{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T10:54:59Z","timestamp":1775040899274,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":38,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642323546","type":"print"},{"value":"9783642323553","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32355-3_12","type":"book-chapter","created":{"date-parts":[[2012,7,11]],"date-time":"2012-07-11T10:36:41Z","timestamp":1342003001000},"page":"195-206","source":"Crossref","is-referenced-by-count":32,"title":["Challenges in eHealth: From Enabling to Enforcing Privacy"],"prefix":"10.1007","author":[{"given":"Naipeng","family":"Dong","sequence":"first","affiliation":[]},{"given":"Hugo","family":"Jonker","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Pang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Meingast, M., Roosta, T., Sastry, S.S.: Security and privacy issues with health care information technology. In: Proc. 28th Annual Conference of the IEEE Engineering in Medicine and Biology Society, pp. 5453\u20135458. IEEE CS (2006)","DOI":"10.1109\/IEMBS.2006.4398689"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Kotz, D., Avancha, S., Baxi, A.: A privacy framework for mobile health and home-care systems. In: Proc. Workshop on Security and Privacy in Medical and Home-Care Systems, pp. 1\u201312. ACM Press (2009)","DOI":"10.1145\/1655084.1655086"},{"key":"12_CR3","doi-asserted-by":"crossref","first-page":"435","DOI":"10.3233\/JCS-2009-0340","volume":"17","author":"S. Delaune","year":"2009","unstructured":"Delaune, S., Kremer, S., Ryan, M.D.: Verifying privacy-type properties of electronic voting protocols. Journal of Computer Security\u00a017, 435\u2013487 (2009)","journal-title":"Journal of Computer Security"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-642-19751-2_15","volume-title":"Formal Aspects of Security and Trust","author":"N. Dong","year":"2011","unstructured":"Dong, N., Jonker, H.L., Pang, J.: Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus. In: Degano, P., Etalle, S., Guttman, J. (eds.) FAST 2010. LNCS, vol.\u00a06561, pp. 223\u2013238. Springer, Heidelberg (2011)"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Maty\u00e1\u0161, V.: Protecting doctors\u2019 identity in drug prescription analysis. Health Informatics Journal, 205\u2013209 (1998)","DOI":"10.1177\/146045829800400311"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Ateniese, G., de Medeiros, B.: Anonymous e-prescriptions. In: Proc. ACM Workshop on Privacy in the Electronic Society, pp. 19\u201331. ACM Press (2002)","DOI":"10.1145\/644527.644530"},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/978-3-540-69485-4_9","volume-title":"Public Key Infrastructure","author":"B. Decker De","year":"2008","unstructured":"De Decker, B., Layouni, M., Vangheluwe, H., Verslype, K.: A Privacy-Preserving eHealth Protocol Compliant with the Belgian Healthcare System. In: Mj\u00f8lsnes, S.F., Mauw, S., Katsikas, S.K. (eds.) EuroPKI 2008. LNCS, vol.\u00a05057, pp. 118\u2013133. Springer, Heidelberg (2008)"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Anderson, R.: A security policy model for clinical information systems. In: Proc. 17th IEEE Symposium on Security and Privacy, pp. 30\u201343. IEEE CS (1996)","DOI":"10.1109\/SECPRI.1996.502667"},{"key":"12_CR9","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/S1386-5056(98)00008-2","volume":"49","author":"K. Louwerse","year":"1998","unstructured":"Louwerse, K.: The electronic patient record; the management of access \u2013 case study: Leiden University hospital. International Journal of Medical Informatics\u00a049, 39\u201344 (1998)","journal-title":"International Journal of Medical Informatics"},{"key":"12_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1007\/3-540-45067-X_35","volume-title":"Information Security and Privacy","author":"J. Reid","year":"2003","unstructured":"Reid, J., Cheong, I., Henricksen, M., Smith, J.: A Novel Use of rBAC to Protect Privacy in Distributed Health Care Information Systems. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol.\u00a02727, pp. 403\u2013415. Springer, Heidelberg (2003)"},{"key":"12_CR11","unstructured":"Evered, M., B\u00f6geholz, S.: A case study in access control requirements for a health information system. In: Proc. 2nd Australian Information Security Workshop. Conferences in Research and Practice in Information Technology, vol.\u00a032, pp. 53\u201361. Australian Computer Society (2004)"},{"key":"12_CR12","unstructured":"Hung, P.C.K.: Towards a privacy access control model for e-healthcare services. In: Proc. 3rd Annual Conference on Privacy, Security and Trust (2005)"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Thomas, R.K., Sandhu, R.S.: Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management. In: Proc. 11th Conference on Database Security. IFIP Conference Proceedings, vol.\u00a0113, pp. 166\u2013181. Springer (1997)","DOI":"10.1007\/978-0-387-35285-5_10"},{"key":"12_CR14","unstructured":"Kalam, A., Benferhat, S., Mi\u00e8ge, A., Baida, R., Cuppens, F., Saurel, C., Balbiani, P., Deswarte, Y., Trouessin, G.: Organization based access control. In: Proc. 4th IEEE Workshop on Policies for Distributed Systems and Networks, pp. 120\u2013131. IEEE CS (2003)"},{"key":"12_CR15","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.entcs.2007.01.064","volume":"186","author":"F. Cuppens","year":"2007","unstructured":"Cuppens, F., Cuppens-Boulahia, N., Ghorbel, M.B.: High level conflict management strategies in advanced access control models. Electronic Notes in Theoretical Computer Science\u00a0186, 3\u201326 (2007)","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"12_CR16","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1016\/j.dss.2008.11.014","volume":"46","author":"S. Sneha","year":"2009","unstructured":"Sneha, S., Varshney, U.: Enabling ubiquitous patient monitoring: Model, decision protocols, opportunities and challenges. Decision Support Systems\u00a046, 606\u2013619 (2009)","journal-title":"Decision Support Systems"},{"key":"12_CR17","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1109\/JPROC.2010.2065210","volume":"98","author":"J. Ko","year":"2010","unstructured":"Ko, J., Lu, C., Srivastava, M.B., Stankovic, J.A., Terzis, A., Welsh, M.: Wireless sensor networks for healthcare. Proceedings of IEEE\u00a098, 1947\u20131960 (2010)","journal-title":"Proceedings of IEEE"},{"key":"12_CR18","doi-asserted-by":"publisher","first-page":"946","DOI":"10.1109\/TITB.2008.2011155","volume":"13","author":"I. Maglogiannis","year":"2009","unstructured":"Maglogiannis, I., Kazatzopoulos, L., Delakouridis, C., Hadjiefthymiades, S.: Enabling location privacy and medical data encryption in patient telemonitoring systems. IEEE Transactions on Information Technology in Biomedicine\u00a013, 946\u2013954 (2009)","journal-title":"IEEE Transactions on Information Technology in Biomedicine"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Chiu, D.K.W., Hung, P.C.K., Cheng, V.S.Y., Kafeza, E.: Protecting the exchange of medical images in healthcare process integration with web services. In: Proc. 40th Hawaii Conference on Systems Science, pp. 131\u2013140. IEEE CS (2007)","DOI":"10.1109\/HICSS.2007.451"},{"key":"12_CR20","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/S0020-7101(96)01228-7","volume":"43","author":"J. Biskup","year":"1996","unstructured":"Biskup, J., Bleumer, G.: Cryptographic protection of health information: cost and benefit. International Journal of Bio-Medical Computing\u00a043, 61\u201367 (1996)","journal-title":"International Journal of Bio-Medical Computing"},{"key":"12_CR21","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/S1386-5056(03)00033-9","volume":"70","author":"M. Haak van der","year":"2003","unstructured":"van der Haak, M., Wolff, A.C., Brandner, R., Drings, P., Wannenmacher, M., Wetter, T.: Data security and protection in cross-institutional electronic patient records. International Journal of Medical Informatics\u00a070, 117\u2013130 (2003)","journal-title":"International Journal of Medical Informatics"},{"key":"12_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/3-540-36413-7_15","volume-title":"Security in Communication Networks","author":"G. Ateniese","year":"2003","unstructured":"Ateniese, G., Curtmola, R., de Medeiros, B., Davis, D.: Medical Information Privacy Assurance: Cryptographic and System Aspects. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol.\u00a02576, pp. 199\u2013218. Springer, Heidelberg (2003)"},{"key":"12_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-642-03007-9_7","volume-title":"Data and Applications Security XXIII","author":"M. Layouni","year":"2009","unstructured":"Layouni, M., Verslype, K., Sand\u0131kkaya, M.T., De Decker, B., Vangheluwe, H.: Privacy-Preserving Telemonitoring for eHealth. In: Gudes, E., Vaidya, J. (eds.) Data and Applications Security 2009. LNCS, vol.\u00a05645, pp. 95\u2013110. Springer, Heidelberg (2009)"},{"key":"12_CR24","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/s11518-009-5108-z","volume":"18","author":"J.M. Tien","year":"2009","unstructured":"Tien, J.M., Goldschmidt-Clermont, P.: Healthcare: A complex service system. Journal of Systems Science and Systems Engineering\u00a018, 257\u2013282 (2009)","journal-title":"Journal of Systems Science and Systems Engineering"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Benaloh, J., Tuinstra, D.: Receipt-free secret-ballot elections (extended abstract). In: Proc. 26th Symposium on Theory of Computing, pp. 544\u2013553. ACM Press (1994)","DOI":"10.1145\/195058.195407"},{"key":"12_CR26","doi-asserted-by":"crossref","unstructured":"Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: Proc. 4th ACM Workshop on Privacy in the Electronic Society, pp. 61\u201370. ACM Press (2005)","DOI":"10.1145\/1102199.1102213"},{"key":"12_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/3-540-45811-5_14","volume-title":"Information Security","author":"M. Abe","year":"2002","unstructured":"Abe, M., Suzuki, K.: Receipt-Free Sealed-Bid Auction. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol.\u00a02433, pp. 191\u2013199. Springer, Heidelberg (2002)"},{"key":"12_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/978-3-540-24691-6_20","volume-title":"Information Security and Cryptology - ICISC 2003","author":"X. Chen","year":"2004","unstructured":"Chen, X., Lee, B., Kim, K.: Receipt-free Electronic Auction Schemes Using Homomorphic Encryption. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol.\u00a02971, pp. 259\u2013273. Springer, Heidelberg (2004)"},{"key":"12_CR29","unstructured":"Lee, B., Kim, K.: Receipt-free electronic voting through collaboration of voter and honest verifier. In: Proc. Japan-Korea Joint Workshop on Information Security and Cryptology, pp. 101\u2013108 (2000)"},{"key":"12_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/3-540-45539-6_38","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"M. Hirt","year":"2000","unstructured":"Hirt, M., Sako, K.: Efficient Receipt-Free Voting Based on Homomorphic Encryption. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 539\u2013556. Springer, Heidelberg (2000)"},{"key":"12_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/3-540-36159-6_39","volume-title":"Information and Communications Security","author":"B. Lee","year":"2002","unstructured":"Lee, B., Kim, K.: Receipt-free Electronic Voting with a Tamper-resistant Randomizer. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol.\u00a02513, pp. 389\u2013406. Springer, Heidelberg (2002)"},{"key":"12_CR32","doi-asserted-by":"crossref","unstructured":"Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: Proc. 28th Symposium on Principles of Programming Languages, pp. 104\u2013115. ACM Press (2001)","DOI":"10.1145\/373243.360213"},{"key":"12_CR33","doi-asserted-by":"crossref","unstructured":"Backes, M., Hri\u0163cu, C., Maffei, M.: Automated verification of remote electronic voting protocols in the applied pi-calculus. In: Proc. 21st IEEE Computer Security Foundations Symposium, pp. 195\u2013209. IEEE CS (2008)","DOI":"10.1109\/CSF.2008.26"},{"key":"12_CR34","doi-asserted-by":"crossref","unstructured":"Baskar, A., Ramanujam, R., Suresh, S.: Knowledge-based modelling of voting protocols. In: Proc. 11th Conference on Theoretical Aspects of Rationality and Knowledge, pp. 62\u201371. ACM Press (2007)","DOI":"10.1145\/1324249.1324261"},{"issue":"2-3","key":"12_CR35","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.jalgor.2009.02.007","volume":"64","author":"H.L. Jonker","year":"2009","unstructured":"Jonker, H.L., Mauw, S., Pang, J.: A formal framework for quantifying voter-controlled privacy. Journal of Algorithms in Cognition, Informatics and Logic\u00a064(2-3), 89\u2013105 (2009)","journal-title":"Journal of Algorithms in Cognition, Informatics and Logic"},{"key":"12_CR36","doi-asserted-by":"crossref","unstructured":"Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: Proc. 14th IEEE Computer Security Foundations Workshop, pp. 82\u201396. IEEE CS (2001)","DOI":"10.1109\/CSFW.2001.930138"},{"key":"12_CR37","doi-asserted-by":"crossref","unstructured":"K\u00fcsters, R., Truderung, T., Vogt, A.: A game-based definition of coercion-resistance and its applications. In: Proc. 23rd IEEE Computer Security Foundations Symposium, pp. 122\u2013136. IEEE CS (2010)","DOI":"10.1109\/CSF.2010.16"},{"key":"12_CR38","doi-asserted-by":"crossref","unstructured":"Cortier, V., Delaune, S.: A method for proving observational equivalence. In: Proc. 22nd IEEE Computer Security Foundations Symposium, pp. 266\u2013276. IEEE CS (2009)","DOI":"10.1109\/CSF.2009.9"}],"container-title":["Lecture Notes in Computer Science","Foundations of Health Informatics Engineering and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32355-3_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T21:21:14Z","timestamp":1743715274000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32355-3_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642323546","9783642323553"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32355-3_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}