{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T04:20:58Z","timestamp":1743135658837,"version":"3.40.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319678153"},{"type":"electronic","value":"9783319678160"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67816-0_6","type":"book-chapter","created":{"date-parts":[[2017,9,12]],"date-time":"2017-09-12T10:43:16Z","timestamp":1505212996000},"page":"86-103","source":"Crossref","is-referenced-by-count":1,"title":["Private Verification of Access on Medical Data: An Initial Study"],"prefix":"10.1007","author":[{"given":"Tha\u00eds Bardini","family":"Idalino","sequence":"first","affiliation":[]},{"given":"Dayana","family":"Spagnuelo","sequence":"additional","affiliation":[]},{"given":"Jean Everson","family":"Martina","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,13]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Barker, E.: NIST Special Publication 800-57 Part 1 Revision 4\u2014Recommendation for Key Management (Part 1: General) (2016)","DOI":"10.6028\/NIST.SP.800-57pt1r4"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506\u2013522. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-24676-3_30"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/978-3-642-40084-1_26","volume-title":"Advances in Cryptology \u2013 CRYPTO 2013","author":"D Boneh","year":"2013","unstructured":"Boneh, D., Raghunathan, A., Segev, G.: Function-private identity-based encryption: hiding the function in functional encryption. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8043, pp. 461\u2013478. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-40084-1_26"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/978-3-540-70936-7_29","volume-title":"Theory of Cryptography","author":"D Boneh","year":"2007","unstructured":"Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535\u2013554. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-70936-7_29"},{"issue":"2","key":"6_CR5","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/2636328","volume":"47","author":"C B\u00f6sch","year":"2015","unstructured":"B\u00f6sch, C., Hartel, P., Jonker, W., Peter, A.: A survey of provably secure searchable encryption. ACM Comput. Surv. (CSUR) 47(2), 18 (2015)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-642-33383-5_14","volume-title":"Information Security","author":"C B\u00f6sch","year":"2012","unstructured":"B\u00f6sch, C., Tang, Q., Hartel, P., Jonker, W.: Selective document retrieval from encrypted database. In: Gollmann, D., Freiling, F.C. (eds.) ISC 2012. LNCS, vol. 7483, pp. 224\u2013241. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-33383-5_14"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-319-06410-9_12","volume-title":"FM 2014: Formal Methods","author":"D Butin","year":"2014","unstructured":"Butin, D., Le M\u00e9tayer, D.: Log analysis for data protection accountability. In: Jones, C., Pihlajasaari, P., Sun, J. (eds.) FM 2014. LNCS, vol. 8442, pp. 163\u2013178. Springer, Cham (2014). doi: 10.1007\/978-3-319-06410-9_12"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/978-3-642-40041-4_20","volume-title":"Advances in Cryptology \u2013 CRYPTO 2013","author":"D Cash","year":"2013","unstructured":"Cash, D., Jarecki, S., Jutla, C., Krawczyk, H., Ro\u015fu, M.-C., Steiner, M.: Highly-scalable searchable symmetric encryption with support for boolean queries. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8042, pp. 353\u2013373. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-40041-4_20"},{"key":"6_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/11496137_30","volume-title":"Applied Cryptography and Network Security","author":"Y-C Chang","year":"2005","unstructured":"Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442\u2013455. Springer, Heidelberg (2005). doi: 10.1007\/11496137_30"},{"issue":"5","key":"6_CR10","doi-asserted-by":"publisher","first-page":"895","DOI":"10.3233\/JCS-2011-0426","volume":"19","author":"R Curtmola","year":"2011","unstructured":"Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895\u2013934 (2011)","journal-title":"J. Comput. Secur."},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/978-3-319-17533-1_35","volume-title":"Information Security Practice and Experience","author":"J Dreier","year":"2015","unstructured":"Dreier, J., Giustolisi, R., Kassem, A., Lafourcade, P., Lenzini, G.: A framework for analyzing verifiability in traditional and electronic exams. In: Lopez, J., Wu, Y. (eds.) ISPEC 2015. LNCS, vol. 9065, pp. 514\u2013529. Springer, Cham (2015). doi: 10.1007\/978-3-319-17533-1_35"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Dreier, J., Jonker, H., Lafourcade, P.: Defining verifiability in e-auction protocols. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 547\u2013552. ACM (2013)","DOI":"10.1145\/2484313.2484387"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Fisch, B.A., Vo, B., Krell, F., Kumarasubramanian, A., Kolesnikov, V., Malkin, T., Bellovin, S.M.: Malicious-client security in blind seer: a scalable private DBMS. In: 2015 IEEE Symposium on Security and Privacy (SP), pp. 395\u2013410. IEEE (2015)","DOI":"10.1109\/SP.2015.31"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Flores, A.E., Vergara, V.M.: Functionalities of open electronic health records system: a follow-up study. In: 6th International Conference on Biomedical Engineering and Informatics, pp. 602\u2013607. IEEE (2013)","DOI":"10.1109\/BMEI.2013.6747011"},{"key":"6_CR15","unstructured":"Gajanayake, R., Sahama, T.R., Lane, B., Grunwell, D.: Designing an information accountability framework for eHealth. In: IEEE Healthcom 2013 15th International Conference on E-Health Networking, Application and Services. Instituto Superior de Ci\u00eancias Sociais e Pol\u00edticas - Technical University of Lisbon, Lisbon, Portugal, June 2013. https:\/\/eprints.qut.edu.au\/60690\/"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Gentry, C.: A fully homomorphic encryption scheme. Ph.D. thesis, Stanford University (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"6_CR17","unstructured":"Goh, E.J., et al.: Secure indexes. IACR Cryptology ePrint Archive 2003, 216 (2003). http:\/\/eprint.iacr.org\/2003\/216"},{"issue":"3","key":"6_CR18","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1145\/233551.233553","volume":"43","author":"O Goldreich","year":"1996","unstructured":"Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious RAMs. J. ACM (JACM) 43(3), 431\u2013473 (1996)","journal-title":"J. ACM (JACM)"},{"key":"6_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-540-24852-1_3","volume-title":"Applied Cryptography and Network Security","author":"P Golle","year":"2004","unstructured":"Golle, P., Staddon, J., Waters, B.: Secure conjunctive keyword search over encrypted data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 31\u201345. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-24852-1_3"},{"key":"6_CR20","unstructured":"Grunwell, D., Gajanayake, R., Sahama, T.: The security and privacy of usage policies and provenance logs in an information accountability framework. In: Proceedings of the Eighth Australasian Workshop on Health Informatics and Knowledge Management (HIKM2015), vol. 164, pp. 33\u201340. Australian Computer Society (2015)"},{"issue":"2","key":"6_CR21","doi-asserted-by":"publisher","first-page":"e26","DOI":"10.1016\/j.ijmedinf.2010.10.001","volume":"80","author":"S Haas","year":"2011","unstructured":"Haas, S., Wohlgemuth, S., Echizen, I., Sonehara, N., M\u00fcller, G.: Aspects of privacy for electronic health records. Int. J. Med. Inf. 80(2), e26\u2013e31 (2011)","journal-title":"Int. J. Med. Inf."},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Hu, V.C., Ferraiolo, D., Kuhn, D.R.: Assessment of access control systems. US Department of Commerce, National Institute of Standards and Technology (2006)","DOI":"10.6028\/NIST.IR.7316"},{"key":"6_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/978-3-319-56617-7_4","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2017","author":"S Kamara","year":"2017","unstructured":"Kamara, S., Moataz, T.: Boolean searchable symmetric encryption with worst-case sub-linear complexity. In: Coron, J.-S., Nielsen, J.B. (eds.) EUROCRYPT 2017. LNCS, vol. 10212, pp. 94\u2013124. Springer, Cham (2017). doi: 10.1007\/978-3-319-56617-7_4"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"King, J.T., Smith, B., Williams, L.: Modifying without a trace: general audit guidelines are inadequate for open-source electronic health record audit mechanisms. In: Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium, pp. 305\u2013314. ACM (2012)","DOI":"10.1145\/2110363.2110399"},{"key":"6_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-642-15497-3_24","volume-title":"Computer Security \u2013 ESORICS 2010","author":"S Kremer","year":"2010","unstructured":"Kremer, S., Ryan, M., Smyth, B.: Election verifiability in electronic voting protocols. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 389\u2013404. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-15497-3_24"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Kurosawa, K.: Garbled searchable symmetric encryption. In: Financial Cryptography, vol. 2014, pp. 234\u2013251 (2014)","DOI":"10.1007\/978-3-662-45472-5_15"},{"key":"6_CR27","unstructured":"Marshall, G.: Security audit and access accountability message XML. Technical report, RFC 3881 (2004)"},{"key":"6_CR28","unstructured":"Microsoft: Microsoft Privacy Statement (2017). https:\/\/privacy.microsoft.com\/en-gb\/privacystatement . Accessed 15 May 2017"},{"key":"6_CR29","doi-asserted-by":"crossref","unstructured":"Moataz, T., Shikfa, A.: Boolean symmetric searchable encryption. In: Proceedings of the 8th ACM SIGSAC symposium on Information, Computer and Communications Security, pp. 265\u2013276. ACM (2013)","DOI":"10.1145\/2484313.2484347"},{"key":"6_CR30","doi-asserted-by":"crossref","unstructured":"Pappas, V., Krell, F., Vo, B., Kolesnikov, V., Malkin, T., Choi, S.G., George, W., Keromytis, A., Bellovin, S.: Blind seer: a scalable private DBMS. In: 2014 IEEE Symposium on Security and Privacy (SP), pp. 359\u2013374. IEEE (2014)","DOI":"10.1109\/SP.2014.30"},{"key":"6_CR31","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/978-3-319-41763-9_21","volume-title":"Privacy and Identity Management. Time for a Revolution?","author":"J Reuben","year":"2016","unstructured":"Reuben, J., Martucci, L.A., Fischer-H\u00fcbner, S.: Automated log audits for privacy compliance validation: a literature survey. In: Aspinall, D., Camenisch, J., Hansen, M., Fischer-H\u00fcbner, S., Raab, C. (eds.) Privacy and Identity 2015. IAICT, vol. 476, pp. 312\u2013326. Springer, Cham (2016). doi: 10.1007\/978-3-319-41763-9_21"},{"key":"6_CR32","doi-asserted-by":"crossref","unstructured":"R\u00f8stad, L.: An initial model and a discussion of access control in patient controlled health records. In: 2008 Third International Conference on Availability, Reliability and Security, ARES 2008, pp. 935\u2013942. IEEE (2008)","DOI":"10.1109\/ARES.2008.185"},{"key":"6_CR33","doi-asserted-by":"crossref","unstructured":"Seneviratne, O., Kagal, L.: Enabling privacy through transparency. In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust (PST), pp. 121\u2013128. IEEE (2014)","DOI":"10.1109\/PST.2014.6890931"},{"key":"6_CR34","doi-asserted-by":"crossref","unstructured":"Shi, E., Bethencourt, J., Chan, T.H., Song, D., Perrig, A.: Multi-dimensional range query over encrypted data. In: 2007 IEEE Symposium on Security and Privacy, SP 2007, pp. 350\u2013364. IEEE (2007)","DOI":"10.1109\/SP.2007.29"},{"key":"6_CR35","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: 2000 IEEE Symposium on Security and Privacy, S&P 2000, Proceedings, pp. 44\u201355. IEEE (2000)"},{"issue":"1","key":"6_CR36","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1007\/s10916-016-0653-8","volume":"41","author":"D Spagnuelo","year":"2017","unstructured":"Spagnuelo, D., Lenzini, G.: Transparent medical data systems. J. Med. Syst. 41(1), 8 (2017)","journal-title":"J. Med. Syst."},{"key":"6_CR37","first-page":"5","volume":"4","author":"BR Waters","year":"2004","unstructured":"Waters, B.R., Balfanz, D., Durfee, G., Smetters, D.K.: Building an encrypted and searchable audit log. NDSS 4, 5\u20136 (2004)","journal-title":"NDSS"},{"key":"6_CR38","doi-asserted-by":"crossref","unstructured":"Wickramage, C., Sahama, T., Fidge, C.: Anatomy of log files: implications for information accountability measures. In: 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/HealthCom.2016.7749426"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management, Cryptocurrencies and Blockchain Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67816-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,17]],"date-time":"2020-10-17T13:32:14Z","timestamp":1602941534000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-67816-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319678153","9783319678160"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67816-0_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}