.01.028","volume":"83","author":"S Mamonov","year":"2018","unstructured":"Mamonov, S., Benbunan-fich, R.: The impact of information security threat awareness on privacy-protective behaviors. Comput. Hum. Behav. 83, 32\u201344 (2018). \n                      https:\/\/doi.org\/10.1016\/j.chb.2018.01.028\n                      \n                    . ISSN 07475632","journal-title":"Comput. Hum. Behav."},{"key":"31_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1007\/978-3-319-91238-7_45","volume-title":"Human-Computer Interaction. Theories, Methods, and Human Issues","author":"M Rudolph","year":"2018","unstructured":"Rudolph, M., Feth, D., Polst, S.: Why users ignore privacy policies \u2013 a survey and intention model for explaining user privacy behavior. In: Kurosu, M. (ed.) HCI 2018. LNCS, vol. 10901, pp. 587\u2013598. Springer, Cham (2018). \n                      https:\/\/doi.org\/10.1007\/978-3-319-91238-7_45\n                      \n                    . ISBN 978-3-319-91237-0"},{"key":"31_CR20","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.future.2014.11.016","volume":"52","author":"K Liang","year":"2015","unstructured":"Liang, K., et al.: A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing. Future Gener. Comput. Syst. 52, 95\u2013108 (2015). \n                      https:\/\/doi.org\/10.1016\/j.future.2014.11.016\n                      \n                    . ISSN 0167739X","journal-title":"Future Gener. Comput. Syst."},{"key":"31_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1007\/978-3-319-26961-0_31","volume-title":"Information Systems Security","author":"YS Rao","year":"2015","unstructured":"Rao, Y.S.: Privacy-preserving decentralized key-policy attribute-based encryption schemes with fast decryption. In: Jajodia, S., Mazumdar, C. (eds.) ICISS 2015. LNCS, vol. 9478, pp. 521\u2013531. Springer, Cham (2015). \n                      https:\/\/doi.org\/10.1007\/978-3-319-26961-0_31\n                      \n                    . ISBN 978-3-319-26960-3"},{"issue":"6","key":"31_CR22","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1016\/j.jala.2007.08.002","volume":"12","author":"L Rasmussen","year":"2007","unstructured":"Rasmussen, L., Maddox, C., Harten, B., White, E.: A successful LIMS implementation: case study at southern research institute. J. Assoc. Lab. Autom. 12(6), 384\u2013390 (2007). \n                      https:\/\/doi.org\/10.1016\/j.jala.2007.08.002\n                      \n                    . ISSN 15355535","journal-title":"J. Assoc. Lab. Autom."},{"key":"31_CR23","doi-asserted-by":"publisher","unstructured":"Pavlik, J., Komarek, A., Sobeslav, V.: Security information and event management in the cloud computing infrastructure. Comput. Intell. Inf. 209\u2013214 (2014). \n                      https:\/\/doi.org\/10.1109\/cinti.2014.7028677","DOI":"10.1109\/cinti.2014.7028677"},{"key":"31_CR24","unstructured":"Hub, M., Capek, J., Myskova, R., Roudny, R.: Usability versus security of authentication. In: International Conference on Communication and Management in Technological Innovation and Academic Globalization-Proceedings, Puerto De La Cruz, Spain, pp. 34\u201338 (2010). ISBN 978-960-474-254-7"},{"key":"31_CR25","doi-asserted-by":"publisher","unstructured":"Brumen, B., Taneski, V.: Moore\u2019s curse on textual passwords. In: 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) IEEE, pp. 1360\u20131365 (2015). \n                      https:\/\/doi.org\/10.1109\/mipro.2015.7160486\n                      \n                    . ISBN 978-9-5323-3082-3","DOI":"10.1109\/mipro.2015.7160486"},{"key":"31_CR26","unstructured":"Hoober, S.: Design for Fingers and Thumbs Instead of Touch. UXmatters. Accessed 24 Aug 2017"},{"issue":"1","key":"31_CR27","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/tcsvt.2003.818349","volume":"14","author":"AK Jain","year":"2004","unstructured":"Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 14(1), 4\u201320 (2004). \n                      https:\/\/doi.org\/10.1109\/tcsvt.2003.818349\n                      \n                    . ISSN 1051-8215","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"31_CR28","unstructured":"The Role of Biometrics in Enterprise Security. \n                      http:\/\/www.dell.com\/downloads\/global\/power\/ps1q06-20050132-Tilton-OE.pdf\n                      \n                    . Accessed 5 Feb 2018"},{"key":"31_CR29","doi-asserted-by":"publisher","unstructured":"Potter, R., Weldon, L., Shneiderman, B.: Improving the accuracy of touch screens: an experimental evaluation of three strategies. In: Proceedings of the Conference on Human Factors in Computing Systems, CHI 1988, Washington, DC, pp. 27\u201332 (1988). \n                      https:\/\/doi.org\/10.1145\/57167.57171","DOI":"10.1145\/57167.57171"},{"key":"31_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/978-3-319-22425-1_19","volume-title":"Advances in Information and Computer Security","author":"T Liu","year":"2015","unstructured":"Liu, T., Wang, Y.: Beyond scale: an efficient framework for evaluating web access control policies in the era of big data. In: Tanaka, K., Suga, Y. (eds.) IWSEC 2015. LNCS, vol. 9241, pp. 316\u2013334. Springer, Cham (2015). \n                      https:\/\/doi.org\/10.1007\/978-3-319-22425-1_19\n                      \n                    . ISBN 978-3-319-22424-4"},{"issue":"3","key":"31_CR31","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1049\/iet-bmt.2016.0146","volume":"7","author":"AA Al-Saggaf","year":"2018","unstructured":"Al-Saggaf, A.A.: Key binding biometrics-based remote user authentication scheme using smart cards. IET Biometrics 7(3), 278\u2013284 (2018). \n                      https:\/\/doi.org\/10.1049\/iet-bmt.2016.0146\n                      \n                    . ISSN 2047-4938","journal-title":"IET Biometrics"},{"key":"31_CR32","unstructured":"Announcing Approval of Federal Information Processing Standard (FIPS) 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, and Revision of the Applicability Clause of FIPS 180-4, Secure Hash Standard"}],"container-title":["Lecture Notes in Computer Science","Computational Collective Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-28374-2_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,27]],"date-time":"2019-08-27T19:08:13Z","timestamp":1566932893000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-28374-2_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030283735","9783030283742"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-28374-2_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"9 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCCI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Collective Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hendaye","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccci2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iccci.sigappfr.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}