{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T12:31:46Z","timestamp":1726057906580},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030325909"},{"type":"electronic","value":"9783030325916"}],"license":[{"start":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T00:00:00Z","timestamp":1573084800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-32591-6_38","type":"book-chapter","created":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T08:03:30Z","timestamp":1573027410000},"page":"359-367","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on Medical Big Data Security Management"],"prefix":"10.1007","author":[{"given":"Xiaohan","family":"Hu","sequence":"first","affiliation":[]},{"given":"Rong","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Zhenwei","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Mingyue","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Jingwei","family":"Shang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,7]]},"reference":[{"key":"38_CR1","first-page":"45","volume":"11","author":"J Huang","year":"2018","unstructured":"Huang, J., Wang, Y., Pi, B.: Research on the security guarantee technology of health and medical big data. Comput. Age 11, 45\u201348 (2018). (in Chinese)","journal-title":"Comput. Age"},{"key":"38_CR2","volume-title":"Health and Medical Big Data Theory and Practice","author":"Z Lu","year":"2017","unstructured":"Lu, Z., Yao, Y., Yin, X.: Health and Medical Big Data Theory and Practice. Electronics Industry Press, Beijing (2017). (in Chinese)"},{"key":"38_CR3","unstructured":"Zhang, Z., Zhou, Y., Du, S., et al.: Medical big data and the opportunities and challenges it faces. J. Med. Inf. (35), 2\u20138 (2014). (in Chinese)"},{"key":"38_CR4","unstructured":"Ling, H.: U.S. Utah Health Agency was Implicated in Blackened 180,000 User Information (2012). \n                    http:\/\/sec.chinabyte.com\/447\/12307447.shtml\n                    \n                  . (in Chinese)"},{"key":"38_CR5","doi-asserted-by":"crossref","unstructured":"Shah, F., Li, J., Shamil, F.R., Iqbal, M.: Medical big data existence flavors: a review. In: 2nd International Conference on Robotics and Automation Engineering, Guangzhou, China, pp. 487\u2013490 (2017)","DOI":"10.1109\/ICRAE.2017.8291436"},{"key":"38_CR6","first-page":"126","volume":"14","author":"M Dai","year":"2017","unstructured":"Dai, M., Meng, Q.: Medical health big data mining and analysis. China Health Inf. Manag. 14, 126\u2013130 (2017). (in Chinese)","journal-title":"China Health Inf. Manag."},{"key":"38_CR7","unstructured":"Jing, X., Qin, J.: The application and development direction of big data in medical insurance management (2018). \n                    https:\/\/www.cn-healthcare.com\/articlewm\/20180719\/content-1029797.html\n                    \n                  . (in Chinese)"},{"issue":"1","key":"38_CR8","first-page":"81","volume":"52","author":"P Tavakol","year":"2011","unstructured":"Tavakol, P., Labruto, F., Bergstrand, L., Blomqvist, L.: Effects of outsourcing magnetic resonance examinations from a public university hospital to a private agent. EBSCO 52(1), 81\u201385 (2011)","journal-title":"EBSCO"},{"key":"38_CR9","doi-asserted-by":"crossref","unstructured":"Godinho, T.M., Costa, C., Oliveira, J.L.: Generating big data repositories for research in medical imaging. In: 11th Iberian Conference on Information Systems and Technologies (CISTI), Gran Canaria, Spain. IEEE (2016)","DOI":"10.1109\/CISTI.2016.7521382"},{"key":"38_CR10","first-page":"391","volume-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","author":"Musfira Siddique","year":"2018","unstructured":"Siddique, M., Mirza, M.A., Ahmad, M., Chaudhry, J., Islam, R.: A survey of big data security solutions in healthcare. In: International Conference on Security and Privacy in Communication Systems, pp. 391\u2013406. Springer, Singapore (2018)"},{"key":"38_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-016-0589-z","volume":"40","author":"M Jayabalan","year":"2016","unstructured":"Jayabalan, M., O\u2019Daniel, T.: Access control and privilege management in electronic health record: a systematic literature review. J. Med. Syst. 40, 1\u20139 (2016)","journal-title":"J. Med. Syst."},{"key":"38_CR12","first-page":"408","volume":"38","author":"Y Huang","year":"2004","unstructured":"Huang, Y., Yang, Z., Ping, L., et al.: Implementation method of role-based access control in security management system. J. Zhejiang Univ. (Eng. Ed.) 38, 408\u2013413 (2004). (in Chinese)","journal-title":"J. Zhejiang Univ. (Eng. Ed.)"},{"key":"38_CR13","doi-asserted-by":"crossref","unstructured":"Thejas, G.S., Pramod, T.C., Iyengar, S.S., Sunitha, N.R.: Intelligent access control: a self-adaptable trust-based access control (SATBAC) framework using game theory strategy, chapter 7. In: Proceedings of International Symposium on Sensor Networks, Systems and Security 2018, pp. 97\u2013111. Springer (2018)","DOI":"10.1007\/978-3-319-75683-7_7"},{"key":"38_CR14","first-page":"190","volume":"36","author":"Z Hui","year":"2015","unstructured":"Hui, Z., Li, H., Zhang, M., Feng, D.: Risk adaptive access control model for medical big data. J. Commun. 36, 190\u2013199 (2015). (in Chinese)","journal-title":"J. Commun."},{"key":"38_CR15","unstructured":"Identity Authentication Technology. \n                    https:\/\/baike.baidu.com\/item\/identificationtechnology\/1897549?fr=aladdin\n                    \n                  . (in Chinese)"},{"issue":"3","key":"38_CR16","first-page":"335","volume":"43","author":"D Wang","year":"2017","unstructured":"Wang, D., Zhao, W., Ding, Z.: Summary of key technology analysis of big data security protection. J. Beijing Univ. Technol. 43(3), 335\u2013350 (2017). (in Chinese)","journal-title":"J. Beijing Univ. Technol."},{"key":"38_CR17","doi-asserted-by":"crossref","unstructured":"Yarmand, M.H., Sartipi, K., Down, D.G.: Behavior-based access control for distributed healthcare environment. In: 21st IEEE International Symposium on Computer-Based Medical Systems, Jyvaskyla, Finland, pp. 126\u2013134. IEEE (2008)","DOI":"10.1109\/CBMS.2008.14"},{"key":"38_CR18","unstructured":"Zhao, R., He, P.: Research on personal privacy protection system in medical big data application. China Health Inf. Manag. 191\u2013196 (2016). (in Chinese)"},{"issue":"11","key":"38_CR19","first-page":"48","volume":"24","author":"X Luo","year":"2015","unstructured":"Luo, X., Luo, Y.: The status quo of medical big data in information construction. Chin. J. Med. Libr. Inf. Sci. 24(11), 48\u201351 (2015). (in Chinese)","journal-title":"Chin. J. Med. Libr. Inf. Sci."}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Natural Computation, Fuzzy Systems and Knowledge Discovery"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-32591-6_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T08:16:02Z","timestamp":1573028162000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-32591-6_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,7]]},"ISBN":["9783030325909","9783030325916"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-32591-6_38","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,11,7]]},"assertion":[{"value":"7 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICNC-FSKD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kunming","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icncfskd2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}