{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:45:36Z","timestamp":1759333536183,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":39,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662681909"},{"type":"electronic","value":"9783662681916"}],"license":[{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-662-68191-6_6","type":"book-chapter","created":{"date-parts":[[2023,10,31]],"date-time":"2023-10-31T06:02:02Z","timestamp":1698732122000},"page":"138-161","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Case Study on\u00a0Data Protection for\u00a0a\u00a0Cloud- and AI-Based Homecare Medical Device"],"prefix":"10.1007","author":[{"given":"Philipp","family":"Bende","sequence":"first","affiliation":[]},{"given":"Olga","family":"Vovk","sequence":"additional","affiliation":[]},{"given":"David","family":"Caraveo","sequence":"additional","affiliation":[]},{"given":"Ludwig","family":"Pechmann","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Leucker","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,1]]},"reference":[{"issue":"6","key":"6_CR1","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1056\/NEJMcp2102061","volume":"385","author":"RS Apte","year":"2021","unstructured":"Apte, R.S.: Age-related macular degeneration. N. Engl. J. Med. 385(6), 539\u2013547 (2021)","journal-title":"N. Engl. J. Med."},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Bende, P., Vovk, O., Caraveo, D., Pechmann, L., Leucker, M.: A case study on data protection for a cloud- and AI-based homecare medical device. In: Lamo, Y., Rutle, A. (eds.) The International Health Data Workshop HEDA 2022. CEUR Workshop Proceedings (CEUR-WS.org) (2022)","DOI":"10.1007\/978-3-662-68191-6_6"},{"key":"6_CR3","unstructured":"BMWI: orientierungshilfe zum gesundheitsdatenschutz (2018). https:\/\/www.bmwi.de\/Redaktion\/DE\/Downloads\/M-O\/orientierungshilfe-gesundheitsdatenschutz.pdf?__blob=publicationFile &v=16. Accessed 15 Feb 2022"},{"key":"6_CR4","unstructured":"Consulting, M.: GSPR: general safety and performance requirements for medical devices in the EU (2023). https:\/\/mdrc-consulting.com\/gspr-en\/. Accessed 09 May 2023"},{"key":"6_CR5","unstructured":"Datenschutz-Grundverordnung: verordnung (eu) 2016\/679 des europ\u00e4ischen parlaments und des rates zum schutz nat\u00fcrlicher personen bei der verarbeitung personenbezogener daten, zum freien datenverkehr und zur aufhebung der richtlinie 95\/46\/eg (datenschutz-grundverordnung) (2016). https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj?locale=de. Accessed 16 Feb 2022"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Domenech, M.C., Comunello, E., Wangham, M.S.: Identity management in e-health: a case study of web of things application using OpenID connect. In: 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom), pp. 219\u2013224 (2014)","DOI":"10.1109\/HealthCom.2014.7001844"},{"key":"6_CR7","unstructured":"Eidel, O.: Template: risk management plan and risk acceptance matrix (2020). https:\/\/openregulatory.com\/risk-management-plan-risk-acceptance-matrix-template-iso-14971\/. Accessed 26 Apr 2023"},{"key":"6_CR8","unstructured":"ENISA: pseudonymisation techniques and best practices (2019). https:\/\/www.enisa.europa.eu\/publications\/pseudonymisation-techniques-and-best-practices. Accessed 11 Feb 2022"},{"key":"6_CR9","unstructured":"European Commission: article 29 working party opinion 05\/2014 on anonymisation techniques (2014)"},{"issue":"1\u20132","key":"6_CR10","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1038\/sj.neo.7900071","volume":"2","author":"JG Fujimoto","year":"2000","unstructured":"Fujimoto, J.G., Pitris, C., Boppart, S.A., Brezinski, M.E.: Optical coherence tomography: an emerging technology for biomedical imaging and optical biopsy. Neoplasia 2(1\u20132), 9\u201325 (2000)","journal-title":"Neoplasia"},{"key":"6_CR11","unstructured":"GDPR: regulation (eu) 2016\/ 679 of the European parliament and of the council on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/ec (2016). https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj. Accessed 01 Feb 2022"},{"key":"6_CR12","unstructured":"Gurfinkel, A.: Fault, error, and failure (2019). https:\/\/ece.uwaterloo.ca\/~agurfink\/stqam.w19\/assets\/pdf\/W01P2-FaultErrorFailure.pdf. Accessed 01 May 2023"},{"key":"6_CR13","unstructured":"Hardt, D.: The oauth 2.0 authorization framework. RFC 6749, RFC Editor (2012). https:\/\/www.rfc-editor.org\/rfc\/rfc6749.txt"},{"key":"6_CR14","doi-asserted-by":"publisher","first-page":"43111","DOI":"10.1109\/ACCESS.2020.2976718","volume":"8","author":"J Hwang","year":"2020","unstructured":"Hwang, J., Aziz, A., Sung, N., Ahmad, A., Gall, F.L., Song, J.: AUTOCON-IoT: automated and scalable online conformance testing for IoT applications. IEEE Access 8, 43111\u201343121 (2020)","journal-title":"IEEE Access"},{"key":"6_CR15","unstructured":"IBM: IBM report: Compromised employee accounts led to most expensive data breaches over past year (2020). https:\/\/newsroom.ibm.com\/2020-07-29-IBM-Report-Compromised-Employee-Accounts-Led-to-Most-Expensive-Data-Breaches-Over-Past-Year. Accessed 24 Mar 2022"},{"key":"6_CR16","doi-asserted-by":"publisher","unstructured":"IEEE: Standard glossary of software engineering terminology. IEEE Std 610.12-1990, pp. 1\u201384 (1990). https:\/\/doi.org\/10.1109\/IEEESTD.1990.101064","DOI":"10.1109\/IEEESTD.1990.101064"},{"key":"6_CR17","unstructured":"Interessengemeinschaft der Benannten Stellen f\u00fcr Medizinprodukte in Deutschland: questionnaire artificial intelligence in medical devices (2022). https:\/\/www.ig-nb.de\/veroeffentlichungen\/. Accessed 09 May 2023"},{"key":"6_CR18","unstructured":"ISO\/IEC 27001: Information security management systems requirements. International Organization for Standardization, Vernier, Geneva, Switzerland (2022). https:\/\/www.iso.org\/standard\/27001"},{"key":"6_CR19","unstructured":"Johner, C.: ISO 14971 and risk management (2015). https:\/\/www.johner-institute.com\/articles\/risk-management-iso-14971\/. Accessed 29 Mar 2022"},{"key":"6_CR20","unstructured":"Johner, C.: Risk assessment, risk acceptance matrix (2015). https:\/\/www.johner-institute.com\/articles\/risk-management-iso-14971\/risk-acceptance\/. Accessed 26 Apr 2023"},{"key":"6_CR21","unstructured":"Johner, C.: Datenschutz im gesundheitswesen bei medizinischen daten (2020). https:\/\/www.johner-institut.de\/blog\/regulatory-affairs\/datenschutz-bei-medizinischen-daten\/. Accessed 25 Mar 2022"},{"key":"6_CR22","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-030-27684-3_15","volume-title":"Database and Expert Systems Applications","author":"M Kumar","year":"2019","unstructured":"Kumar, M., Rossbory, M., Moser, B.A., Freudenthaler, B.: Deriving an optimal noise adding mechanism for privacy-preserving machine learning. In: Anderst-Kotsis, G., et al. (eds.) DEXA 2019. CCIS, vol. 1062, pp. 108\u2013118. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-27684-3_15"},{"key":"6_CR23","unstructured":"Lewis, J.E.: Web single sign-on authentication using SAML. IJCSI Int. J. Comput. Sci. Issues 2 (2009)"},{"key":"6_CR24","unstructured":"Lodderstedt, T., Bradley, J., Labunets, A., Fett, D.: OAuth 2.0 security best current practice. Internet-Draft draft-ietf-oauth-security-topics-19, Internet Engineering Task Force (2021). https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-oauth-security-topics-19"},{"key":"6_CR25","unstructured":"Medical Device Coordination Group: Guidance on cybersecurity for medical devices (2020). https:\/\/health.ec.europa.eu\/system\/files\/2022-01\/md_cybersecurity_en.pdf. Accessed 09 May 2023"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Naik, N., Jenkins, P.: Securing digital identities in the cloud by selecting an apposite federated identity management from SAML, OAuth and OpenID connect. In: 2017 11th International Conference on Research Challenges in Information Science (RCIS), pp. 163\u2013174 (2017)","DOI":"10.1109\/RCIS.2017.7956534"},{"key":"6_CR27","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1016\/j.ajo.2018.05.026","volume":"192","author":"M Okada","year":"2018","unstructured":"Okada, M., Kandasamy, R., Chong, E.W.T., McGuiness, M.B., Guymer, R.H.: The treat-and-extend injection regimen versus alternate dosing strategies in age-related macular degeneration: a systematic review and meta-analysis. Am. J. Ophthalmol. 192, 184\u2013197 (2018)","journal-title":"Am. J. Ophthalmol."},{"issue":"9","key":"6_CR28","doi-asserted-by":"publisher","first-page":"2499","DOI":"10.1109\/JBHI.2020.2973467","volume":"24","author":"H Qiu","year":"2020","unstructured":"Qiu, H., Qiu, M., Liu, M., Memmi, G.: Secure health data sharing for medical cyber-physical systems for the healthcare 4.0. IEEE J. Biomed. Health Inf. 24(9), 2499\u20132505 (2020)","journal-title":"IEEE J. Biomed. Health Inf."},{"key":"6_CR29","unstructured":"Rigaki, M., Garcia, S.: A survey of privacy attacks in machine learning. CoRR abs\/2007.07646 https:\/\/arxiv.org\/abs\/2007.07646 (2020)"},{"key":"6_CR30","unstructured":"Rigaki, M., Garcia, S.: A Survey of privacy attacks in machine learning. arXiv:2007.07646 (2021)"},{"key":"6_CR31","doi-asserted-by":"crossref","unstructured":"Sabaliauskaite, G., Adepu, S.: Integrating six-step model with information flow diagrams for comprehensive analysis of cyber-physical system safety and security. In: 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE), pp. 41\u201348 (2017)","DOI":"10.1109\/HASE.2017.25"},{"key":"6_CR32","unstructured":"Sakimura, N., Bradley, J., Jones, M., de Medeiros, B., Mortimore, C.: OpenID connect 1.0 specification (2014). https:\/\/openid.net\/specs\/openid-connect-core-1_0.html. Accessed 30 Mar 2022"},{"key":"6_CR33","doi-asserted-by":"crossref","unstructured":"Schneeberger, D., St\u00f6ger, K., Holzinger, A.: The European legal framework for medical AI. In: International Cross-Domain Conference for Machine Learning and Knowledge Extraction, pp. 209\u2013226 (2020)","DOI":"10.1007\/978-3-030-57321-8_12"},{"key":"6_CR34","unstructured":"Seeck, A.: Post-market surveillance und \u00dcberwachung der produkte im markt (2022). https:\/\/www.johner-institut.de\/blog\/regulatory-affairs\/post-market-surveillance\/. Accessed 17 Nov 2022"},{"key":"6_CR35","doi-asserted-by":"publisher","first-page":"111138","DOI":"10.1016\/j.jss.2021.111138","volume":"184","author":"S Seifermann","year":"2022","unstructured":"Seifermann, S., Heinrich, R., Werle, D., Reussner, R.: Detecting violations of access control and information flow policies in data flow diagrams. J. Syst. Softw. 184, 111138 (2022)","journal-title":"J. Syst. Softw."},{"key":"6_CR36","doi-asserted-by":"crossref","unstructured":"Sloane, E.B., J. Silva, R.: Chapter 83 - artificial intelligence in medical devices and clinical decision support systems. In: Iadanza, E. (ed.) Clinical Engineering Handbook (Second Edition), pp. 556\u2013568. Academic Press, second edition edn. (2020)","DOI":"10.1016\/B978-0-12-813467-2.00084-5"},{"key":"6_CR37","unstructured":"Union, E.: Regulation (eu) 2017\/745 of the European parliament and of the council of 5 April 2017 on medical devices, amending directive 2001\/83\/ec, regulation (ec) no 178\/2002 and regulation (ec) no 1223\/2009 and repealing council directives 90\/385\/eec and 93\/42\/eec (text with eea relevance. ) (2017). https:\/\/lexparency.org\/eu\/32017R0745\/. Accessed 17 Nov 2022"},{"key":"6_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-030-78428-7_14","volume-title":"Model and Data Engineering","author":"O Vovk","year":"2021","unstructured":"Vovk, O., Piho, G., Ross, P.: Anonymization methods of structured health care data: a literature review. In: Attiogb\u00e9, C., Ben Yahia, S. (eds.) MEDI 2021. LNCS, vol. 12732, pp. 175\u2013189. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-78428-7_14"},{"issue":"6","key":"6_CR39","doi-asserted-by":"publisher","first-page":"491","DOI":"10.21037\/atm-21-1093","volume":"9","author":"S Zhou","year":"2021","unstructured":"Zhou, S., et al.: A retrospective study on the effectiveness of artificial intelligence-based clinical decision support system (AI-CDSS) to improve the incidence of hospital-related venous thromboembolism (VTE). Ann. Transl. Med. 9(6), 491 (2021)","journal-title":"Ann. Transl. Med."}],"container-title":["Lecture Notes in Computer Science","Transactions on Petri Nets and Other Models of Concurrency XVII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-68191-6_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T02:43:17Z","timestamp":1730428997000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-68191-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,1]]},"ISBN":["9783662681909","9783662681916"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-68191-6_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023,11,1]]},"assertion":[{"value":"1 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}