{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:14:54Z","timestamp":1742919294386,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":19,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819712793"},{"type":"electronic","value":"9789819712809"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-1280-9_3","type":"book-chapter","created":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T06:01:41Z","timestamp":1712037701000},"page":"29-44","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Secure Circulation Mechanism of Personal Data Based on Blockchains"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8058-7638","authenticated-orcid":false,"given":"Tianqi","family":"Cai","sequence":"first","affiliation":[]},{"given":"Yuhan","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Zitao","family":"Xuan","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Kun","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Zhide","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hengjin","family":"Cai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,3]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Skare, M., Maria, D. L. M. D. O., Ribeiro-Navarrete, S.: Digital transformation and European small and medium enterprises (SMES): a comparative study using digital economy and society index data. International journal of information management (2023)","DOI":"10.1016\/j.ijinfomgt.2022.102594"},{"key":"3_CR2","first-page":"38","volume":"11","author":"H Xu","year":"2019","unstructured":"Xu, H.: Legal protection of personal medical data in the context of big data. Library 11, 38\u201345 (2019)","journal-title":"Library"},{"key":"3_CR3","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1186\/s12960-021-00554-7","volume":"10","author":"Y Zhao","year":"2021","unstructured":"Zhao, Y.: The governance of big data promotes lean operations in public hospitals. China Health Human Resources 10, 10\u201314 (2021)","journal-title":"China Health Human Resources"},{"issue":"z1","key":"3_CR4","first-page":"400","volume":"47","author":"R Gu","year":"2020","unstructured":"Gu, R., Wu, Z., Shi, H.: New approach for graded and classified cloud data access control for publish security based on TFR model. Comput. Sci. 47(z1), 400\u2013403 (2020)","journal-title":"Comput. Sci."},{"issue":"12","key":"3_CR5","first-page":"89","volume":"15","author":"Q Zhao","year":"2020","unstructured":"Zhao, Q.: Construction and application of the special disease database based on the scientific research platform of big data. China Digit. Med. 15(12), 89\u201392 (2020)","journal-title":"China Digit. Med."},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Akerlof, G.A.: The market for \u201clemons\u201d: Quality uncertainty and the market mechanism. Uncertainty in economics. Academic Press, Cambridge, pp. 235\u2013251 (1978)","DOI":"10.1016\/B978-0-12-214850-7.50022-X"},{"key":"3_CR7","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/j.scs.2018.02.014","volume":"39","author":"GG Dagher","year":"2018","unstructured":"Dagher, G.G., Mohler, J., Milojkovic, M., et al.: Ancile: privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology. Sustain. Cities Soc. 39, 283\u2013297 (2018)","journal-title":"Sustain. Cities Soc."},{"key":"3_CR8","first-page":"219","volume":"56","author":"R Lenz","year":"2013","unstructured":"Lenz, R., Reichert, M., Weber, B.: A framework for integrating process-oriented information systems and data-driven decision support systems. Decis. Support. Syst. 56, 219\u2013235 (2013)","journal-title":"Decis. Support. Syst."},{"issue":"12","key":"3_CR9","doi-asserted-by":"publisher","first-page":"e0243043","DOI":"10.1371\/journal.pone.0243043","volume":"15","author":"S Chenthara","year":"2020","unstructured":"Chenthara, S., Ahmed, K., Wang, H., et al.: Healthchain: a novel framework on privacy preservation of electronic health records using blockchain technology. PLoS ONE 15(12), e0243043 (2020)","journal-title":"PLoS ONE"},{"issue":"10","key":"3_CR10","first-page":"7","volume":"310","author":"J He","year":"2019","unstructured":"He, J.: Secure and trustworthy artificial intelligence. Inf. Secur. Commun. Priv. 310(10), 7\u201310 (2019)","journal-title":"Inf. Secur. Commun. Priv."},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Kumar, A., Braud, T., Tarkoma, S., Hui, P.: Trustworthy AI in the age of pervasive computing and big data. In: 2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/PerComWorkshops48775.2020.9156127"},{"issue":"3","key":"3_CR12","doi-asserted-by":"publisher","first-page":"e190043","DOI":"10.1148\/ryai.2020190043","volume":"2","author":"M Reyes","year":"2020","unstructured":"Reyes, M., Meier, R., Pereira, S., et al.: On the interpretability of artificial intelligence in radiology: challenges and opportunities. Radiol. Artif. Intell. 2(3), e190043 (2020)","journal-title":"Radiol. Artif. Intell."},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Ribeiro, M.T., Singh, S., Guestrin, C.: \u201cWhy should I trust you?\u201d: Explaining the predictions of any classifier, pp. 1135\u20131144. ACM (2016)","DOI":"10.1145\/2939672.2939778"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Singh, C., Chauhan, D., Deshmukh, S.A., et al.: Medi-Block record: Secure data sharing using block chain technology. Inf. Med. Unlocked 24(9), 100624 (2021)","DOI":"10.1016\/j.imu.2021.100624"},{"issue":"8","key":"3_CR15","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1177\/0141076815600673","volume":"108","author":"J Jardine","year":"2015","unstructured":"Jardine, J., Fisher, J., Carrick, B.: Apple\u2019s ResearchKit: smart data collection for the smartphone era? J. R. Soc. Med. 108(8), 294\u2013296 (2015)","journal-title":"J. R. Soc. Med."},{"issue":"3","key":"3_CR16","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1016\/j.hlpt.2014.04.004","volume":"3","author":"R Brandt","year":"2014","unstructured":"Brandt, R., Rice, R.: Building a better PHR paradigm: lessons from the discontinuation of Google health. Health Policy Technol. 3(3), 200\u2013207 (2014)","journal-title":"Health Policy Technol."},{"key":"3_CR17","unstructured":"Cai, H., Cai, T.: An architecture for web 3.0 and the emergence of spontaneous time order. https:\/\/arxiv.org\/abs\/2202.10619. Accessed 30 Aug 2023"},{"key":"3_CR18","doi-asserted-by":"publisher","first-page":"50823","DOI":"10.1109\/ACCESS.2019.2911124","volume":"7","author":"T Cai","year":"2019","unstructured":"Cai, T., Cai, H., Wang, H., et al.: Analysis of blockchain system with token-based bookkeeping method. IEEE Access 7, 50823\u201350832 (2019)","journal-title":"IEEE Access"},{"issue":"1","key":"3_CR19","first-page":"1","volume":"4","author":"T Cai","year":"2020","unstructured":"Cai, T., Cai, H., Lee, D., et al.: ITO: the sponsored token technology. J. Br. Blockchain Assoc. 4(1), 1\u201312 (2020)","journal-title":"J. Br. Blockchain Assoc."}],"container-title":["Communications in Computer and Information Science","Data Science and Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-1280-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T06:09:26Z","timestamp":1712038166000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-1280-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819712793","9789819712809"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-1280-9_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"3 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IAIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Artificial Intelligence Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iaic2023a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iaicconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}