{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T12:52:54Z","timestamp":1725454374622},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642336744"},{"type":"electronic","value":"9783642336751"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33675-1_21","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T16:33:04Z","timestamp":1347294784000},"page":"235-246","source":"Crossref","is-referenced-by-count":3,"title":["On Securing Communications among Federated Health Information Systems"],"prefix":"10.1007","author":[{"given":"Mario","family":"Ciampi","sequence":"first","affiliation":[]},{"given":"Giuseppe","family":"De Pietro","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Esposito","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Sicuranza","sequence":"additional","affiliation":[]},{"given":"Paolo","family":"Mori","sequence":"additional","affiliation":[]},{"given":"Abraham","family":"Gebrehiwot","sequence":"additional","affiliation":[]},{"given":"Paolo","family":"Donzelli","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"21_CR1","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1016\/j.ijmedinf.2005.08.002","volume":"75","author":"R. Hauxe","year":"2006","unstructured":"Hauxe, R.: Health information systems. International Journal of Medical Informatics\u00a075(3), 268\u2013281 (2006)","journal-title":"International Journal of Medical Informatics"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Huang, H.K.: PACS and Imaging Informatics: Basic Principles and Applications. Wiley-Liss (April 2004)","DOI":"10.1002\/0471654787"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Ciampi, M., Pietro, G.D., Esposito, C., Sicuranza, M., Donzelli, P.: On Federating Health Information Systems. In: Proceedings of the International Conference Healthcare Informatics and Biomedical Engineering, HiBES (July 2012)","DOI":"10.1109\/GUT.2012.6344168"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Esposito, C., Ciampi, M., Pietro, G.D., Donzelli, P.: Notifying Medical Data in Health Information Systems. In: Proceedings of the 6th ACM International Conference on Distributed Event-Based Systems, DEBS (July 2012)","DOI":"10.1145\/2335484.2335528"},{"issue":"3","key":"21_CR5","first-page":"4","volume":"11","author":"M. Naedele","year":"2009","unstructured":"Naedele, M.: Standards for XML and Web services security. IEEE Computer Magazine\u00a011(3), 4\u201321 (2009)","journal-title":"IEEE Computer Magazine"},{"issue":"4","key":"21_CR6","first-page":"96","volume":"36","author":"N.A. Nordbotten","year":"2003","unstructured":"Nordbotten, N.A.: XML and Web Services Security Standards. IEEE Communications Surveys & Tutorials\u00a036(4), 96\u201398 (2003)","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"pt. I","key":"21_CR7","first-page":"640","volume":"8","author":"V.M. Brannigan","year":"1995","unstructured":"Brannigan, V.M., Beier, B.R.: Patient privacy in the era of medical computer networks: a new paradigm for a new technology. Medinfo\u00a08(pt. I), 640\u2013643 (1995)","journal-title":"Medinfo"},{"issue":"1","key":"21_CR8","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1145\/383775.383777","volume":"4","author":"J. Park","year":"2001","unstructured":"Park, J., Sandhu, R., Ahn, G.-J.: Role-based access control on the web. ACM Transactions on Information and System Security\u00a04(1), 37\u201371 (2001)","journal-title":"ACM Transactions on Information and System Security"},{"issue":"4","key":"21_CR9","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1504\/IJIEM.2010.035624","volume":"6","author":"A. Appari","year":"2010","unstructured":"Appari, A., Johnson, M.: Information security and privacy in healthcare: current state of research. International Journal of Internet and Enterprise Management\u00a06(4), 279\u2013314 (2010)","journal-title":"International Journal of Internet and Enterprise Management"},{"issue":"3","key":"21_CR10","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1016\/j.ijmedinf.2003.12.011","volume":"73","author":"D. Gritzalis","year":"2004","unstructured":"Gritzalis, D., Lambrinoudakis, C.: A security architecture for interconnecting health information systems. International Journal of Medical Informatics\u00a073(3), 305\u2013309 (2004)","journal-title":"International Journal of Medical Informatics"},{"issue":"3","key":"21_CR11","first-page":"70","volume":"2","author":"M. Ficco","year":"2010","unstructured":"Ficco, M.: Achieving security by intrusion-tolerance based on event correlation. International Journal of Network Protocols and Algorithms (NPA)\u00a02(3), 70\u201384 (2010)","journal-title":"International Journal of Network Protocols and Algorithms (NPA)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33675-1_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,7]],"date-time":"2019-05-07T09:25:23Z","timestamp":1557221123000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33675-1_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642336744","9783642336751"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33675-1_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}