{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T15:40:03Z","timestamp":1748706003033,"version":"3.41.0"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319236322"},{"type":"electronic","value":"9783319236339"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23633-9_14","type":"book-chapter","created":{"date-parts":[[2015,11,26]],"date-time":"2015-11-26T06:47:58Z","timestamp":1448520478000},"page":"361-387","source":"Crossref","is-referenced-by-count":1,"title":["Automating Consent Management Lifecycle for Electronic Healthcare Systems"],"prefix":"10.1007","author":[{"given":"Muhammad Rizwan","family":"Asghar","sequence":"first","affiliation":[]},{"given":"Giovanni","family":"Russello","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","first-page":"269","volume":"2014","author":"M. Aboelfotoh","year":"2014","unstructured":"Aboelfotoh, M., Martin, P., Hassanein, H.: A mobile-based architecture for integrating personal health record data. In: IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom), 2014, pp.\u00a0269\u2013274 (2014)","journal-title":"Applications and Services (Healthcom)"},{"key":"14_CR2","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-642-27585-2_10","volume-title":"Open Problems in Network Security. Lecture Notes in Computer Science","author":"M. Asghar","year":"2012","unstructured":"Asghar, M., Russello, G.: Flexible and dynamic consent-capturing. In: Camenisch, J.,\u00a0Kesdogan, D. (eds.) Open Problems in Network Security. Lecture Notes in Computer Science, vol.\u00a07039, pp.\u00a0119\u2013131. Springer, Berlin (2012)"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Asghar, M.R., Russello, G.: ACTORS: A goal-driven approach for capturing and managing consent in e-health systems. In: 2012 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), pp.\u00a061\u201369 (2012)","DOI":"10.1109\/POLICY.2012.10"},{"key":"14_CR4","first-page":"96","volume":"2006","author":"H. Chan","year":"2006","unstructured":"Chan, H., Kwok, T.: A policy-based management system with automatic policy selection and creation capabilities by using a singular value decomposition technique. In: Seventh IEEE International Workshop on Policies for Distributed Systems and Networks, 2006. Policy 2006, pp.\u00a096\u201399 (2006)","journal-title":"Policy"},{"key":"14_CR5","unstructured":"Clarke, R.: econsent: A critical element of trust in ebusiness. In: BLED 2002 Proceedings, p.\u00a012 (2002)"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Coiera, E., Clarke, R.: e-consent: the design and implementation of consumer consent mechanisms in an electronic environment. J. Am. Med. Inform. Assoc. 11(2), 129\u2013140 (2004)","DOI":"10.1197\/jamia.M1480"},{"key":"14_CR7","unstructured":"Communities, E.: Directive 1999\/93\/EC of the european parliament and of the council of 13 december 1999 on a community framework for electronic signatures (1999). http:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=CONSLEG:1999L0093:20081211:EN:PDF"},{"issue":"3","key":"14_CR8","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/j.clsr.2010.03.001","volume":"26","author":"L. Curren","year":"2010","unstructured":"Curren, L., Kaye, J.: Revoking consent: a \u201cblind spot\u201d in data protection law? Comput. Law Secur. Rev. 26(3), 273\u2013283 (2010)","journal-title":"Comput. Law Secur. Rev."},{"key":"14_CR9","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/3-540-44569-2_2","volume-title":"Policies for Distributed Systems and Networks. Lecture Notes in Computer Science","author":"N. Damianou","year":"2001","unstructured":"Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The ponder policy specification language. In: Sloman, M., Lupu, E., Lobo, J. (eds.) Policies for Distributed Systems and Networks. Lecture Notes in Computer Science, vol. 1995, pp.\u00a018\u201338. Springer, Berlin (2001)"},{"issue":"1","key":"14_CR10","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1197\/jamia.M1888","volume":"13","author":"R.H. Dolin","year":"2006","unstructured":"Dolin, R.H., Alschuler, L., Boyer, S., Beebe, C., Behlen, F.M., Biron, P.V., Shvo, A.S.: Hl7 clinical document architecture, release 2. J. Am. Med. Inform. Assoc. 13(1), 30\u201339 (2006)","journal-title":"J. Am. Med. Inform. Assoc."},{"issue":"2","key":"14_CR11","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MSECP.2004.1281243","volume":"2","author":"J.B. Earp","year":"2004","unstructured":"Earp, J.B., He, Q., Stufflebeam, W., Bolchini, D., Jensen, C., et\u00a0al.: Financial privacy policies and the need for standardization. IEEE Secur. Priv. 2(2), 36\u201345 (2004)","journal-title":"IEEE Secur. Priv."},{"key":"14_CR12","unstructured":"European Communities: Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, year=1995, howpublished = http:\/\/ec.europa.eu\/justice\/policies\/privacy\/docs\/95-46-ce\/dir1995-46_part1_en.pdf"},{"key":"14_CR13","volume-title":"Network management and intrusion detection for quality of network services","author":"Z. Fu","year":"2001","unstructured":"Fu, Z.: Network management and intrusion detection for quality of network services. Ph.D.in Computer Science, North Carolina State University (2001)"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Fu, Z.J., Wu, S.F.: Automatic generation of IPSec\/VPN security policies in an intra-domain environment. In: 12th International Workshop on Distributed Systems: Operations & Management (2001)","DOI":"10.3990\/2.24"},{"key":"14_CR15","unstructured":"Health Level Seven International: Hl7 implementation guide for cda release 2: Privacy consent directives, release 1. http:\/\/gforge.hl7.org\/gf\/download\/frsrelease\/977\/10295\/CDAR2_IG_CONSENTDIR_R1_N1_2013MAY.pdf (2013)"},{"key":"14_CR16","unstructured":"Illner, S., Krumm, H., Pohl, A., L\u00fcck, I., Manka, D., Sparenberg, T.: Policy controlled automated management of distributed and embedded service systems. In: Parallel and Distributed Computing and Networks, pp.\u00a0710\u2013715 (2005)"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Illner, S., Pohl, A., Krumm, H., Luck, I., Manka, D., Sparenberg, T.: Automated runtime management of embedded service systems based on design-time modeling and model transformation. In: 2005 3rd IEEE International Conference on Industrial Informatics, INDIN \u201905, pp.\u00a0134\u2013139 (2005)","DOI":"10.1109\/INDIN.2005.1560365"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Jin, J., Ahn, G.J., Hu, H., Covington, M.J., Zhang, X.: Patient-centric authorization framework for sharing electronic health records. In: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, SACMAT \u201909, pp.\u00a0125\u2013134. ACM, New York, NY (2009)","DOI":"10.1145\/1542207.1542228"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Johnson, M., Karat, J., Karat, C., Grueneberg, K.: Usable policy template authoring for iterative policy refinement. In: 2010 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), pp.\u00a018\u201321 (2010)","DOI":"10.1109\/POLICY.2010.28"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Lawson, P., O\u2019Donoghue, M.: Approaches to consent in Canadian data protection law. In: Lessons from the Identity Trail: Anonymity, Privacy and Identity in a Networked Society, pp.\u00a023\u201342 (2009) https:\/\/goo.gl\/VqPUwF","DOI":"10.1093\/oso\/9780195372472.003.0002"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Luger, E., Rodden, T.: An informed view on consent for ubicomp. In: Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp \u201913, pp.\u00a0529\u2013538. ACM, New York, NY (2013)","DOI":"10.1145\/2493432.2493446"},{"issue":"3","key":"14_CR22","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1093\/iwc\/iws017","volume":"25","author":"E. Luger","year":"2013","unstructured":"Luger, E., Rodden, T.: Terms of agreement: rethinking consent for pervasive computing. Interact. Comput. 25(3), 229\u2013241 (2013) doi:10.1093\/iwc\/iws017","journal-title":"Interact. Comput."},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Malone, P., McLaughlin, M., Leenes, R., Ferronato, P., Lockett, N., Guillen, P.B., Heistracher, T., Russello, G.: ENDORSE: a legal technical framework for privacy preserving data management. In: Proceedings of the 2010 Workshop on Governance of Technology, Information and Policies, pp.\u00a027\u201334. ACM (2010)","DOI":"10.1145\/1920320.1920325"},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Marinovic, S., Twidle, K., Dulay, N., Sloman, M.: Teleo-reactive policies for managing human-centric pervasive services. In: Network and Service Management (CNSM), 2010 International Conference on, pp.\u00a080\u201387 (2010)","DOI":"10.1109\/CNSM.2010.5691332"},{"key":"14_CR25","first-page":"543","volume":"4","author":"A.M. McDonald","year":"2008","unstructured":"McDonald, A.M., Cranor, L.F.: Cost of reading privacy policies, the. ISJLP 4, 543 (2008)","journal-title":"ISJLP"},{"key":"14_CR26","unstructured":"McNair, L., Costello, A.: Electronic informed consent: a new industry standard (2014) http:\/\/www.wcgclinical.com\/wp-content\/uploads\/2014\/03\/eConsent-White-Paper_FINAL.pdf"},{"key":"14_CR27","unstructured":"Mont, M.C., Pearson, S., Kounga, G., Shen, Y., Bramhall, P.: On the management of consent and revocation in enterprises: setting the context. HP Laboratories, Technical Report HPL-2009-49 (2009)"},{"key":"14_CR28","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1613\/jair.30","volume":"1","author":"N.J. Nilsson","year":"1994","unstructured":"Nilsson, N.J.: Teleo-reactive programs for agent control. J. Artif. Intell. Res. 1, 139\u2013158 (1994)","journal-title":"J. Artif. Intell. Res."},{"key":"14_CR29","doi-asserted-by":"crossref","DOI":"10.1515\/9780804772891","volume-title":"Privacy in context: technology, policy, and the integrity of social life","author":"H. Nissenbaum","year":"2009","unstructured":"Nissenbaum, H.: Privacy in context: technology, policy, and the integrity of social life. Stanford University Press, Stanford (2009)"},{"key":"14_CR30","unstructured":"OASIS Standard: eXtensible Access Control Markup Language (XACML) Version 3.0. http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.pdf (2013)"},{"issue":"2","key":"14_CR31","first-page":"161","volume":"37","author":"C.M. O\u2019Keefe","year":"2005","unstructured":"O\u2019Keefe, C.M., Greenfield, P., Goodchild, A.: A decentralised approach to electronic consent and health information access control. J. Res. Pract. Inf. Technol. 37(2), 161\u2013178 (2005)","journal-title":"J. Res. Pract. Inf. Technol."},{"key":"14_CR32","doi-asserted-by":"crossref","unstructured":"Pruski, C.: e-CRL: A rule-based language for expressing patient electronic consent. In: Second International Conference on eHealth, Telemedicine, and Social Medicine, 2010. ETELEMED \u201910, pp.\u00a0141\u2013146 (2010)","DOI":"10.1109\/eTELEMED.2010.27"},{"key":"14_CR33","unstructured":"Report of the Secretary\u2019s advisory committee on automated personal data systems. U.S. Department of Health, Education & Welfare, Records, Computers, and the Rights of Citizens (1973)"},{"key":"14_CR34","doi-asserted-by":"crossref","unstructured":"Russello, G., Dong, C., Dulay, N.: Authorisation and conflict resolution for hierarchical domains. In: Eighth IEEE International Workshop on Policies for Distributed Systems and Networks, 2007. POLICY \u201907, pp.\u00a0201\u2013210 (2007)","DOI":"10.1109\/POLICY.2007.8"},{"key":"14_CR35","first-page":"153","volume":"2008","author":"G. Russello","year":"2008","unstructured":"Russello, G., Dong, C., Dulay, N.: Consent-based workflows for healthcare management. In: IEEE Workshop on Policies for Distributed Systems and Networks, 2008. POLICY 2008, pp.\u00a0153\u2013161 (2008)","journal-title":"POLICY"},{"issue":"9","key":"14_CR36","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1109\/PROC.1975.9939","volume":"63","author":"J. Saltzer","year":"1975","unstructured":"Saltzer, J., Schroeder, M.: The protection of information in computer systems. Proc. IEEE 63(9), 1278\u20131308 (1975)","journal-title":"Proc. IEEE"},{"key":"14_CR37","volume-title":"The eu-us privacy collision: a turn to institutions and procedures","author":"P.M. Schwartz","year":"2013","unstructured":"Schwartz, P.M.: The eu-us privacy collision: a turn to institutions and procedures (2013)"},{"key":"14_CR38","first-page":"1814","volume":"86","author":"P.M. Schwartz","year":"2011","unstructured":"Schwartz, P.M., Solove, D.J.: The PII problem: privacy and a new concept of personally identifiable information. NYUL Rev. 86, 1814 (2011)","journal-title":"NYUL Rev."},{"key":"14_CR39","first-page":"1880","volume":"126","author":"D.J. Solove","year":"2012","unstructured":"Solove, D.J.: Introduction: Privacy self-management and the consent dilemma. Harv. Law Rev. 126, 1880 (2012)","journal-title":"Harv. Law Rev."},{"key":"14_CR40","volume-title":"Open to exploitation: America\u2019s shoppers online and offline","author":"J. Turow","year":"2005","unstructured":"Turow, J., Feldman, L., Meltzer, K.: Open to exploitation: America\u2019s shoppers online and offline (2005)"},{"key":"14_CR41","doi-asserted-by":"crossref","unstructured":"Twidle, K., Dulay, N., Lupu, E., Sloman, M.: Ponder2: a policy system for autonomous pervasive environments. In: International Conference on Autonomic and Autonomous Systems, pp.\u00a0330\u2013335 (2009)","DOI":"10.1109\/ICAS.2009.42"},{"issue":"3","key":"14_CR42","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.istr.2009.10.001","volume":"14","author":"E.A. Whitley","year":"2009","unstructured":"Whitley, E.A.: Informational privacy, consent and the \u201ccontrol\u201d of personal data. Inf. Secur. Tech. Rep. 14(3), 154\u2013159 (2009)","journal-title":"Inf. Secur. Tech. Rep."},{"key":"14_CR43","doi-asserted-by":"crossref","unstructured":"Wuyts, K., Scandariato, R., Verhenneman, G., Joosen, W.: Integrating patient consent in e-Health access control. Int. J. Secure Softw. Eng. IGI Global 2(2), 1\u201324 (2011). Partner: KUL; project: NESSoS","DOI":"10.4018\/jsse.2011040101"},{"key":"14_CR44","doi-asserted-by":"crossref","unstructured":"Zhou, X., Demetriou, S., He, D., Naveed, M., Pan, X., Wang, X., Gunter, C.A., Nahrstedt, K.:\u00a0Identity, location, disease and more: inferring your secrets from android public resources. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp.\u00a01017\u20131028. ACM, New York (2013)","DOI":"10.1145\/2508859.2516661"}],"container-title":["Medical Data Privacy Handbook"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23633-9_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T15:13:37Z","timestamp":1748704417000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-23633-9_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319236322","9783319236339"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23633-9_14","relation":{},"subject":[],"published":{"date-parts":[[2015]]}}}