{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:09:46Z","timestamp":1748750986000,"version":"3.41.0"},"publisher-location":"New Delhi","reference-count":38,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132226482"},{"type":"electronic","value":"9788132226505"}],"license":[{"start":{"date-parts":[[2015,11,3]],"date-time":"2015-11-03T00:00:00Z","timestamp":1446508800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-81-322-2650-5_5","type":"book-chapter","created":{"date-parts":[[2015,11,5]],"date-time":"2015-11-05T11:34:39Z","timestamp":1446723279000},"page":"65-84","source":"Crossref","is-referenced-by-count":1,"title":["Securing Service in Remote Healthcare"],"prefix":"10.1007","author":[{"given":"Tapalina","family":"Bhattasali","sequence":"first","affiliation":[]},{"given":"Rituparna","family":"Chaki","sequence":"additional","affiliation":[]},{"given":"Nabendu","family":"Chaki","sequence":"additional","affiliation":[]},{"given":"Khalid","family":"Saeed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,3]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Aleman, J.L.F., Senor, I.C., Lozoya, P.A., Toval, A.: Security and privacy in electronic health records: A systematic literature review. J. Biomed. Inf. 46(3) 541\u2013562 (2013)","DOI":"10.1016\/j.jbi.2012.12.003"},{"key":"5_CR2","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1007\/978-3-642-40925-7_20","volume-title":"Computer Information Systems and Industrial Management","author":"Tapalina Bhattasali","year":"2013","unstructured":"Bhattasali, T., Chaki, R., Chaki, N.: Study of security issues in pervasive environment of next generation internet of things. In: Proceedings of Computer Information Systems and Industrial Management (CISIM). Lecture Notes in Computer Science (LNCS), vol. 8104, pp. 206\u2013217. Springer, New York (2013)"},{"issue":"1","key":"5_CR3","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/s00779-012-0618-y","volume":"18","author":"P Belsis","year":"2014","unstructured":"Belsis, P., Pantziou, G.: A k-anonymity privacy-preserving approach in wireless medical monitoring environments. Pers. Ubiquit. Comput. 18(1), 11\u201374 (2014)","journal-title":"Pers. Ubiquit. Comput."},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Bhattasali, T., Saeed, K.: Two factor remote authentication in healthcare. In: Proceedings of IEEE International Conference on Advances in Computing, Communications and Informatics, pp. 380\u2013381 (2014)","DOI":"10.1109\/ICACCI.2014.6968594"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Barkhuus, L.: The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 367\u2013376 (2012)","DOI":"10.1145\/2207676.2207727"},{"issue":"2","key":"5_CR6","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1007\/s00779-014-0825-9","volume":"19","author":"LA Castro","year":"2015","unstructured":"Castro, L.A., Favela, J., Quintana, E., Perez, M.: Behavioral data gathering for assessing functional status and health in older adults using mobile phones. Pers. Ubiquitous Comput. 19(2), 379\u2013391 (2015)","journal-title":"Pers. Ubiquitous Comput."},{"key":"5_CR7","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1007\/978-3-662-45237-0_12","volume-title":"Computer Information Systems and Industrial Management","author":"Tapalina Bhattasali","year":"2014","unstructured":"Bhattasali, T., Saeed, K., Chaki, N., Chaki, R.: A survey of security and privacy issues for biometrics based remote authentication in cloud. In: Proceedings of Computer Information Systems and Industrial Management (CISIM). Lecture Notes in Computer Science (LNCS), vol. 8838, pp. 112\u2013121. Springer, New York (2014)"},{"key":"5_CR8","doi-asserted-by":"crossref","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"Dan Boneh","year":"2004","unstructured":"Boneh, D., Crescenzo, G., Ostrovsky, R., Persiano,G.: Public key encryption with keyword search. In: Proceedings of International Conference Theory and Applications of Cryptographic Techniques (EUROCRYPT). Lecture Notes in Computer Science (LNCS), vol. 3027, pp. 506\u2013522, Springer, New York (2004)"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Garay, J. A, Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of ACM Conference Computer and Communication Security (CCS), pp. 79\u201388 (2006)","DOI":"10.1145\/1180405.1180417"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Wang, C., Cao, N., Li, J., Ren, K., Lou, W. : Secure ranked keyword search over encrypted cloud data. In: Proceedings of IEEE International Conference Distributed Computing Systems (ICDCS), pp. 253\u2013262 (2010)","DOI":"10.1109\/ICDCS.2010.34"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Swaminathan, A., Mao, Y., Su, G.M., Gou, H., Varna, A.L., He, S., Wu, M., Oard, D.W. : Confidentiality-preserving rank-ordered search. In: Proceedings of Workshop of Storage Security and Survivability, pp. 7\u201312 (2007)","DOI":"10.1145\/1314313.1314316"},{"issue":"4","key":"5_CR12","doi-asserted-by":"publisher","first-page":"1285","DOI":"10.12785\/amis\/070403","volume":"7","author":"S Martinez","year":"2013","unstructured":"Martinez, S., Miret, J.M., Tomas, R., Valls, M.: Security analysis of order preserving symmetric cryptography. Appl. Math. Inf. Sci. 7(4), 1285\u20131295 (2013)","journal-title":"Appl. Math. Inf. Sci."},{"issue":"1","key":"5_CR13","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/TPDS.2013.45","volume":"25","author":"Ning Cao","year":"2014","unstructured":"Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222\u2013233 (2014)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Ming, L., Yu, S., Cao, N., Lou, W.: Authorized private keyword search over encrypted data in cloud computing. In: Proceedings of IEEE International conference on distributed computing systems, pp. 383\u2013392 (2011)","DOI":"10.1109\/ICDCS.2011.55"},{"issue":"8","key":"5_CR15","doi-asserted-by":"publisher","first-page":"1467","DOI":"10.1109\/TPDS.2011.282","volume":"23","author":"C Wang","year":"2012","unstructured":"Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. Parallel Distrib. Syst. 23(8), 1467\u20131479 (2012)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"4","key":"5_CR16","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MNET.2013.6574666","volume":"27","author":"L Ming","year":"2013","unstructured":"Ming, L., Yu, S., Cao, N., Lou, W.: Toward privacy-assured and searchable cloud data storage services. IEEE Trans. Netw. 27(4), 56\u201362 (2013)","journal-title":"IEEE Trans. Netw."},{"issue":"4","key":"5_CR17","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1109\/TDSC.2013.9","volume":"10","author":"J Yu","year":"2013","unstructured":"Yu, J., Lu, P., Zhu, Y., Xue, G., Li, M.: Toward secure multi keyword top-k retrieval over encrypted cloud data. IEEE Trans. Dependable Secure Comput. 10(4), 239\u2013250 (2013)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Sun, W., Wang, B., Cao, N., Li, M., Lou, W., Hou, Y.T., Li, H.: Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. In: Proceedings of ACM Symposium on Information, Computer and Communications Security, pp. 71\u201382 (2013)","DOI":"10.1145\/2484313.2484322"},{"key":"5_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1249","DOI":"10.1007\/978-3-540-69839-5_96","volume-title":"Proceedings of Computational Science and Its Applications (ICCSA)","author":"J Baek","year":"2008","unstructured":"Baek, J., Naini, R.S., Susilo, W.: Public key encryption with keyword search revisited. Proceedings of Computational Science and Its Applications (ICCSA). Lecture Notes in Computer Science, vol. 5072, pp. 1249\u20131259. Springer, Berlin\/Heidelberg (2008)"},{"issue":"1\/2","key":"5_CR20","first-page":"72","volume":"3","author":"Y Zhao","year":"2012","unstructured":"Zhao, Y., Chen, X., Ma, H., Tang, Q., Zhu, H.: A new trapdoor indistinguishable public key encryption with keyword search. J. Wirel. Mobile Netw. Ubiquitous Comput. Dependable Appl. 3(1\/2), 72\u201381 (2012)","journal-title":"J. Wirel. Mobile Netw. Ubiquitous Comput. Dependable Appl."},{"issue":"2","key":"5_CR21","first-page":"1515","volume":"11","author":"M Karnan","year":"2011","unstructured":"Karnan, M., Akila, M., Krishnaraj, N.: Biometric personal authentication using keystroke dynamics: a review. Elsevier J. Appl. Soft Comput. 11(2), 1515\u20131573 (2011)","journal-title":"Elsevier J. Appl. Soft Comput."},{"issue":"1","key":"5_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2009.08.001","volume":"33","author":"CT Li","year":"2010","unstructured":"Li, C.T., Hwang, M.S.: An efficient biometrics based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33(1), 1\u20135 (2010)","journal-title":"J. Netw. Comput. Appl."},{"issue":"6\u20137","key":"5_CR23","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1016\/j.cose.2011.03.004","volume":"30","author":"R Giot","year":"2011","unstructured":"Giot, R., Abed, M.El., Hemery, B., Rosenberger, C.: Unconstrained keystroke dynamics authentication with shared secret. Elsevier Comput. Secur. 30(6\u20137), 427\u2013445 (2011)","journal-title":"Elsevier Comput. Secur."},{"issue":"2","key":"5_CR24","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1109\/TIFS.2010.2043188","volume":"5","author":"Maneesh Upmanyu","year":"2010","unstructured":"Upmanyu, M., Namboodiri,A. M., Srinathan, K., Jawahar,C.V. :Blind authentication: a secure crypto-biometric verification protocol. IEEE Trans. Inf. Forensics Secur. 5(2), 255\u2013218 (2010)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"3","key":"5_CR25","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1049\/iet-ifs.2011.0348","volume":"7","author":"HL Yeh","year":"2013","unstructured":"Yeh, H.L., Chen, T.H., Hu, K.J., Shih, W.K.: Robust elliptic curve cryptography-based three factor user authentication providing privacy of biometric data. IET Inf. Secur. 7(3), 247\u2013252 (2013)","journal-title":"IET Inf. Secur."},{"issue":"4","key":"5_CR26","doi-asserted-by":"publisher","first-page":"933","DOI":"10.1109\/TIFS.2009.2031942","volume":"4","author":"CI Fan","year":"2009","unstructured":"Fan, C.I., Lin, Y.H.: Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics. IEEE Trans. Inf. Forensics Secur. 4(4), 933\u2013945 (2009)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"8","key":"5_CR27","doi-asserted-by":"publisher","first-page":"1390","DOI":"10.1109\/TPDS.2010.206","volume":"22","author":"X Huang","year":"2011","unstructured":"Huang, X., Xiang, Y., Chonka, A., Zhou, J., Deng, R.H.: A generic framework for three-factor authentication: preserving security and privacy in distributed systems. IEEE Trans. Parallel Distrib. Syst. 22(8), 1390\u20131397 (2011)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"5_CR28","doi-asserted-by":"crossref","unstructured":"Sun, W., Wang,B., Cao, N., Li, M., Lou, W., Hou, Y.T., Li, H, : Protecting your right: attribute-based keyword search with fine grained owner-enforced search authorization in the cloud. In: Proceedings of IEEE INFOCOM, pp. 226\u2013234 (2014)","DOI":"10.1109\/INFOCOM.2014.6847943"},{"key":"5_CR29","unstructured":"HL7 Version 3 Standard: Role-based Access Control Healthcare Permission Catalog, Re-lease 2, V3, RBAC. Accessed online at: http:\/\/www.hl7.org\/implement \/standards\/ product_brief.cfm? prod-uct_id\u00a0=\u00a072"},{"issue":"11","key":"5_CR30","doi-asserted-by":"publisher","first-page":"3025","DOI":"10.1109\/TPDS.2013.282","volume":"25","author":"W Sun","year":"2014","unstructured":"Sun, W., Wang, B., Cao, N., Li, M., Lou, W., Hou, Y.T., Li, H.: Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans. Parallel Distrib. Syst. (TPDS) 25(11), 3025\u20133035 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst. (TPDS)"},{"key":"5_CR31","unstructured":"HIPAA Security Guidance, Department of Health and Human Services, USA (2006). Accessed online at: http:\/\/www.hhs.gov\/ocr\/privacy\/hipaa\/administrative\/securityrule\/remoteuse.pdf"},{"key":"5_CR32","unstructured":"HL7 Version 3 Standard: Privacy, Access and Security Services (PASS)\u2014Access Control. Release 1, PASS. Accessed online at: http:\/\/www.hl7.org\/ implement\/standards\/ product_brief.cfm? prod-uct_id\u00a0=\u00a073"},{"issue":"2014","key":"5_CR33","first-page":"131","volume":"23","author":"T Bhattasali","year":"2014","unstructured":"Bhattasali, T., Saeed, K., Chaki, N., Chaki, R.: Bio-authentication for layered remote health monitor framework. J. Med. Inf. Technol. 23(2014), 131\u2013140 (2014)","journal-title":"J. Med. Inf. Technol."},{"issue":"1","key":"5_CR34","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/s00779-012-0630-2","volume":"18","author":"Ren\u00e9 Mayrhofer","year":"2012","unstructured":"Mayrhofer, R., Schmidtke,H.R., Sigg, S.: Security and trust in context-aware applications. Pers. Ubiquitous Comput. 18(1), 115\u2013111 (2014)","journal-title":"Personal and Ubiquitous Computing"},{"key":"5_CR35","doi-asserted-by":"crossref","unstructured":"Bhattasali, T., Chaki, R. Chaki, N. : Secure and trusted cloud of thing. In: Proceedings of IEEE India Conference, pp. 1\u20136 (2013)","DOI":"10.1109\/INDCON.2013.6725878"},{"key":"5_CR36","doi-asserted-by":"crossref","unstructured":"Mahmoud, A., Niu, N.: Source code indexing for automated tracing. In: Proceedings of International Workshop on Traceability in Emerging Forms of Software Engineering, pp. 3\u20139 (2011)","DOI":"10.1145\/1987856.1987859"},{"key":"5_CR37","doi-asserted-by":"crossref","unstructured":"Hu, H., Xu, J., Ren, C., Choi, B. : Processing private queries over untrusted data cloud through privacy homomorphism. In: Proceedings of IEEE International Conference Data Engineering (ICDE), pp. 601\u2013612 (2011)","DOI":"10.1109\/ICDE.2011.5767862"},{"key":"5_CR38","unstructured":"Habib, K., Torjusen, A., Leister, W.: A novel authentication framework based on bio-metric and radio fingerprinting for the IoT in eHealth. In: Proceedings of International Conference on Smart Systems, Devices and Technologies (SMART), pp. 32\u201337 (2014)"}],"container-title":["Advances in Intelligent Systems and Computing","Advanced Computing and Systems for Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-2650-5_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T09:26:25Z","timestamp":1748683585000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-81-322-2650-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,3]]},"ISBN":["9788132226482","9788132226505"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-2650-5_5","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015,11,3]]}}}