{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T13:33:36Z","timestamp":1742996016379,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319326887"},{"type":"electronic","value":"9783319326894"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-32689-4_53","type":"book-chapter","created":{"date-parts":[[2016,5,18]],"date-time":"2016-05-18T05:18:24Z","timestamp":1463548704000},"page":"693-702","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Implementing the Patient Clinical Observation Sheet as a Service in Hospitals"],"prefix":"10.1007","author":[{"given":"Florin","family":"Anton","sequence":"first","affiliation":[]},{"given":"Silvia","family":"Anton","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,19]]},"reference":[{"issue":"2","key":"53_CR1","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.braindev.2013.01.008","volume":"36","author":"K Fujimotoa","year":"2014","unstructured":"Fujimotoa, K., Nagai, T., Okazaki, S., Kawajiri, M., Tomiw, K.: Development and verification of child observation sheet for 5-year-old children. Brain Dev. 36(2), 107\u2013115 (2014)","journal-title":"Brain Dev."},{"issue":"5","key":"53_CR2","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1016\/j.acap.2014.12.005","volume":"15","author":"LA Shanley","year":"2015","unstructured":"Shanley, L.A., Hronek, C., Hall, M., Alpern, E.R., Fieldston, E.S., Hain, P.D., Shah, S.S., Macy, M.L.: Structure and function of observation units in children\u2019s hospitals: a mixed-methods study. Acad. Pediatr. 15(5), 518\u2013525 (2015)","journal-title":"Acad. Pediatr."},{"key":"53_CR3","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.jbi.2014.02.008","volume":"50","author":"H Wang","year":"2014","unstructured":"Wang, H., Wu, Q., Qin, B., Domingo-Ferrer, J.: FRR: Fair remote retrieval of outsourced private medical records in electronic health networks. J. Biomed. Inform. 50, 226\u2013233 (2014)","journal-title":"J. Biomed. Inform."},{"key":"53_CR4","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.compind.2014.09.004","volume":"69","author":"J Li","year":"2015","unstructured":"Li, J., Liu, C., Liu, B., Mao, R., Wang, Y., Chen, S., Yang, J.J., Pan, H., Wang, Q.: Diversity-aware retrieval of medical records. Comput. Ind. 69, 81\u201391 (2015)","journal-title":"Comput. Ind."},{"key":"53_CR5","doi-asserted-by":"crossref","unstructured":"Chauhan, R., Kumar, A.: Cloud computing for improved healthcare: techniques, potential and challenges. In: E-Health and Bioengineering Conference (EHB), pp. 1\u20134 (2013)","DOI":"10.1109\/EHB.2013.6707234"},{"issue":"10","key":"53_CR6","doi-asserted-by":"publisher","first-page":"736","DOI":"10.1016\/j.ijmedinf.2014.06.006","volume":"83","author":"K Rosenbeck G\u0159eg","year":"2014","unstructured":"Rosenbeck G\u0159eg, K., Chen, R., Randorff H\u0159jen, A., Elberg, P.: Content analysis of physical examination templates in electronic health records using SNOMED CT. Int. J. Med. Inform. 83(10), 736\u2013749 (2014)","journal-title":"Int. J. Med. Inform."},{"issue":"2","key":"53_CR7","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.nec.2014.11.018","volume":"26","author":"JT Carter","year":"2015","unstructured":"Carter, J.T.: Electronic medical records and quality improvement. Neurosurg. Clin. North Am. 26(2), 245\u2013251 (2015)","journal-title":"Neurosurg. Clin. North Am."},{"key":"53_CR8","unstructured":"Stan, O., Sauciuc, D., Miclea, L.: Medical informatics system for Romanian healthcare system. In: E-Health and Bioengineering Conference (EHB), pp. 1\u20134 (2011)"},{"issue":"3","key":"53_CR9","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1016\/j.jbi.2012.12.003","volume":"46","author":"JL Fern\u00e1ndez-Alem\u00e1n","year":"2013","unstructured":"Fern\u00e1ndez-Alem\u00e1n, J.L., Se\u0144or, I.C., Oliver Lozoya, P.\u00c1., Toval, A.: Security and privacy in electronic health records: a systematic literature review. J. Biomed. Inform. 46(3), 541\u2013562 (2013)","journal-title":"J. Biomed. Inform."},{"key":"53_CR10","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/j.jbi.2014.06.002","volume":"50","author":"A Gkoulalas-Divanis","year":"2014","unstructured":"Gkoulalas-Divanis, A., Loukides, G., Sun, J.: Publishing data from electronic health records while preserving privacy: a survey of algorithms. J. Biomed. Inform. 50, 4\u201319 (2014)","journal-title":"J. Biomed. Inform."},{"issue":"2","key":"53_CR11","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.ijmedinf.2010.11.005","volume":"80","author":"G Perera","year":"2011","unstructured":"Perera, G., Holbrook, A., Thabane, L., Foster, G., Willison, D.J.: Views on health information sharing and privacy from primary care practices using electronic medical records. Int. J. Med. Inform. 80(2), 94\u2013101 (2011)","journal-title":"Int. J. Med. Inform."},{"issue":"2","key":"53_CR12","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1016\/j.jbi.2012.11.005","volume":"46","author":"S Mart\u00ednez","year":"2013","unstructured":"Mart\u00ednez, S., S\u00e1nchez, D., Valls, A.: A semantic framework to protect the privacy of electronic health records with non-numerical attributes. J. Biomed. Inform. 46(2), 294\u2013303 (2013)","journal-title":"J. Biomed. Inform."},{"issue":"3","key":"53_CR13","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1016\/j.respe.2014.03.005","volume":"62","author":"C Riou","year":"2014","unstructured":"Riou, C., Fresson, J., Serre, J.L., Avillach, P., Leneveut, L., Quantin, C.: Guide to good practices to ensure privacy protection in secondary use of medical records. Rev. Epidemiol. Sante Publique 62(3), 207\u2013214 (2014)","journal-title":"Rev. Epidemiol. Sante Publique"},{"key":"53_CR14","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.compbiomed.2014.04.019","volume":"51","author":"P Gorp Van","year":"2014","unstructured":"Van Gorp, P., Comuzzi, M., Jahnen, A., Kaymak, U., Middleton, B.: An open platform for personal health record apps with platform-level privacy protection. Comput. Biol. Med. 51, 14\u201323 (2014)","journal-title":"Comput. Biol. Med."},{"key":"53_CR15","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.future.2014.10.014","volume":"52","author":"J Liu","year":"2015","unstructured":"Liu, J., Huang, X., Liu, J.K.: Secure sharing of personal health records in cloud computing: ciphertext-policy attribute-based signcryption. Future Gener. Comput. Syst. 52, 67\u201376 (2015)","journal-title":"Future Gener. Comput. Syst."},{"issue":"5","key":"53_CR16","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/j.ijmedinf.2015.01.005","volume":"84","author":"J Haskew","year":"2015","unstructured":"Haskew, J., R\u0159, G., Saito, K., Turner, K., Odhiambo, G., Wamae, A., Sharif, S., Sugishita, T.: Implementation of a cloud-based electronic medical record for maternal and child health in rural Kenya. Int. J. Med. Inform. 84(5), 349\u2013354 (2015)","journal-title":"Int. J. Med. Inform."},{"issue":"7","key":"53_CR17","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1016\/j.ijmedinf.2015.03.004","volume":"84","author":"PJ Hsieh","year":"2015","unstructured":"Hsieh, P.J.: Healthcare professionals\u2019 use of health clouds: integrating technology acceptance and status quo bias perspectives. Int. J. Med. Inform. 84(7), 512\u2013523 (2015)","journal-title":"Int. J. Med. Inform."},{"key":"53_CR18","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.procs.2015.03.179","volume":"47","author":"P Dhivya","year":"2015","unstructured":"Dhivya, P., Roobini, S., Sindhuja, A.: Symptoms based treatment based on personal health record using cloud computing. Procedia Comput. Sci. 47, 22\u201329 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"53_CR19","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1016\/j.jss.2014.05.068","volume":"102","author":"W Lin","year":"2015","unstructured":"Lin, W., Dou, W., Zhou, Z., Liu, C.: A cloud-based framework for Home-diagnosis service over big medical data. J. Syst. Softw. 102, 192\u2013206 (2015)","journal-title":"J. Syst. Softw."},{"key":"53_CR20","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/j.ins.2013.10.013","volume":"263","author":"Y Zhuang","year":"2014","unstructured":"Zhuang, Y., Jiang, N., Wu, Z., Li, Q., Chiu, D.K.W., Hu, H.: Efficient and robust large medical image retrieval in mobile cloud computing environment. Inf. Sci. 263, 60\u201386 (2014)","journal-title":"Inf. Sci."},{"key":"53_CR21","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.procs.2014.11.041","volume":"42","author":"Hossain Arka","year":"2014","unstructured":"Arka, Hossain: I., Chellappan, K.: Collaborative Compressed I-cloud Medical Image Storage with Decompress Viewer. Procedia Comput. Sci. 42, 114\u2013121 (2014)","journal-title":"Procedia Comput. Sci."},{"key":"53_CR22","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.future.2014.06.004","volume":"43\u201344","author":"JJ Yang","year":"2015","unstructured":"Yang, J.J., Li, J.Q., Niu, Y.: A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Gener. Comput. Syst. 43\u201344, 74\u201386 (2015)","journal-title":"Future Gener. Comput. Syst."},{"key":"53_CR23","doi-asserted-by":"crossref","unstructured":"Todd, C., Johnson Jr., N. L.: Chapter 3 \u2013 Kerberos Server Authentication. In: Hack Proofing Windows 2000 Server, pp. 63\u2013104, (2001)","DOI":"10.1016\/B978-193183649-4\/50007-8"},{"key":"53_CR24","doi-asserted-by":"crossref","unstructured":"De Clercq, J., Grillenmeier, G.: 6 \u2013 Kerberos. In: Microsoft Windows Security Fundamentals, pp. 303\u2013408, (2007)","DOI":"10.1016\/B978-155558340-8\/50010-1"},{"issue":"3\u20135","key":"53_CR25","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1016\/0169-7552(90)90073-2","volume":"19","author":"D Russell","year":"1990","unstructured":"Russell, D.: High-level security architectures and the Kerberos system. Comput. Netw. ISDN Syst. 19(3\u20135), 201\u2013214 (1990)","journal-title":"Comput. Netw. ISDN Syst."}],"container-title":["Lecture Notes in Business Information Processing","Exploring Services Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-32689-4_53","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T05:14:39Z","timestamp":1558502079000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-32689-4_53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319326887","9783319326894"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-32689-4_53","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"19 May 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}