{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T04:16:10Z","timestamp":1742962570236,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642290923"},{"type":"electronic","value":"9783642290930"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29093-0_18","type":"book-chapter","created":{"date-parts":[[2012,4,9]],"date-time":"2012-04-09T10:40:40Z","timestamp":1333968040000},"page":"187-196","source":"Crossref","is-referenced-by-count":0,"title":["e-Health for Rural Areas in Developing Countries: Lessons from the Sebokeng Experience"],"prefix":"10.1007","author":[{"given":"Massimiliano","family":"Masi","sequence":"first","affiliation":[]},{"given":"Rosario","family":"Pugliese","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Tiezzi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"Health Level Seven organization: Hl7 standards (2009), http:\/\/www.hl7.org"},{"key":"18_CR2","unstructured":"The epSOS project: An European eHealth Project (2010), http:\/\/www.epsos.eu"},{"key":"18_CR3","unstructured":"The Nationwide Health Information Network (NHIN): An American eHealth Project (2009), http:\/\/healthit.hhs.gov\/portal\/server.pt (last visited on July 4, 2011)"},{"key":"18_CR4","unstructured":"The IHE Initiative: IT Infrastructure Technical Framework (2009), http:\/\/www.ihe.net"},{"key":"18_CR5","unstructured":"ACR-NEMA: Digital Imaging and Communications in Medicine (DICOM) (1995)"},{"key":"18_CR6","unstructured":"OASIS Security Services TC: Assertions and protocols for the OASIS security assertion markup language (SAML) v2.02 (2005), http:\/\/docs.oasis-open.org\/security\/saml\/v2.0\/saml-core-2.0-os.pdf ."},{"key":"18_CR7","unstructured":"Mosupi, M.: Gauteng Department of Health (GDoH): E-HR.GP, System Implementation (2008), http:\/\/www.ihe-austria.at\/fileadmin\/user_upload\/CAT2009\/documents\/MmakgosiMosupiIHE_Conference_Presentation_220409.pdf (last visited on July 4, 2011)"},{"key":"18_CR8","unstructured":"Wikipedia, the free encyclopedia: Sebokeng, Gauteng. Wikipedia entry, http:\/\/en.wikipedia.org\/wiki\/Sebokeng,_Gauteng (last visited on July 4, 2011)"},{"key":"18_CR9","unstructured":"Masi, M., Pugliese, R., Tiezzi, F.: Security analysis of standard- driven communication protocols for healthcare scenarios. In: Healthcom, pp. 308\u2013315. IEEE (2011)"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Fantechi, A., Gnesi, S., Lapadula, A., Mazzanti, F., Pugliese, R., Tiezzi, F.: A Logical Verification Methodology for Service-Oriented Computing. ACM Transactions on Software Engineering and Methodology (2011) (to appear)","DOI":"10.1145\/2211616.2211619"},{"key":"18_CR11","unstructured":"Wikipedia, the free encyclopedia: Intrusion Detection Systems. Wikipedia entry, http:\/\/en.wikipedia.org\/wiki\/Intrusion_detection_system (last visited on July 4, 2011)"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Lowe, G.: A Hierarchy of Authentication Specifications. In: CSFW, pp. 31\u201344. IEEE (1997)","DOI":"10.1109\/CSFW.1997.596782"},{"issue":"2","key":"18_CR13","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Transactions on Information Theory\u00a029(2), 198\u2013207 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"key":"18_CR14","unstructured":"The Nationwide Health Information Network (NHIN): Threat models (2009), http:\/\/wiki.directproject.org\/Threat+Models (last visited on July 4, 2011)"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Yarali, A., Ahsant, B., Rahman, S.: Wireless mesh networking: A key solution for emergency & rural applications. In: MESH, pp. 143\u2013149. IEEE (2009)","DOI":"10.1109\/MESH.2009.33"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Armando, A., Carbone, R., Compagna, L., Cuellar, J., Abad, L.: Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-based Single Sign-On for Google Apps. In: FMSE, pp. 1\u201310. ACM (2008)","DOI":"10.1145\/1456396.1456397"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Johnson, J., Langworthy, D., Lamport, L., Vogt, F.: Formal specification of a web services protocol. In: WSFM. ENTCS, vol.\u00a0105, pp. 147\u2013158. Elsevier (2004)","DOI":"10.1016\/j.entcs.2004.02.022"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Blanchet, B.: CryptoVerif: Computationally Sound Mechanized Prover for Cryptographic Protocols. Dagstuhl seminar \u201cFormal Protocol Verification Applied\u201d (2007)","DOI":"10.1109\/SP.2006.1"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Bhargavan, K., Corin, R., Fournet, C., Gordon, A.: Secure sessions for web services. In: SWS, pp. 56\u201366. ACM (2004)","DOI":"10.1145\/1111348.1111355"},{"key":"18_CR20","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1142\/9789812389718_0002","volume":"1","author":"L. Ma","year":"2001","unstructured":"Ma, L., Tsai, J.: Formal verification techniques for computer communication security protocols. Handbook of Software Engineering and Knowledge Engineering\u00a01, 23\u201346 (2001)","journal-title":"Handbook of Software Engineering and Knowledge Engineering"},{"key":"18_CR21","unstructured":"Fidge, C.: A Survey of Verification Techniques for Security Protocols. Technical Report 01-22, Software Verification Research Centre, Univ. of Queensland (2001)"},{"key":"18_CR22","series-title":"LNICST","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-642-23828-4_12","volume-title":"E-Infrastuctures and E-Services for Developing Countries","author":"G. Armellin","year":"2011","unstructured":"Armellin, G., Bogoni, L.P., Chiasera, A., Toai, T.J., Zanella, G.: Enabling Business Intelligence Functions over a Loosely Coupled Environment. In: Popescu-Zeletin, R., Rai, I.A., Jonas, K., Villafiorita, A. (eds.) AFRICOMM 2010. LNICST, vol.\u00a064, pp. 122\u2013131. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","e-Infrastructure and e-Services for Developing Countries"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29093-0_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T17:49:11Z","timestamp":1742924951000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29093-0_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642290923","9783642290930"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29093-0_18","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2012]]}}}