{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:34:34Z","timestamp":1725550474876},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642117206"},{"type":"electronic","value":"9783642117213"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-11721-3_29","type":"book-chapter","created":{"date-parts":[[2010,3,22]],"date-time":"2010-03-22T08:59:31Z","timestamp":1269248371000},"page":"369-380","source":"Crossref","is-referenced-by-count":1,"title":["Electronic Health Records: An Enhanced Security Paradigm to Preserve Patient\u2019s Privacy"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Slamanig","sequence":"first","affiliation":[]},{"given":"Christian","family":"Stingl","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","unstructured":"HI: Harris Interactive, Survey on Medical Privacy (2004), \n                    \n                      http:\/\/www.harrisinteractive.com\/news\/newsletters\/healthnews\/HI_HealthCareNews2004Vol4_Iss13.pdf"},{"issue":"11","key":"29_CR2","first-page":"17","volume":"10","author":"C. Pyper","year":"2004","unstructured":"Pyper, C., Amery, J., Watson, M., Crook, C.: Access to Electronic health records in primary care \u2013 a survey of patients\u2019 views. Med. Sci. Monit.\u00a010(11), 17\u201322 (2004)","journal-title":"Med. Sci. Monit."},{"key":"29_CR3","unstructured":"TCG: Trusted Computing Group (2008), \n                    \n                      http:\/\/www.trustedcomputinggroup.org"},{"key":"29_CR4","unstructured":"CSI: Computer Crime and Security Survey 2007, Computer Security Institute (2007), \n                    \n                      http:\/\/www.gocsi.com\/forms\/csisurvey.jhtml"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Pfitzmann, A., K\u00f6hntopp, M.: Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology. In: Workshop on Design Issues in Anonymity and Unobservability, pp. 1\u20139 (2000)","DOI":"10.1007\/3-540-44702-4_1"},{"issue":"1","key":"29_CR6","first-page":"13","volume":"34","author":"K.T. Win","year":"2005","unstructured":"Win, K.T.: A review of security of electronic health records. HIM J.\u00a034(1), 13\u201318 (2005)","journal-title":"HIM J."},{"key":"29_CR7","volume-title":"Computer Security: Art and Science","author":"M. Bishop","year":"2002","unstructured":"Bishop, M.: Computer Security: Art and Science. Addison-Wesley, Reading (2002)"},{"key":"29_CR8","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1504\/IJBIDM.2008.022135","volume":"3","author":"C. Stingl","year":"2008","unstructured":"Stingl, C., Slamanig, D.: Privacy Enhancing Methods for eHealth Applications: How to Prevent Statistical Analyses and Attacks. Int. J. Business Intelligence and Data Mining\u00a03, 236\u2013254 (2008)","journal-title":"Int. J. Business Intelligence and Data Mining"},{"key":"29_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1007\/978-3-540-40956-4_3","volume-title":"Privacy Enhancing Technologies","author":"S. Steinbrecher","year":"2003","unstructured":"Steinbrecher, S., K\u00f6psell, S.: Modelling Unlinkability. In: Dingledine, R. (ed.) PET 2003. LNCS, vol.\u00a02760, pp. 32\u201347. Springer, Heidelberg (2003)"},{"key":"29_CR10","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1109\/ARES.2007.22","volume-title":"Proceedings of the The Second International Conference on Availability, Reliability and Security (ARES 2007)","author":"B. Riedl","year":"2007","unstructured":"Riedl, B., Neubauer, T., Goluch, G., Boehm, O., Reinauer, G., Krumboeck, A.: A Secure Architecture for the Pseudonymization of Medical Data. In: Proceedings of the The Second International Conference on Availability, Reliability and Security (ARES 2007), pp. 318\u2013324. IEEE Computer Society, Los Alamitos (2007)"},{"key":"29_CR11","doi-asserted-by":"publisher","first-page":"23","DOI":"10.4304\/jsw.3.2.23-32","volume":"3","author":"B. Riedl","year":"2008","unstructured":"Riedl, B., Grascher, V., Neubauer, T.: A Secure e-Health Architecture based on the Appliance of Pseudonymization. Journal of Software\u00a03, 23\u201332 (2008)","journal-title":"Journal of Software"},{"key":"29_CR12","unstructured":"Slamanig, D., Stingl, C., Lackner, G., Payer, U.: Preserving Privacy in a Web-based Multiuser-System (German). In: Horster, P. (ed.) Proceedings of DACH-Security 2007, pp. 98\u2013110. IT-Verlag (2007)"},{"key":"29_CR13","unstructured":"Danezis, G., Diaz, C.: A Survey of Anonymous Communication Channels. Technical Report MSR-TR-2008-35, Microsoft Research (2008)"},{"key":"29_CR14","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proceedings of the 13th USENIX Security Symposium, p. 21 (2004)","DOI":"10.21236\/ADA465464"},{"key":"29_CR15","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Trust, Privacy, and Security in Digital Business","author":"H. Federrath","year":"2005","unstructured":"Federrath, H.: Privacy Enhanced Technologies: Methods, Markets, Misuse. In: Katsikas, S.K., L\u00f3pez, J., Pernul, G. (eds.) TrustBus 2005. LNCS, vol.\u00a03592, pp. 1\u20139. Springer, Heidelberg (2005)"},{"key":"29_CR16","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/SECPRI.2003.1199323","volume-title":"SP 2003: Proceedings of the 2003 IEEE Symposium on Security and Privacy","author":"G. Danezis","year":"2003","unstructured":"Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: Design of a Type III Anonymous Remailer Protocol. In: SP 2003: Proceedings of the 2003 IEEE Symposium on Security and Privacy, Washington, DC, USA, pp. 2\u201315. IEEE Computer Society, Los Alamitos (2003)"},{"key":"29_CR17","doi-asserted-by":"crossref","unstructured":"Boneh, D., Franklin, M.: Anonymous authentication with subset queries. In: Proc. of the 6th ACM conference on Computer and communications security, pp. 113\u2013119 (1999)","DOI":"10.1145\/319709.319725"},{"key":"29_CR18","unstructured":"Lindell, Y.: Anonymous Authenticaion. Whitepaper Aladdin Knowledge Systems, 2007 (2007), \n                    \n                      http:\/\/www.aladdin.com\/blog\/pdf\/AnonymousAuthentication.pdf"},{"key":"29_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/3-540-48390-X_14","volume-title":"Financial Cryptography","author":"S. Schechter","year":"1999","unstructured":"Schechter, S., Parnell, T., Hartemink, A.: Anonymous Authentication of Membership in Dynamic Groups. In: Franklin, M.K. (ed.) FC 1999. LNCS, vol.\u00a01648, pp. 184\u2013195. Springer, Heidelberg (1999)"},{"key":"29_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/3-540-44598-6_16","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"G. Ateniese","year":"2000","unstructured":"Ateniese, G., Camenisch, J., Joye, M., Tsudik, G.: A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 255\u2013270. Springer, Heidelberg (2000)"},{"key":"29_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"D. Chaum","year":"1991","unstructured":"Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 257\u2013265. Springer, Heidelberg (1991)"},{"key":"29_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1007\/3-540-45682-1_32","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"R.L. Rivest","year":"2001","unstructured":"Rivest, R.L., Shamir, A., Tauman, Y.: How to Leak a Secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 552\u2013565. Springer, Heidelberg (2001)"},{"key":"29_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1007\/978-3-540-24676-3_36","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"Y. Dodis","year":"2004","unstructured":"Dodis, Y., Kiayias, A., Nicolosi, A., Shoup, V.: Anonymous Identification in Ad Hoc Groups. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 609\u2013626. Springer, Heidelberg (2004)"},{"key":"29_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1007\/3-540-45708-9_31","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"M. Naor","year":"2002","unstructured":"Naor, M.: Deniable Ring Authentication. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 481\u2013498. Springer, Heidelberg (2002)"},{"key":"29_CR25","unstructured":"Stingl, C., Slamanig, D., Rauner-Reithmayer, D., Fischer, H.: Realization of a Secure and Centralized Data Repository (German). In: Horster, P. (ed.) Proceedings of DACH Security 2006, pp. 32\u201345. IT-Verlag (2006)"},{"key":"29_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/11552055_15","volume-title":"Communications and Multimedia Security","author":"L. Demuynck","year":"2005","unstructured":"Demuynck, L., Decker, B.D.: Privacy-Preserving Electronic Health Records. In: Dittmann, J., Katzenbeisser, S., Uhl, A. (eds.) CMS 2005. LNCS, vol.\u00a03677, pp. 150\u2013159. Springer, Heidelberg (2005)"},{"key":"29_CR27","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM\u00a024, 84\u201390 (1981)","journal-title":"Commun. ACM"},{"key":"29_CR28","doi-asserted-by":"publisher","first-page":"1226","DOI":"10.1109\/ARES.2008.115","volume-title":"Proceedings of the The Third International Conference on Availability, Reliability and Security (ARES 2008)","author":"D. Slamanig","year":"2008","unstructured":"Slamanig, D., Stingl, C.: Privacy Aspects of eHealth. In: Proceedings of the The Third International Conference on Availability, Reliability and Security (ARES 2008), pp. 1226\u20131233. IEEE Computer Society, Los Alamitos (2008)"},{"key":"29_CR29","series-title":"IFIP International Federation for Information Processing","volume-title":"The Future of Identity in the Informaton Society - Challenges for Privacy and Security","author":"D. Slamanig","year":"2009","unstructured":"Slamanig, D., Stingl, C.: Investigating Anonymity in Group Based Anonymous Authentication. In: Svenda, P. (ed.) The Future of Identity in the Informaton Society - Challenges for Privacy and Security. IFIP International Federation for Information Processing. Springer, Boston (2009)"}],"container-title":["Communications in Computer and Information Science","Biomedical Engineering Systems and Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11721-3_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T21:42:52Z","timestamp":1558388572000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11721-3_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642117206","9783642117213"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11721-3_29","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}