{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T09:30:02Z","timestamp":1774690202123,"version":"3.50.1"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031448355","type":"print"},{"value":"9783031448362","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-44836-2_3","type":"book-chapter","created":{"date-parts":[[2023,9,27]],"date-time":"2023-09-27T13:03:55Z","timestamp":1695819835000},"page":"32-46","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["SPaMeR: Securing Patient Medical Records in\u00a0the\u00a0Cloud - A Microservice and\u00a0Brokerless Architecture Approach"],"prefix":"10.1007","author":[{"given":"T. B.","family":"Nam","sequence":"first","affiliation":[]},{"given":"H. G.","family":"Khiem","sequence":"additional","affiliation":[]},{"given":"M. N.","family":"Triet","sequence":"additional","affiliation":[]},{"given":"K. V.","family":"Hong","sequence":"additional","affiliation":[]},{"given":"T. D.","family":"Khoa","sequence":"additional","affiliation":[]},{"given":"Q. T.","family":"Bao","sequence":"additional","affiliation":[]},{"given":"N. T.","family":"Phuc","sequence":"additional","affiliation":[]},{"given":"M. D.","family":"Hieu","sequence":"additional","affiliation":[]},{"given":"V. C. P.","family":"Loc","sequence":"additional","affiliation":[]},{"given":"T. L.","family":"Quy","sequence":"additional","affiliation":[]},{"given":"N. T.","family":"Anh","sequence":"additional","affiliation":[]},{"given":"Q. N.","family":"Hien","sequence":"additional","affiliation":[]},{"given":"L. K.","family":"Bang","sequence":"additional","affiliation":[]},{"given":"D. P. N.","family":"Trong","sequence":"additional","affiliation":[]},{"given":"N. T. K.","family":"Ngan","sequence":"additional","affiliation":[]},{"given":"H.","family":"Son","sequence":"additional","affiliation":[]},{"given":"H. H.","family":"Luong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,28]]},"reference":[{"key":"3_CR1","unstructured":"Ali, M., Ali, S., Jilani, A.: Architecture for microservice based system. A report (2020)"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Anthraper, J.J., Kotak, J.: Security, privacy and forensic concern of MQTT protocol. In: Proceedings of International Conference on Sustainable Computing in Science, Technology and Management (SUSCOM). Amity University Rajasthan, Jaipur (2019)","DOI":"10.2139\/ssrn.3355193"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Bansal, M., et al.: Application layer protocols for internet of healthcare things (IoHT). In: 2020 Fourth International Conference on Inventive Systems and Control (ICISC), pp. 369\u2013376. IEEE (2020)","DOI":"10.1109\/ICISC47916.2020.9171092"},{"issue":"12","key":"3_CR4","doi-asserted-by":"publisher","first-page":"565","DOI":"10.3390\/info11120565","volume":"11","author":"L Bixio","year":"2020","unstructured":"Bixio, L., Delzanno, G., Rebora, S., Rulli, M.: A flexible IoT stream processing architecture based on microservices. Information 11(12), 565 (2020)","journal-title":"Information"},{"key":"3_CR5","volume-title":"Precision-Principles, Practices and Solutions for the Internet of Things","author":"T Chou","year":"2017","unstructured":"Chou, T.: Precision-Principles, Practices and Solutions for the Internet of Things. McGraw-Hill Education, New York (2017)"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Duong-Trung, N., et al.: On components of a patient-centered healthcare system using smart contract. In: Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy, pp. 31\u201335 (2020)","DOI":"10.1145\/3377644.3377668"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Duong-Trung, N., et al.: Smart care: integrating blockchain technology into the design of patient-centered healthcare systems. In: Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy, pp. 105\u2013109 (2020)","DOI":"10.1145\/3377644.3377667"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Fremantle, P., Aziz, B., Kopeck\u1ef3, J., Scott, P.: Federated identity and access management for the internet of things. In: 2014 International Workshop on Secure Internet of Things, pp. 10\u201317. IEEE (2014)","DOI":"10.1109\/SIoT.2014.8"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Fuentes Carranza, J.C., Fong, P.W.: Brokering policies and execution monitors for IoT middleware. In: Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, pp. 49\u201360 (2019)","DOI":"10.1145\/3322431.3325098"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Ha, X.S., Le, H.T., Metoui, N., Duong-Trung, N.: DeM-CoD: novel access-control-based cash on delivery mechanism for decentralized marketplace. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 71\u201378. IEEE (2020)","DOI":"10.1109\/TrustCom50675.2020.00023"},{"key":"3_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-030-68851-6_15","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"XS Ha","year":"2021","unstructured":"Ha, X.S., Le, T.H., Phan, T.T., Nguyen, H.H.D., Vo, H.K., Duong-Trung, N.: Scrutinizing trust and transparency in\u00a0cash on delivery systems. In: Wang, G., Chen, B., Li, W., Di Pietro, R., Yan, X., Han, H. (eds.) SpaCCS 2020. LNCS, vol. 12382, pp. 214\u2013227. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-68851-6_15"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Hoang, N.M., Son, H.X.: A dynamic solution for fine-grained policy conflict resolution. In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, pp. 116\u2013120 (2019)","DOI":"10.1145\/3309074.3309097"},{"issue":"4","key":"3_CR13","doi-asserted-by":"publisher","first-page":"1765","DOI":"10.1007\/s11277-016-3398-2","volume":"91","author":"HC Hwang","year":"2016","unstructured":"Hwang, H.C., Park, J., Shon, J.G.: Design and implementation of a reliable message transmission system based on MQTT protocol in IoT. Wireless Pers. Commun. 91(4), 1765\u20131777 (2016)","journal-title":"Wireless Pers. Commun."},{"issue":"II","key":"3_CR14","first-page":"510","volume":"8","author":"SP Jaikar","year":"2018","unstructured":"Jaikar, S.P., Iyer, K.R.: A survey of messaging protocols for IoT systems. Int. J. Adv. Manage. Technol. Eng. Sci. 8(II), 510\u2013514 (2018)","journal-title":"Int. J. Adv. Manage. Technol. Eng. Sci."},{"issue":"1","key":"3_CR15","first-page":"11","volume":"3","author":"V Karagiannis","year":"2015","unstructured":"Karagiannis, V., Chatzimisios, P., Vazquez-Gallego, F., Alonso-Zarate, J.: A survey on application layer protocols for the internet of things. Trans. IoT Cloud Comput. 3(1), 11\u201317 (2015)","journal-title":"Trans. IoT Cloud Comput."},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Kawaguchi, R., Bandai, M.: Edge based mqtt broker architecture for geographical IoT applications. In: 2020 International Conference on Information Networking (ICOIN), pp. 232\u2013235. IEEE (2020)","DOI":"10.1109\/ICOIN48656.2020.9016528"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Le, H.T., et al.: Introducing multi shippers mechanism for decentralized cash on delivery system. Int. J. Adv. Comput. Sci. Appl. 10(6) (2019)","DOI":"10.14569\/IJACSA.2019.0100676"},{"issue":"5","key":"3_CR18","first-page":"677","volume":"10","author":"NTT Le","year":"2019","unstructured":"Le, N.T.T., et al.: Assuring non-fraudulent transactions in cash on delivery by introducing double smart contracts. Int. J. Adv. Comput. Sci. Appl. 10(5), 677\u2013684 (2019)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Lee, S., Kim, H., Hong, D.K., Ju, H.: Correlation analysis of MQTT loss and delay according to QoS level. In: The International Conference on Information Networking 2013 (ICOIN), pp. 714\u2013717. IEEE (2013)","DOI":"10.1109\/ICOIN.2013.6496715"},{"key":"3_CR20","doi-asserted-by":"publisher","first-page":"41309","DOI":"10.1109\/ACCESS.2019.2907599","volume":"7","author":"P Lv","year":"2019","unstructured":"Lv, P., Wang, L., Zhu, H., Deng, W., Gu, L.: An IoT-oriented privacy-preserving publish\/subscribe model over blockchains. IEEE Access 7, 41309\u201341314 (2019)","journal-title":"IEEE Access"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Pranata, A.A., et al.: Towards an IoT-based water quality monitoring system with brokerless pub\/sub architecture. In: 2017 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN), pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/LANMAN.2017.7972166"},{"key":"3_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1007\/978-3-319-72389-1_40","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"HX Son","year":"2017","unstructured":"Son, H.X., Dang, T.K., Massacci, F.: REW-SMT: a new approach for rewriting XACML request with dynamic big data security policies. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.-K.R. (eds.) SpaCCS 2017. LNCS, vol. 10656, pp. 501\u2013515. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-72389-1_40"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Son, H.X., Hoang, N.M.: A novel attribute-based access control system for fine-grained privacy protection. In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, pp. 76\u201380 (2019)","DOI":"10.1145\/3309074.3309091"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Son, H.X., et al.: Towards a mechanism for protecting seller\u2019s interest of cash on delivery by using smart contract in hyperledger. Int. J. Adv. Comput. Sci. Appl. 10(4) (2019)","DOI":"10.14569\/IJACSA.2019.0100405"},{"key":"3_CR25","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-030-20005-3_8","volume-title":"International Joint Conference: 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019)","author":"HX Son","year":"2020","unstructured":"Son, H.X., Nguyen, M.H., Vo, H.K., Nguyen, T.P.: Toward an privacy protection based on access control model in hybrid cloud for healthcare systems. In: Mart\u00ednez \u00c1lvarez, F., Troncoso Lora, A., S\u00e1ez Mu\u00f1oz, J.A., Quinti\u00e1n, H., Corchado, E. (eds.) CISIS\/ICEUTE -2019. AISC, vol. 951, pp. 77\u201386. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-20005-3_8"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Thanh, L.N.T., et al.: IoHT-MBA: an internet of healthcare things (IoHT) platform based on microservice and brokerless architecture. Int. J. Adv. Comput. Sci. Appl. 12(7) (2021)","DOI":"10.14569\/IJACSA.2021.0120768"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Thanh, L.N.T., et al.: Sip-MBA: a secure IoT platform with brokerless and micro-service architecture. Int. J. Adv. Comput. Sci. Appl. 12(7) (2021)","DOI":"10.14569\/IJACSA.2021.0120767"},{"key":"3_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/978-3-319-72389-1_44","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"QNT Thi","year":"2017","unstructured":"Thi, Q.N.T., Dang, T.K., Van, H.L., Son, H.X.: Using JSON to specify privacy preserving-enabled attribute-based access control policies. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.-K.R. (eds.) SpaCCS 2017. LNCS, vol. 10656, pp. 561\u2013570. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-72389-1_44"},{"issue":"8","key":"3_CR29","doi-asserted-by":"publisher","first-page":"2418","DOI":"10.3390\/s20082418","volume":"20","author":"S Trilles","year":"2020","unstructured":"Trilles, S., Gonz\u00e1lez-P\u00e9rez, A., Huerta, J.: An IoT platform based on microservices and serverless paradigms for smart farming purposes. Sensors 20(8), 2418 (2020)","journal-title":"Sensors"},{"key":"3_CR30","unstructured":"Verma, S., Rastogi, M.A.: IoT application layer protocols: a survey. J. Xi\u2019an Univ. Archit. Technol. VII 57 (2020)"},{"key":"3_CR31","doi-asserted-by":"crossref","unstructured":"Xuan, S.H., et al.: Rew-XAC: an approach to rewriting request for elastic ABAC enforcement with dynamic policies. In: 2016 International Conference on Advanced Computing and Applications (ACOMP), pp. 25\u201331. IEEE (2016)","DOI":"10.1109\/ACOMP.2016.014"}],"container-title":["Lecture Notes in Computer Science","Web Services \u2013 ICWS 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-44836-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T08:19:46Z","timestamp":1730189986000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-44836-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031448355","9783031448362"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-44836-2_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"28 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICWS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Services","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Honolulu, HI","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icws2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.servicessociety.org\/icws","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EDAS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}