{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T11:47:06Z","timestamp":1726055226109},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030335052"},{"type":"electronic","value":"9783030335069"}],"license":[{"start":{"date-parts":[[2019,10,18]],"date-time":"2019-10-18T00:00:00Z","timestamp":1571356800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-33506-9_29","type":"book-chapter","created":{"date-parts":[[2019,10,17]],"date-time":"2019-10-17T22:15:43Z","timestamp":1571350543000},"page":"327-337","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Apply Lagrange Interpolation Based Access Control Mechanism in Personal Health Record Medical System"],"prefix":"10.1007","author":[{"given":"Kuang-Yen","family":"Tai","sequence":"first","affiliation":[]},{"given":"Dai-Lun","family":"Chiang","sequence":"additional","affiliation":[]},{"given":"Chun-Yen","family":"Chuang","sequence":"additional","affiliation":[]},{"given":"Tzer-Shyong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Frank Yeong-Sung","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,18]]},"reference":[{"unstructured":"U.S. Department of health and human services personal health records and the HIPAA privacy rule (2008). \n                    http:\/\/www.hhs.gov","key":"29_CR1"},{"issue":"6","key":"29_CR2","first-page":"8047-5053","volume":"6","author":"SS Shete","year":"2016","unstructured":"Shete, S.S., Kulkarni, C.S.: Database security using role-based access control system. Int. J. Eng. Sci. Comput. 6(6), 8047-5053 (2016)","journal-title":"Int. J. Eng. Sci. Comput."},{"issue":"4","key":"29_CR3","first-page":"445","volume":"14","author":"F Karimi","year":"2016","unstructured":"Karimi, F., Esmaeilpour, M.: A dynamic media access control protocol for controlling congestion in wireless sensor network by using fuzzy logic system and learning automata. Int. J. Comput. Sci. Inf. Secur. 14(4), 445\u2013460 (2016)","journal-title":"Int. J. Comput. Sci. Inf. Secur."},{"doi-asserted-by":"crossref","unstructured":"Onarliogluamd, K., Robertson, W.: Overhaul: input-driven access control for better privacy on traditional operating systems. In: International Conference on Dependable Systems and Networks, pp. 443\u2013454 (2016)","key":"29_CR4","DOI":"10.1109\/DSN.2016.47"},{"issue":"2","key":"29_CR5","first-page":"115","volume":"6","author":"P Xiao","year":"2012","unstructured":"Xiao, P., He, J.H., Fu, Y.F.: Distributed group key management in wireless mesh networks. Int. J. Secur. Appl. 6(2), 115\u2013120 (2012)","journal-title":"Int. J. Secur. Appl."},{"key":"29_CR6","first-page":"251","volume-title":"Lecture Notes in Computer Science","author":"Jasper Bogaerts","year":"2016","unstructured":"Bogaerts, J., Lagaisse, B., Joosen, W.: Idea: supporting policy-based access control on database systems. In: International Symposium on Engineering Secure Software and Systems, pp. 251\u2013259 (2016)"},{"key":"29_CR7","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/s13278-017-0425-6","volume":"7","author":"NC Rathore","year":"2017","unstructured":"Rathore, N.C., Tripathy, S.: A trust-based collaborative access control model with policy aggregation for online social networks. Soc. Netw. Anal. Min. 7, 7 (2017)","journal-title":"Soc. Netw. Anal. Min."},{"key":"29_CR8","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-3-319-49806-5_7","volume-title":"Information Systems Security","author":"Kyrre Wahl Kongsg\u00e5rd","year":"2016","unstructured":"Kongsgard, K.W., Nordbotten, N.A., Mancini, F., Engelstad, P.E.: Data loss prevention based on text classification in controlled environments. In: International Conference on Information Systems Security, pp. 131\u2013150 (2016)"},{"key":"29_CR9","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/j.csbj.2018.07.004","volume":"16","author":"P Zhang","year":"2018","unstructured":"Zhang, P., et al.: FHIRChain: applying block chain to securely and scalable share clinical data. Comput. Struct. Biotechnol. J. 16, 267\u2013278 (2018)","journal-title":"Comput. Struct. Biotechnol. J."},{"issue":"1","key":"29_CR10","first-page":"108","volume":"9","author":"P Thummavet","year":"2015","unstructured":"Thummavet, P., Vasupongayya, S.: Privacy-preserving emergency access control for personal health records. Int. J. Sci. Technol. 9(1), 108\u2013120 (2015)","journal-title":"Int. J. Sci. Technol."},{"issue":"6","key":"29_CR11","doi-asserted-by":"publisher","first-page":"2158","DOI":"10.1109\/TCST.2016.2517448","volume":"24","author":"AR Mehrabian","year":"2016","unstructured":"Mehrabian, A.R., Khorasani, K.: Distributed formation recovery control of heterogeneous multiagent euler-lagrange systems subject to network switching and diagnostic imperfections. IEEE Trans. Control Syst. Technol. 24(6), 2158\u20132166 (2016)","journal-title":"IEEE Trans. Control Syst. Technol."},{"doi-asserted-by":"crossref","unstructured":"Liu, Y.C.: Leaderless consensus for multiple euler-lagrange systems with event-triggered communication. In: IEEE International Conference on Systems, Man, and Cybernetics (SMC), October 2018","key":"29_CR12","DOI":"10.1109\/SMC.2018.00454"}],"container-title":["Lecture Notes in Networks and Systems","Advances on Broad-Band Wireless Computing, Communication and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-33506-9_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,17]],"date-time":"2019-10-17T22:18:58Z","timestamp":1571350738000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-33506-9_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,18]]},"ISBN":["9783030335052","9783030335069"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-33506-9_29","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2019,10,18]]},"assertion":[{"value":"18 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BWCCA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Broadband and Wireless Computing, Communication and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Antwerp","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Belgium","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bwcca2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/bwcca\/2019\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}