{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:46:18Z","timestamp":1767339978910,"version":"3.40.4"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319051482"},{"type":"electronic","value":"9783319051499"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-05149-9_13","type":"book-chapter","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T09:36:27Z","timestamp":1394184987000},"page":"213-217","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Foundational Security Principles for Medical Application Platforms"],"prefix":"10.1007","author":[{"given":"Eugene Y.","family":"Vasserman","sequence":"first","affiliation":[]},{"given":"John","family":"Hatcliff","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,8]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Hatcliff, J., King, A., Lee, I., MacDonald, A., Fernando, A., Robkin, M., Vasserman, E.Y., Weininger, S., Goldman, J.M.: Rationale and architecture principles for medical application platforms. In: Proceedings of the International Conference on Cyber-Physical Systems (ICCPS) (2012)","DOI":"10.1109\/ICCPS.2012.9"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Goldman, J.M.: CIMIT\/TATRC symposium on developing a plug-and-play open networking standard for the operating room of the future (May 2005)","DOI":"10.21236\/ADA434388"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Burleson, W.P., Clark, S.S., Ransford, B., Fu, K.: Design challenges for secure implantable medical devices. In: Proceedings of the Design Automation Conference (DAC) (June 2012)","DOI":"10.1145\/2228360.2228364"},{"key":"13_CR4","series-title":"LNICST","first-page":"111","volume-title":"MobiHealth 2011","author":"SS Clark","year":"2012","unstructured":"Clark, S.S., Fu, K.: Recent results in computer security for medical devices. In: Nikita, K.S., Lin, J.C., Fotiadis, D.I., Arredondo Waldmeyer, M.-T. (eds.) MobiHealth 2011. LNICST, vol. 83, pp. 111\u2013118. Springer, Heidelberg (2012)"},{"key":"13_CR5","unstructured":"Conmy, P., Nicholson, M., McDermid, J.: Safety assurance contracts for integrated modular avionics. In: Proceedings of the 8th Australian Workshop on Safety Critical Systems and Software (SCS) (2003)"},{"key":"13_CR6","unstructured":"Objective Interface Systems, Inc.: Multiple independent levels of security (MILS) \u2014 technical primer. http:\/\/www.ois.com\/Products\/mils-technical-primer.html (2011)"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Brucker, A.D., Petritsch, H.: Extending access control models with break-glass. In: Proceedings of the ACM Symposium on Access Control Models and Technologies, New York, NY, USA, pp. 197\u2013206. ACM (2009)","DOI":"10.1145\/1542207.1542239"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Anderson, R.J.: A security policy model for clinical information systems. In: Proceedings of the IEEE Symposium on Security and privacy, pp. 30\u201343 (1996)","DOI":"10.1109\/SECPRI.1996.502667"},{"key":"13_CR9","unstructured":"United States Congress: Health Insurance Portability and Accountability Act, Privacy Rule. 45 CFR 164 (1996)"},{"key":"13_CR10","unstructured":"United States Congress: Gramm-Leach-Bliley Act, Financial Privacy Rule. 15 USC \u00a76801\u2013\u00a76809"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Accorsi, R.: Safe-keeping digital evidence with secure logging protocols: state of the art and challenges. International Conference on IT Security Incident Management and IT Forensics, pp. 94\u2013110 (2009)","DOI":"10.1109\/IMF.2009.18"},{"key":"13_CR12","unstructured":"Arney, D., Weininger, S., Whitehead, S.F., Goldman, J.M.: Supporting medical device adverse event analysis in an interoperable clinical environment: design of a data logging and playback system. In: International Conference on Biomedical Ontology (ICBO) (July 2011)"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-05149-9_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T00:35:57Z","timestamp":1746146157000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-05149-9_13"}},"subtitle":["(Extended Abstract)"],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319051482","9783319051499"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-05149-9_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"8 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}