{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T04:18:28Z","timestamp":1745986708901,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":40,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642297519"},{"type":"electronic","value":"9783642297526"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-29752-6_27","type":"book-chapter","created":{"date-parts":[[2013,1,2]],"date-time":"2013-01-02T06:22:01Z","timestamp":1357107721000},"page":"365-379","source":"Crossref","is-referenced-by-count":8,"title":["Securing the Access to Electronic Health Records on Mobile Phones"],"prefix":"10.1007","author":[{"given":"Alexandra","family":"Dmitrienko","sequence":"first","affiliation":[]},{"given":"Zecir","family":"Hadzic","sequence":"additional","affiliation":[]},{"given":"Hans","family":"L\u00f6hr","sequence":"additional","affiliation":[]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[]},{"given":"Marcel","family":"Winandy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","unstructured":"Aggarwal, M., Vennon, T.: Study of BlackBerry proof-of-concept malicious applications. Technical Report White paper, SMobile Global Threat Center (January 2010)"},{"key":"27_CR2","unstructured":"Agreiter, B., Alam, M., Hafner, M., Seifert, J.P., Zhang, X.: Model driven configuration of secure operating systems for mobile applications in healthcare. In: Proceedings of the 1st International Workshop on Mode-Based Trustworthy Health Information Systems (2007)"},{"key":"27_CR3","unstructured":"Akinyele, J.A., Lehmann, C.U., Green, M.D., Pagano, M.W., Peterson, Z.N.J., Rubin, A.D.: Self-protecting electronic medical records using attribute-based encryption. Cryptology ePrint Archive, Report 2010\/565 (2010), http:\/\/eprint.iacr.org\/2010\/565"},{"key":"27_CR4","unstructured":"Alves, T., Felton, D.: TrustZone: Integrated hardware and software security. Technical report, ARM (July 2004)"},{"key":"27_CR5","unstructured":"Anderson, J.P.: Computer security technology planning study. Technical Report ESD-TR-73-51, AFSC, Hanscom AFB, Bedford, MA, AD-758 206, ESD\/AFSC (October 1972)"},{"key":"27_CR6","unstructured":"Android Open Source Project. Project website (2010), http:\/\/www.android.com"},{"key":"27_CR7","unstructured":"Apple Inc. iOS website (2010), http:\/\/www.apple.com\/iphone\/ios4"},{"key":"27_CR8","unstructured":"Azema, J., Fayad, G.: M-ShieldTMmobile security technology: making wireless secure. Texas Instruments White Paper (February 2008), http:\/\/focus.ti.com\/pdfs\/wtbu\/ti_mshield_whitepaper.pdf"},{"key":"27_CR9","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1007\/978-3-642-11721-3_28","volume-title":"Biomedical Engineering Systems and Technologies","author":"G. Benelli","year":"2010","unstructured":"Benelli, G., Pozzebon, A.: Near Field Communication and Health: Turning a Mobile Phone into an Interactive Multipurpose Assistant in Healthcare Scenarios. In: Fred, A., Filipe, J., Gamboa, H. (eds.) BIOSTEC 2009. CCIS, vol.\u00a052, pp. 356\u2013368. Springer, Heidelberg (2010)"},{"key":"27_CR10","unstructured":"Brygier, J., Fuchsen, R., Blasum, H.: PikeOS: Safe and secure virtualization in a separation microkernel. Technical report, Sysgo (September 2009)"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Dmitrienko, A., Hadzic, Z., L\u00f6hr, H., Sadeghi, A.-R., Winandy, M.: A security architecture for accessing health records on mobile phones. In: Proceedings of the 4th International Conference on Health Informatics (HEALTHINF 2011), pp. 87\u201396. SciTePress (2011)","DOI":"10.5220\/0003171100870096"},{"key":"27_CR12","unstructured":"EMSCB Project Consortium. The European Multilaterally Secure Computing Base (EMSCB) project (2005-2008), http:\/\/www.emscb.org"},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Fraim, L.: SCOMP: A solution to the multilevel security problem. IEEE Computer, 26\u201334 (July 1983)","DOI":"10.1109\/MC.1983.1654440"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Gajek, S., L\u00f6hr, H., Sadeghi, A.-R., Winandy, M.: TruWallet: Trustworthy and migratable wallet-based web authentication. In: The 2009 ACM Workshop on Scalable Trusted Computing (STC 2009), pp. 19\u201328. ACM (2009)","DOI":"10.1145\/1655108.1655112"},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"Gardner, R.W., Garera, S., Pagano, M.W., Green, M., Rubin, A.D.: Securing medical records on smart phones. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Medical and Home-Care Systems, SPIMACS 2009, pp. 31\u201340. ACM (2009)","DOI":"10.1145\/1655084.1655090"},{"key":"27_CR16","unstructured":"Google Android. Security and permissions (2010), http:\/\/developer.android.com\/intl\/de\/guide\/topics\/security\/security.html"},{"key":"27_CR17","series-title":"CCIS","first-page":"377","volume-title":"BIOSTEC 2008","author":"D. Han","year":"2008","unstructured":"Han, D., Park, S., Lee, M.: THE-MUSS: Mobile U-Health Service System. In: Fred, A., Filipe, J., Gamboa, H. (eds.) BIOSTEC 2008. CCIS, vol.\u00a025, pp. 377\u2013389. Springer, Heidelberg (2008)"},{"key":"27_CR18","unstructured":"Hildon Application Framework. Project website (2010), http:\/\/live.gnome.org\/Hildon"},{"key":"27_CR19","unstructured":"Iozzo, V., Weinmann, R.-P.: Ralf-Philipp Weinmann & Vincenzo Iozzo own the iPhone at PWN2OWN (March 2010), http:\/\/blog.zynamics.com\/2010\/03\/24\/ralf-philipp-weinmann-vincenzo-iozzo-own-the-iphone-at-pwn2own\/"},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"Karger, P.A., Zurko, M.E., Bonin, D.W., Mason, A.H., Kahn, C.E.: A VMM security kernel for the VAX architecture. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, pp. 2\u201319. IEEE Computer Society, Technical Committee on Security and Privacy (May 1990)","DOI":"10.1109\/RISP.1990.63834"},{"key":"27_CR21","doi-asserted-by":"crossref","unstructured":"Klein, G., Elphinstone, K., Heiser, G., Andronick, J., Cock, D., Derrin, P., Elkaduwe, D., Engelhardt, K., Kolanski, R., Norrish, M., Sewell, T., Tuch, H., Winwood, S.: seL4: Formal verification of an OS kernel. In: Proceedings of the 22nd ACM Symposium on Operating Systems Principles, Big Sky, MT, USA. ACM Press (October 2009)","DOI":"10.1145\/1629575.1629596"},{"key":"27_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/978-3-642-13869-0_3","volume-title":"Trust and Trustworthy Computing","author":"K. Kostiainen","year":"2010","unstructured":"Kostiainen, K., Dmitrienko, A., Ekberg, J.-E., Sadeghi, A.-R., Asokan, N.: Key Attestation from Trusted Execution Environments. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol.\u00a06101, pp. 30\u201346. Springer, Heidelberg (2010)"},{"key":"27_CR23","doi-asserted-by":"crossref","unstructured":"Kostiainen, K., Ekberg, J.-E., Asokan, N., Rantala, A.: On-board credentials with open provisioning. In: ASIACCS 2009: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, pp. 104\u2013115. ACM (2009)","DOI":"10.1145\/1533057.1533074"},{"key":"27_CR24","doi-asserted-by":"crossref","unstructured":"Liedtke, J.: On microkernel construction. In: Proceedings of the 15th ACM Symposium on Operating Systems Principles (SOSP 1995), Copper Mountain Resort, Colorado (December 1995); Appeared as ACM Operating Systems Review 29.5","DOI":"10.1145\/224056.224075"},{"key":"27_CR25","unstructured":"Loscocco, P., Smalley, S.: Integrating flexible support for security policies into the Linux operating system. In: Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference, pp. 29\u201342. USENIX Association (2001)"},{"key":"27_CR26","unstructured":"Lua. Project website (2010), http:\/\/www.lua.org"},{"key":"27_CR27","unstructured":"Maemo. Project website (2010), http:\/\/maemo.org"},{"key":"27_CR28","unstructured":"Microsoft. Windows mobile website (2010), http:\/\/www.microsoft.com\/windowsmobile"},{"key":"27_CR29","unstructured":"Open Kernel Labs. OKL4 project website (2010), http:\/\/okl4.org"},{"key":"27_CR30","unstructured":"Paros. Project website (2010), http:\/\/www.parosproxy.org"},{"key":"27_CR31","unstructured":"Picciotto, J., Epstein, J.: Trusting X: Issues in building Trusted X window systems \u2013or\u2013 what\u2019s not trusted about X? In: 14th National Computer Security Conference (1991)"},{"key":"27_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/978-3-642-13869-0_6","volume-title":"Trust and Trustworthy Computing","author":"M. Selhorst","year":"2010","unstructured":"Selhorst, M., St\u00fcble, C., Feldmann, F., Gnaida, U.: Towards a Trusted Mobile Desktop. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol.\u00a06101, pp. 78\u201394. Springer, Heidelberg (2010)"},{"key":"27_CR33","doi-asserted-by":"crossref","unstructured":"Shapiro, J.S., Smith, J.M., Farber, D.J.: EROS: a fast capability system. In: Proceedings of the 17th ACM Symposium on Operating Systems Principles (SOSP 1999), Kiawah Island Resort, near Charleston, Sout Carolina, pp. 170\u2013185 (December 1999); Appeared as ACM Operating Systems Review 33.5","DOI":"10.1145\/319344.319163"},{"key":"27_CR34","doi-asserted-by":"crossref","unstructured":"Sunyaev, A., Leimeister, J.M., Krcmar, H.: Open security issues in german healthcare telematics. In: Proceedings of the 3rd International Conference on Health Informatics, HEALTHINF 2010, pp. 187\u2013194. INSTICC (2010)","DOI":"10.5220\/0002694801870194"},{"key":"27_CR35","unstructured":"Symbian Foundation Community. Project website (2010), http:\/\/www.symbian.org"},{"key":"27_CR36","unstructured":"The OpenTC Project Consortium. The Open Trusted Computing (OpenTC) project (2005-2009), http:\/\/www.opentc.net"},{"key":"27_CR37","unstructured":"Felton, D., Alves, T.: TrustZone: Integrated Hardware and Software Security (July 2004), http:\/\/www.arm.com\/pdfs\/TZ%20Whitepaper.pdf"},{"key":"27_CR38","unstructured":"Trusted\u00a0Computing Group. TPM Main Specification, Version 1.2 rev. 103 (July 2007), http:\/\/www.trustedcomputinggroup.org"},{"key":"27_CR39","unstructured":"Vennon, T.: Android malware. A study of known and potential malware threats. Technical Report White paper, SMobile Global Threat Center (February 2010)"},{"issue":"5","key":"27_CR40","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1002\/sec.46","volume":"1","author":"D. Vouyioukas","year":"2008","unstructured":"Vouyioukas, D., Kambourakis, G., Maglogiannis, I., Rouskas, A., Kolias, C., Gritzalis, S.: Enabling the provision of secure web based m-health services utilizing xml based security models. Security and Communication Networks\u00a01(5), 375\u2013388 (2008)","journal-title":"Security and Communication Networks"}],"container-title":["Communications in Computer and Information Science","Biomedical Engineering Systems and Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29752-6_27.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T15:33:59Z","timestamp":1745940839000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29752-6_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642297519","9783642297526"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29752-6_27","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2013]]}}}