{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T22:25:25Z","timestamp":1742941525111,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":36,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540650041"},{"type":"electronic","value":"9783540497844"}],"license":[{"start":{"date-parts":[[1998,1,1]],"date-time":"1998-01-01T00:00:00Z","timestamp":883612800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0055865","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T16:50:09Z","timestamp":1154019009000},"page":"209-220","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["EUROMED-JAVA: Trusted Third Party Services for securing medical Java applets"],"prefix":"10.1007","author":[{"given":"Angelos","family":"Varvitsiotis","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Despina","family":"Polemi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Andy","family":"Marsh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2006,5,28]]},"reference":[{"key":"14_CR1","unstructured":"Ahuja, V.: Network & Internet Security. Academic Press, NY 1996."},{"volume-title":"Caring for Health Information: Safety, Security and Secrecy","year":"1994","key":"14_CR2","unstructured":"Barber, B., Bakker A.R. and S. Bengtsson(eds.): Caring for Health Information: Safety, Security and Secrecy. Amsterdam: Elsevier Science, 1994."},{"key":"14_CR3","first-page":"168","volume-title":"Open Information Systems and Data Security in Medicine","author":"B. Blobel","year":"1996","unstructured":"Blobel, B.: \u201cTowards Security in Medical Telematics: Legal and Technical Aspects,\u201d Open Information Systems and Data Security in Medicine. Barber B., Treacher A. and K. Louwerse (eds). pp.168\u2013182. IOS Press, Amsterdam, Washington, Tokyo, 1996."},{"key":"14_CR4","volume-title":"On The Protection of Medical Data","author":"Council of Europe Recommendation R(97)5","year":"1997","unstructured":"Council of Europe Recommendation R(97)5: On The Protection of Medical Data. Council of Europe, Strasbourg, 13 February 1997."},{"key":"14_CR5","unstructured":"UK Dept. of Trade and Industry ref. URN 97\/669: Licensing of Trusted Third Parties for the Provision of Encryption Services. London, March 1997."},{"key":"14_CR6","unstructured":"Menezes, van Oorschot and Vanstone.: Handbook of Applied Cryptography. CRC Press, 1996."},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Rothermel, K. and R. Popescu-Zeletin (eds).: Mobile Agents\u201997 \u2014 Proc. 1st International Workshop. LNCS 1219, Springer-Verlag, April 1997.","DOI":"10.1007\/3-540-62803-7"},{"key":"14_CR8","unstructured":"Schneier, B.: Applied Cryptography, Protocols, Algorithms and Source Code in C. J. Wiley and Sons Inc, 2nd Ed, 1996."},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Camp L.J., Sirbu M.: \u201cCritical Issues in Internet Commerce,\u201d IEEE Communications Magazine. pp.58\u201362. IEEE Press, 1997.","DOI":"10.1109\/35.592096"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Yourdon E.: \u201cJava, the Web and Software Development,\u201d IEEE COMPUTER Magazine. pp.25\u201330, 1996.","DOI":"10.1109\/2.532042"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Hamilton M.: \u201cJava and the Shift to Net-Centric Computing,\u201d. IEEE COMPUTER Magazine. pp.31\u201339, 1996.","DOI":"10.1109\/2.532043"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Vigna G. (ed): Proc. Mobile Agents and Security. LNCS, Springer-Verlag, 1998 (forthcomming).","DOI":"10.1007\/3-540-68671-1"},{"key":"14_CR13","unstructured":"Marsh A., Delibasis K., Mouravlianski N. and C. Michael: \u201cEUROMED \u2014 A WWW-based multi-mediaTelemedical information system,\u201d subm. in Transactions on Information Technology in Biomedicine."},{"key":"14_CR14","volume-title":"EUROMED \u2014 A WWW-based multi-media medical information system","author":"A. Marsh","year":"1997","unstructured":"Marsh A.: \u201cEUROMED \u2014 A WWW-based multi-media medical information system,\u201d Proc. 19th Annual Intl. Conf. IEEE Engineering in Medicine and Biology Society. IEEE-EMBS, Chicago, 1997."},{"key":"14_CR15","unstructured":"McGraw G. and Ed Felton: Java Security: Hostile Applets, Holes, and Antidotes. J.Wiley, ISBN 0-471-17842-X."},{"key":"14_CR16","unstructured":"Venners, B.: \u201cJava security: How to install the security manager and customize your security policy,\u201d www.javaworld.com\/javaworld\/jw-11-1997\/jw-11-hood.html"},{"key":"14_CR17","unstructured":"Sun Microsystems Inc.: \u201cSecure Computing with Java: Now and the Future,\u201d (White Paper) Java One 1997 Conference. j ava.sun.com\/marketing\/collateral\/security.html"},{"key":"14_CR18","unstructured":"Sun Microsystems Inc.: \u201cSecurity-related Java APIs,\u201d j ava.sun.com\/security"},{"key":"14_CR19","unstructured":"Freier, P., Karlton and P. Kocher: \u201cThe SSL Protocol Version 3.0,\u201d Internet Engineering Task Force: Internet Draft. ietf.org\/internet-drafts\/draft-ietf-tls-ssl-version3-00.txt"},{"key":"14_CR20","unstructured":"Rescorla, A. and Schiffman: \u201cThe Secure HyperText Transfer Protocol,\u201d Internet Engineering Task Force: Internet Draft. ietf.org\/internet-drafts\/draft-ietf-wts-shttp-03.txt"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Rivest, R.: \u201cThe MD5 Message-Digest Algorithm,\u201d MIT Laboratory for Computer Science and RSA Data Security, Inc., April 1992. Internet Engineering Task Force: Request For Comments RFC1321. ds.internic.net\/rfc\/rfc1321.txt","DOI":"10.17487\/rfc1321"},{"key":"14_CR22","unstructured":"EUROMED, ISIS \u201995, DG III programme, 1995\u20131998. euromed.iccs.ntua.gr"},{"key":"14_CR23","unstructured":"EUROMED-ETS: Trusted Third Party Services for Health Care in Europe. INFOSEC programme, DG XIII, 1997. narcisus.esd.ece.ntua.gr\/www\/ETS"},{"key":"14_CR24","unstructured":"NIST, FIPS PUB 180-1: Secure Hash Standard. National Institute of Standards and Technology, U.S. Dept. of Commerce, April 1995."},{"key":"14_CR25","unstructured":"Krawczyk, H., Bellcare M. and R. Canetti: \u201cHMAC: Keyed-Hashing for Message Authentication,\u201d Internet Engineering Task Force: Request for Comments. ds.internic.net\/rfc\/rfc2104.txt"},{"key":"14_CR26","unstructured":"ANSI X3.106: American National Standard for Information Systems Data Link Encryption. American National Standards Institute, 1983."},{"key":"14_CR27","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/MSPEC.1979.6368160","volume":"16","author":"W. Tuchman","year":"1979","unstructured":"Tuchman, W.: \u201cHellman Presents no Shortcut Solutions to DES,\u201d IEEE Spectrum. 16:8, July 1979.","journal-title":"IEEE Spectrum"},{"key":"14_CR28","unstructured":"Thayer, R. and K. Kaukonen: \u201cA Stream Cipher Encryption Algorithm,\u201d Internet Engineering Task Force: Internet Draft, July 1997. ietf.org\/internet-drafts\/draft-kaukonen-cipher-arcfour-01.txt"},{"key":"14_CR29","unstructured":"RSA Laboratories: \u201cPKCS #12: Personal Information Exchange Syntax Standard,\u201d (version 1.0 Draft), April 1997."},{"key":"14_CR30","unstructured":"CEC COM (90) 314 final SYN 287: \u201cOn the Protection of Individuals in Relation to the Processing of Personal Data,\u201d Commission of the European Communities, Brussels, September 1990."},{"key":"14_CR31","unstructured":"CEC COM(90) 314 final SYN 288: \u201cOn the Protection of Personal Data and Privacy in the Context of Public Digital Telecommunication Networks,\u201d Commission of the European Communities, Brussels, September 1990."},{"key":"14_CR32","unstructured":"CE R(81)1: Recommendation R(81)1 on Automated Medical Data Banks, Council of Europe Convention 108, January 1981, ISBN 92-871-0022-5."},{"key":"14_CR33","unstructured":"EU 95\/46\/EC: On the Protection of Individuals with regards to the Processing of Personal Data and on the Free Movement of Such Data, European Union Directive, OJ L281\/31-50, October 1995."},{"key":"14_CR34","doi-asserted-by":"publisher","first-page":"707","DOI":"10.2307\/3312079","volume":"135","author":"S. Simitis","year":"1987","unstructured":"Simitis, S.: \u201cReviewing Privacy in an Information Society,\u201d Univ. Pennsylvania Law Review, V.135, pp.707\u2013746, March 1987.","journal-title":"Univ. Pennsylvania Law Review"},{"key":"14_CR35","unstructured":"Sun Microsystems Inc.: \u201cJava Naming and Directory Interface,\u201d java.sun.com\/products\/jndi"},{"key":"14_CR36","unstructured":"Wahl, M., Howes, T. and S. Kille: \u201cLightweight Directory Access Protocol (v3),\u201d Internet Engineering Task Force: Request For Comments RFC2251. ds.internic.net\/rfc\/rfc2251.txt"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2014 ESORICS 98"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0055865","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T20:06:56Z","timestamp":1559506016000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0055865"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540650041","9783540497844"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/bfb0055865","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]},"assertion":[{"value":"28 May 2006","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}