{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:05:15Z","timestamp":1725869115623},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491080"},{"type":"electronic","value":"9783319491097"}],"license":[{"start":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:00:00Z","timestamp":1477094400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-49109-7_4","type":"book-chapter","created":{"date-parts":[[2016,10,21]],"date-time":"2016-10-21T05:03:15Z","timestamp":1477026195000},"page":"35-47","source":"Crossref","is-referenced-by-count":0,"title":["An Access Control Architecture for Protecting Health Information Systems"],"prefix":"10.1007","author":[{"given":"Angelo","family":"Esposito","sequence":"first","affiliation":[]},{"given":"Mario","family":"Sicuranza","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Ciampi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,22]]},"reference":[{"key":"4_CR1","unstructured":"ISO\/TR 20514:2005, Health informatics -- Electronic health record -- Definition, scope and context"},{"key":"4_CR2","unstructured":"D. Kalra and B.G. Blobel, \u201cSemantic interoperability of EHR systems\u201d, Stud Health Technol Inform. 2007;127:231-45."},{"key":"4_CR3","unstructured":"M.T. Chiaravalloti, M. Ciampi, E. Pasceri, M. Sicuranza, G. De Pietro, and R. Guarasci, \u201cA model for realizing interoperable EHR systems in Italy\u201d, 15th International HL7 Interoperability Conference (IHIC 2015), Prague, Czech Republic"},{"key":"4_CR4","doi-asserted-by":"publisher","unstructured":"M. Deng, R. Scandariato, D. de Cock; B. Preneel and W. Joosen, \u201cIdentity in federated electronic healthcare,\u201d in Wireless Days, 2008. WD \u201808. 1st IFIP , vol., no., pp. 1-5, 24-27 Nov. 2008,doi: 10.1109\/WD.2008.4812919","DOI":"10.1109\/WD.2008.4812919"},{"key":"4_CR5","unstructured":"OASIS eXtensible Access Control Markup Language (XACML), online at https:\/\/www.oasisopen.org\/committees\/tc_home.php?wg_abbrev=xacml (Access date: 30 January 2016)"},{"key":"4_CR6","unstructured":"IHE IT Infrastructure Technical Framework - Registry Stored Query Transaction for XDS Profile [ITI 18]"},{"key":"4_CR7","unstructured":"IHE IT Infrastructure Technical - Retrieve Document Set for XDS Profile [ITI-43]."},{"key":"4_CR8","unstructured":"IHE IT Infrastructure Technical - Register Document Set-b for XDS Profile [ITI-42]"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"M. Sicuranza, A. Esposito and M. Ciampi \u201cA View-Based Access Control Model for EHR Systems\u201d, Intelligent Distributed Computing VIII p. 443-452,2015 Springer International Publishing","DOI":"10.1007\/978-3-319-10422-5_46"},{"key":"4_CR10","unstructured":"HL7 Version 3 Standard: Privacy, Access and Security Services Security Labeling Service (SLS)"},{"key":"4_CR11","unstructured":"HL7 Version 3 Clinical Document Architecture (CDA) Release 2, https:\/\/www.hl7.org\/implement\/standards\/product brief.cfm?product id\u00a0=\u00a07 (Access date: 30 August 2016)"},{"key":"4_CR12","unstructured":"IHE IT Infrastructure Technical - Delete Document Set [ITI-62]"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"V. C. Hu, D. R. Kuhn and D. F. Ferraiolo, \u201cAttribute-Based Access Control\u201d, in Computer, vol. 48, no. 2, pp. 85-88, Feb. 2015.","DOI":"10.1109\/MC.2015.33"},{"key":"4_CR14","unstructured":"Logical Observation Identifiers Names and Codes - https:\/\/loinc.org (Access date: 30 August 2016)"},{"key":"4_CR15","unstructured":"The International Classification of Diseases, 9th Revision, Clinical Modification - http:\/\/www.salute.gov.it\/portale\/temi\/p 2_6.jsp?id\u00a0=\u00a01278&area\u00a0=\u00a0ricoveriOspedalieri&menu\u00a0=\u00a0classificazione (Access date: 30 August 2016)"},{"key":"4_CR16","unstructured":"Integrating the Healthcare Enterprise (IHE) - https:\/\/www.ihe.net (Access date: 30 August 2016)"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Flora Amato, Giuseppe De Pietro, Massimo Esposito, Nicola Mazzocca, An integrated framework for securing semi-structured health records, Knowledge-Based Systems, Volume 79, May 2015, Pages 99-117, ISSN 0950-7051.","DOI":"10.1016\/j.knosys.2015.02.004"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"R. Bhatia and M. Singh, \u201cAn Implementation Model for Privacy Aware Access Control in Web Services Environment\u201d, Proceedings of International Conference on ICT for Sustainable Development: ICT4SD 2015 Volume 1, pp. 475-484, 2016","DOI":"10.1007\/978-981-10-0129-1_50"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Hongjiao Li, Shan Wang, Xiuxia Tian, Weimin Wei and Chaochao Sun \u201cA Survey of Extended Role-Based Access Control in Cloud Computing\u201d, Proceedings of the 4th International Conference on Computer Engineering and Networks, pp 821-831, 2015","DOI":"10.1007\/978-3-319-11104-9_95"},{"key":"4_CR20","unstructured":"\u201cIEEE Standard Glossary of Software Engineering Terminology\u201d, IEEE Std 610.12-1990."},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"I. Mac\u00eda, \u201cTowards a semantic interoperability environment,\u201d e-Health Networking, Applications and Services (Healthcom), 2014 IEEE 16th International Conference on, Natal, 2014, pp. 543-548.","DOI":"10.1109\/HealthCom.2014.7001900"},{"key":"4_CR22","unstructured":"Flora Amato and Francesco Moscato. 2015. A model driven approach to data privacy verification in EHealth systems. Trans. Data Privacy 8, 3 (December 2015), 273-296."},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"R. Bhatti, E. Bertino, A. Ghafoor, \u201cA Trust-Based Context-Aware Access Control Model for Web-Services\u201d, Distributed and Parallel Databases, pp 83-105, 2005.","DOI":"10.1007\/s10619-005-1075-7"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"L. Boursas and V. A. Danciu, \u201cDynamic inter-organizational cooperation setup in Circle-of-Trust environments,\u201d NOMS 2008 - 2008 IEEE Network Operations and Management Symposium, Salvador, Bahia, 2008, pp. 113-120.","DOI":"10.1109\/NOMS.2008.4575124"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"J. Classen, J. Braun, F. Volk, M. Hollick, J. Buchmann and M. M\u00fchlh\u00e4user, \u201cA Distributed Reputation System for Certification Authority Trust Management,\u201d Trustcom\/BigDataSE\/ISPA, 2015 IEEE, Helsinki, 2015, pp. 1349-1356.","DOI":"10.1109\/Trustcom.2015.529"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on P2P, Parallel, Grid, Cloud and Internet Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49109-7_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T17:59:42Z","timestamp":1568483982000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49109-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,22]]},"ISBN":["9783319491080","9783319491097"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49109-7_4","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2016,10,22]]}}}