{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T14:52:25Z","timestamp":1774536745974,"version":"3.50.1"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030801281","type":"print"},{"value":"9783030801298","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-80129-8_4","type":"book-chapter","created":{"date-parts":[[2021,10,4]],"date-time":"2021-10-04T21:51:43Z","timestamp":1633384303000},"page":"48-57","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Data Security in Health Systems: Case of Cameroon"],"prefix":"10.1007","author":[{"given":"Igor Godefroy","family":"Kouam Kamdem","sequence":"first","affiliation":[]},{"given":"Marcellin Julius Antonio","family":"Nkenlifack","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"Mohammed Miroud, E.: La s\u00e9curit\u00e9 dans les syst\u00e8mes de sant\u00e9. Ph.D. thesis, Universit\u00e9 des Sciences et de la Technologie d\u2019Oran Mohamed Boudiaf, Algerie, Juin 2016"},{"key":"4_CR2","unstructured":"Safon, M.-O.: Articles litt\u00e9raire grise, ouvrages, rapport: centre de documentation de l\u2019Irdes (2018)"},{"key":"4_CR3","unstructured":"Olivier, M.: Conf\u00e9rence pr\u00e9sent\u00e9e aux journ\u00e9es d\u2019etude de l\u2019ansi. Les r\u00e9sultats probants dans la recherche m\u00e9dicale, (96), janvier 2018"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Quantin, C., Allaert, F., Auverlot, B., Rialle, V.: S\u00e9curit\u00e9: aspect juridiques et \u00e9thiques des donn\u00e9es de sant\u00e9 informatis\u00e9es. Springer-Verlag, Paris (2013)","DOI":"10.1007\/978-2-8178-0338-8_11"},{"key":"4_CR5","unstructured":"Lenoir, N.: Element pour un premier bilan de cinq annees d\u2019activite. La revue administrative 36(215), 1983 (1978). la loi 78\u201317 du 6 janvier: et de la commission national de l\u2019informatique et des libert\u00e9s"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Akinyele, J., Pagano, M., Peterson, Z., Lehmann, C., Rbin, A.D.: Securing electronic medical records using attribute-based encryption on mobile devices report 2010\/565. In: Proceeding of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices. ACM (2011)","DOI":"10.1145\/2046614.2046628"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Katt, B.: A comprehensive overview of security monitoring solutions for e-health systems. In: 2014 IEEE International Conference on Healthcare Informatics, pp. 364\u2013364. IEEE (2014)","DOI":"10.1109\/ICHI.2014.59"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Katsikas, S.K., Spinellis, D.D., Iliadis, J., Blobel, B.: Using trusted third parties for secure telemedical applications over the www: the euromed-ets approach. Int. J. Med. Informat. 49(1): 59\u201368 (1998)","DOI":"10.1016\/S1386-5056(98)00011-2"},{"key":"4_CR9","unstructured":"Mamlin, B.: Demo data. https:\/\/wiki.openmrs.org\/plugins\/servlet\/mobile?contentld=5047323#content\/view\/5047323. Accessed 02 Sep 2010"},{"key":"4_CR10","unstructured":"Igor Kouam, K.: S\u00e9curit\u00e9 des donn\u00e9es dans les syst\u00e8mes de sant\u00e9 au Cameroun. M\u00e9moire master 2, University of Dschang, Informatique, Cameroun, July 2019"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-80129-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:13:25Z","timestamp":1771658005000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-80129-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030801281","9783030801298"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-80129-8_4","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"6 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}