{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T05:56:09Z","timestamp":1769925369469,"version":"3.49.0"},"reference-count":222,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T00:00:00Z","timestamp":1769040000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T00:00:00Z","timestamp":1769040000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100005416","name":"Norges Forskningsr\u00e5d","doi-asserted-by":"publisher","award":["288106"],"award-info":[{"award-number":["288106"]}],"id":[{"id":"10.13039\/501100005416","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005416","name":"Norges Forskningsr\u00e5d","doi-asserted-by":"publisher","award":["288106"],"award-info":[{"award-number":["288106"]}],"id":[{"id":"10.13039\/501100005416","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s10207-025-01169-y","type":"journal-article","created":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T14:09:11Z","timestamp":1769090951000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A survey on privacy of health data lifecycle: a taxonomy, review, and future directions"],"prefix":"10.1007","volume":"25","author":[{"given":"Sunanda","family":"Bose","sequence":"first","affiliation":[]},{"given":"Dusica","family":"Marijan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,22]]},"reference":[{"key":"1169_CR1","unstructured":"Official Journal of the European Union L119 (2016)"},{"key":"1169_CR2","unstructured":"Munro, D.: Data breaches in healthcare totaled over 112 million records in 2015. https:\/\/www.forbes.com\/sites\/danmunro\/2015\/12\/31\/data-breaches-in-healthcare-total-over-112-million-records-in-2015\/?sh=4e331bf67b07(2016)"},{"key":"1169_CR3","unstructured":"Barcena, M., Wueest, C., Lau, H.: Symantec (2014). https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/white-papers\/how-safe-is-your-quantified-self.pdf"},{"key":"1169_CR4","unstructured":"Dolan, B.: In-depth: Consumer health and data privacy issues beyond hipaa. https:\/\/www.mobihealthnews.com\/33393\/in-depth-consumer-health-and-data-privacy-issues-beyond-hipaa(2014)"},{"key":"1169_CR5","unstructured":"Jillson, E., Plant, M.: Developer of popular women\u2019s fertility-tracking app settles ftc allegations that it misled consumers about the disclosure of their health data . https:\/\/www.ftc.gov\/news-events\/news\/press-releases\/2021\/01\/developer-popular-womens-fertility-tracking-app-settles-ftc-allegations-it-misled-consumers-about(2021)"},{"key":"1169_CR6","unstructured":"Reicin, E.: Council post: Protecting consumer health data privacy beyond hipaa . https:\/\/www.forbes.com\/sites\/forbesnonprofitcouncil\/2022\/05\/10\/protecting-consumer-health-data-privacy-beyond-hipaa\/?sh=6927889e7b4e(2022)"},{"issue":"2","key":"1169_CR7","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1007\/s12553-024-00819-w","volume":"14","author":"S Rauti","year":"2024","unstructured":"Rauti, S., Carlsson, R., Mickelsson, S., M\u00e4kil\u00e4, T., Heino, T., Pirjatanniemi, E., Lepp\u00e4nen, V.: Heal. Technol. 14(2), 375 (2024)","journal-title":"Heal. Technol."},{"key":"1169_CR8","unstructured":"Reuters Staff. https:\/\/www.reuters.com\/business\/healthcare-pharmaceuticals\/unitedhealth-confirms-190-million-americans-affected-by-hack-tech-unit-2025-01-24\/. Accessed: 2025-02-22(2025)"},{"key":"1169_CR9","unstructured":"Jessica, L.: The Register . https:\/\/www.theregister.com\/2024\/05\/08\/unitedhealths_egregious_negligence\/. Accessed: 2025-02-22(2024)"},{"key":"1169_CR10","unstructured":"Vargas, L., Blue, L., Frost, V., Patton, C., Scaife, N., Butler, K.R., Traynor, P.: Proceedings of the NDSS Symposium . https:\/\/www.ndss-symposium.org\/ndss-paper\/digital-healthcare-associated-infection-a-case-study-on-the-security-of-a-major-multi-campus-hospital-system\/(2022)"},{"key":"1169_CR11","unstructured":"Pew Charitable Trusts, Report available at: http:\/\/www. pewtrusts. org\/en\/research-and-analysis\/issue-briefs\/2016\/09\/use-of-electronic-offender-trackingdevices-expands-sharply (2016)"},{"key":"1169_CR12","unstructured":"Weisburd, K., Bhadha, V., Clauson, M., Elican, J., Kahn, F., Lawrenz, K., Pemberton, B., Ringler, R., Schaer, J., Sherman, M.: GWU Legal Studies Research Paper (2021-41). https:\/\/issuu.com\/gwlawpubs\/docs\/electronic-prisons-report?fr=sOGI5NDcxODg3(2021)"},{"key":"1169_CR13","unstructured":"Alexander, M.: The newest jim crow recent criminal justice reforms contain the seeds of a frightening system of \u201ce-carceration.\u201d . https:\/\/www.nytimes.com\/2018\/11\/08\/opinion\/sunday\/criminal-justice-reforms-race-technology.html(2018)"},{"key":"1169_CR14","unstructured":"Study finds issues with electronic ankle monitors used as alternative to incarceration (2021). https:\/\/gwtoday.gwu.edu\/study-finds-issues-electronic-ankle-monitors-used-alternative-incarceration"},{"key":"1169_CR15","doi-asserted-by":"crossref","unstructured":"Walker, K.L.: Journal of Public Policy and Marketing 35(1) (2016)","DOI":"10.1509\/jppm.15.020"},{"key":"1169_CR16","doi-asserted-by":"crossref","unstructured":"Banerjee, S.S., Hemphill, T., Longstreet, P.: Information Society 34(1) (2018)","DOI":"10.1080\/01972243.2017.1391912"},{"key":"1169_CR17","doi-asserted-by":"crossref","unstructured":"Bonomi, L., Huang, Y., Ohno-Machado, L.: Nature Genetics 52(7) (2020)","DOI":"10.1038\/s41588-020-0651-0"},{"key":"1169_CR18","unstructured":"Wan, Z., Hazel, J.W., Clayton, E.W., Vorobeychik, Y., Kantarcioglu, M.: B.A. Malin, Nature Reviews Genetics 0123456789 (2022)"},{"key":"1169_CR19","doi-asserted-by":"crossref","unstructured":"Aziz, M.M.A., Sadat, M.N., Alhadidi, D., Wang, S., Jiang, X., Brown, C.L., Mohammed, N.:Briefings in Bioinformatics 20(3) (2017)","DOI":"10.1093\/bib\/bbx139"},{"key":"1169_CR20","doi-asserted-by":"publisher","unstructured":"Oh, S.R., Seo, Y.D., Lee, E., Kim, Y.G.: International Journal of Environmental Research and Public Health 18(18) (2021). https:\/\/doi.org\/10.3390\/ijerph18189668","DOI":"10.3390\/ijerph18189668"},{"issue":"1","key":"1169_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-017-0110-7","volume":"5","author":"K Abouelmehdi","year":"2018","unstructured":"Abouelmehdi, K., Beni-Hessane, A., Khaloufi, H.: Big healthcare data: preserving security and privacy. Journal of Big Data 5(1), 1\u201318 (2018)","journal-title":"Journal of Big Data"},{"issue":"10","key":"1169_CR22","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/2890488","volume":"59","author":"AJ Burns","year":"2016","unstructured":"Burns, A.J., Johnson, M.E., Honeyman, P.: A brief chronology of medical device security. Commun. ACM 59(10), 66\u201372 (2016). https:\/\/doi.org\/10.1145\/2890488","journal-title":"Commun. ACM"},{"key":"1169_CR23","doi-asserted-by":"crossref","unstructured":"Coventry, L., Branley, D.: Cybersecurity in healthcare: A narrative review of trends, threats and ways forward, Maturitas 113(2018)","DOI":"10.1016\/j.maturitas.2018.04.008"},{"key":"1169_CR24","doi-asserted-by":"publisher","unstructured":"Hathaliya, J.J., Tanwar, S.: An exhaustive survey on security and privacy issues in Healthcare 4.0, Computer Communications 153, 311 . https:\/\/doi.org\/10.1016\/j.comcom.2020.02.018. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0140366419311880(2020)","DOI":"10.1016\/j.comcom.2020.02.018"},{"key":"1169_CR25","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1016\/j.jbi.2015.04.007.","volume":"55","author":"C Camara","year":"2015","unstructured":"Camara, C., Peris-Lopez, P., Tapiador, J.E.: Security and privacy issues in implantable medical devices: A comprehensive survey. J. Biomed. Inform. 55, 272 (2015). https:\/\/doi.org\/10.1016\/j.jbi.2015.04.007. (https:\/\/www.sciencedirect.com\/science\/article\/pii\/S153204641500074X)","journal-title":"J. Biomed. Inform."},{"key":"1169_CR26","unstructured":"Commission, I.E.: 6-21- ISO 29100: Information technology \u2014 Security techniques \u2014 Privacy framework Technologies, I.O. for Standardization, 2011 (2011)"},{"key":"1169_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.smhl.2022.100295.","volume":"25","author":"E Kwarteng","year":"2022","unstructured":"Kwarteng, E., Cebe, M.: A survey on security issues in modern Implantable Devices: Solutions and future issues. Smart Health 25, 100295 (2022). https:\/\/doi.org\/10.1016\/j.smhl.2022.100295. (https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2352648322000307)","journal-title":"Smart Health"},{"issue":"4","key":"1169_CR28","doi-asserted-by":"publisher","first-page":"53","DOI":"10.3390\/cryptography8040053","volume":"8","author":"L Catuogno","year":"2024","unstructured":"Catuogno, L., Galdi, C.: Implantable Medical Device Security. Cryptography 8(4), 53 (2024). https:\/\/doi.org\/10.3390\/cryptography8040053","journal-title":"Cryptography"},{"key":"1169_CR29","doi-asserted-by":"publisher","unstructured":"El Majdoubi, D., El Bakkali, H., Sadki, S., Maqour, Z., Leghmid, A., T.R. G.: (2022) The Systematic Literature Review of Privacy-Preserving Solutions in Smart Healthcare Environment. Sec. and Commun. Netw. 1, 5642026. https:\/\/doi.org\/10.1155\/2022\/5642026","DOI":"10.1155\/2022\/5642026"},{"key":"1169_CR30","unstructured":"Owens, K., Alem, A., Roesner, F., Kohno, T.:Proceedings of the 31st USENIX Security Symposium, Security 2022 (2022)"},{"issue":"2s","key":"1169_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3422816","volume":"17","author":"AK Singh","year":"2021","unstructured":"Singh, A.K., Anand, A., Lv, Z., Ko, H., Mohan, A.: A Survey on Healthcare Data: A Security Perspective. ACM Trans. Multimedia Comput. Commun. Appl. 17(2s), 1\u201326 (2021). https:\/\/doi.org\/10.1145\/3422816","journal-title":"ACM Trans. Multimedia Comput. Commun. Appl."},{"issue":"2","key":"1169_CR32","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.eij.2020.07.003.","volume":"22","author":"I Keshta","year":"2021","unstructured":"Keshta, I., Odeh, A.: Security and privacy of electronic health records: Concerns and challenges. Egyptian Informatics Journal 22(2), 177 (2021). https:\/\/doi.org\/10.1016\/j.eij.2020.07.003. (https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1110866520301365)","journal-title":"Egyptian Informatics Journal"},{"issue":"3","key":"1169_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3453176","volume":"2","author":"AI Newaz","year":"2021","unstructured":"Newaz, A.I., Sikder, A.K., Rahman, M.A., Uluagac, A.S.: A Survey on Security and Privacy Issues in Modern Healthcare Systems: Attacks and Defenses. ACM Trans. Comput. Healthcare 2(3), 1\u201344 (2021). https:\/\/doi.org\/10.1145\/3453176","journal-title":"ACM Trans. Comput. Healthcare"},{"key":"1169_CR34","doi-asserted-by":"publisher","unstructured":"Yigzaw, K.Y., Olabarriaga, S.D., Michalas, A., Marco-Ruiz, L., Hillen, C.,Verginadis, Y., de Oliveira, M.T., Krefting, D., Penzel, T., Bowden, J., Bellika, J.G., Chomutare, T.: Chapter 14 - Health data security and privacy: Challenges and solutions for the future, in Roadmap to Successful Digital Health Ecosystems, ed. by E.\u00a0Hovenga, H.\u00a0Grain (Academic Press, 2022), pp. 335\u2013362. https:\/\/doi.org\/10.1016\/B978-0-12-823413-6.00014-8","DOI":"10.1016\/B978-0-12-823413-6.00014-8"},{"issue":"3","key":"1169_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3501296","volume":"55","author":"DC Nguyen","year":"2022","unstructured":"Nguyen, D.C., Pham, Q.V., Pathirana, P.N., Ding, M., Seneviratne, A., Lin, Z., Dobre, O., Hwang, W.J.: Federated Learning for Smart Healthcare: A Survey, Federated Learning for Smart Healthcare: A Survey. ACM Comput. Surv. 55(3), 1\u201337 (2022). https:\/\/doi.org\/10.1145\/3501296","journal-title":"ACM Comput. Surv."},{"key":"1169_CR36","doi-asserted-by":"crossref","unstructured":"Zeadally, S., Isaac, J.T., Baig, Z.: Security Attacks and Solutions in Electronic Health (E-health) Systems, Journal of Medical Systems 40(12)263(2016)","DOI":"10.1007\/s10916-016-0597-z"},{"issue":"4","key":"1169_CR37","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1007\/s10207-021-00576-1","volume":"21","author":"M Saifuzzaman","year":"2022","unstructured":"Saifuzzaman, M., Ananna, T.N., Chowdhury, M.J.M., Ferdous, M.S., Chowdhury, F.: A systematic literature review on wearable health data publishing under differential privacy. Int. J. Inf. Secur. 21(4), 847 (2022)","journal-title":"Int. J. Inf. Secur."},{"key":"1169_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2023.106848","volume":"158","author":"N Khalid","year":"2023","unstructured":"Khalid, N., Qayyum, A., Bilal, M., Al-Fuqaha, A., Qadir, J.: Privacy-preserving artificial intelligence in healthcare: Techniques and applications. Comput. Biol. Med. 158, 106848 (2023). https:\/\/doi.org\/10.1016\/j.compbiomed.2023.106848. (https:\/\/www.sciencedirect.com\/science\/article\/pii\/S001048252300313X)","journal-title":"Comput. Biol. Med."},{"key":"1169_CR39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3469215","volume":"12","author":"M Nankya","year":"2024","unstructured":"Nankya, M., Mugisa, A., Usman, Y., Upadhyay, A., Chataut, R.: Security and Privacy in E-Health Systems: A Review of AI and Machine Learning Techniques. IEEE Access 12, 148796 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3469215","journal-title":"IEEE Access"},{"key":"1169_CR40","doi-asserted-by":"crossref","unstructured":"Arbabi, M.S., Lal, C., Veeraragavan, N.R., Marijan, D., Nyg\u00e5rd, J., Vitenberg, F R.: A Survey on Blockchain for Healthcare: Challenges, Benefits, and Future Directions, A Survey on Blockchain for Healthcare: Challenges, Benefits, and Future Directions,IEEE Communications Surveys & Tutorials 25(1) (2023)","DOI":"10.1109\/COMST.2022.3224644"},{"key":"1169_CR41","doi-asserted-by":"crossref","unstructured":"Briganti, G., Le\u00a0Moine, O.: Artificial Intelligence in Medicine: Today and Tomorrow, Frontiers in Medicine 7 (2020). https:\/\/www.frontiersin.org\/article\/10.3389\/fmed.2020.00027","DOI":"10.3389\/fmed.2020.00027"},{"key":"1169_CR42","unstructured":"Bartoletti, I.: in Artificial Intelligence in Medicine, ed. by D.\u00a0Ria\u00f1o, S.\u00a0Wilk, A.\u00a0ten Teije (Springer International Publishing, Cham, 2019)"},{"key":"1169_CR43","doi-asserted-by":"crossref","unstructured":"Parikh, R.B., Teeple, S., Navathe, A.S.: Addressing Bias in Artificial Intelligence in Health Care, JAMA 322(24) (2019)","DOI":"10.1001\/jama.2019.18058"},{"key":"1169_CR44","doi-asserted-by":"crossref","unstructured":"Price, W.N.: Big data and black-box medical algorithms, Science Translational Medicine 10(471) (2018)","DOI":"10.1126\/scitranslmed.aao5333"},{"issue":"12","key":"1169_CR45","doi-asserted-by":"publisher","first-page":"815","DOI":"10.3390\/info15120815","volume":"15","author":"S Bose","year":"2024","unstructured":"Bose, S., Marijan, D.: Traversable Ledger for Responsible Data Sharing and Access Control in Health Research. Information 15(12), 815 (2024). https:\/\/doi.org\/10.3390\/info15120815","journal-title":"Information"},{"issue":"24","key":"1169_CR46","doi-asserted-by":"publisher","first-page":"29","DOI":"10.5120\/12215-8356","volume":"70","author":"T Parshant","year":"2013","unstructured":"Parshant, T., Navdeep, A., Bhanu, E.S.P., Dubey, P.: HIPAA Compliance and Cloud Computing. International Journal of Computer Applications 70(24), 29\u201332 (2013). https:\/\/doi.org\/10.5120\/12215-8356","journal-title":"International Journal of Computer Applications"},{"key":"1169_CR47","unstructured":"Ieee standard for open mobile health data\u2013representation of metadata, sleep, and physical activity measures. IEEE Standards Association (2021). https:\/\/standards.ieee.org\/ieee\/1752.1\/6982\/"},{"key":"1169_CR48","unstructured":"Standard for mobile health data: Representation of cardiovascular, respiratory, and metabolic measures. IEEE Standards Association (ongoing). https:\/\/standards.ieee.org\/ieee\/1752.2\/10610\/"},{"key":"1169_CR49","doi-asserted-by":"publisher","unstructured":"Braunstein, M.L.: Health Information Exchange (Springer International Publishing, Cham, 2018), pp. 79\u2013112. https:\/\/doi.org\/10.1007\/978-3-319-93414-3_5","DOI":"10.1007\/978-3-319-93414-3_5"},{"key":"1169_CR50","unstructured":"Roan, D.: Wiggins and froome medical records released by \u2019russian hackers\u2019 (2016). https:\/\/www.bbc.com\/news\/world-37369705"},{"key":"1169_CR51","unstructured":"HL7 International FHIR Infrastructure. Smart app launch implementation guide, version 2.2.0. https:\/\/build.fhir.org\/ig\/HL7\/smart-app-launch\/ (2023). Continuous build; active as of 2023-03-01"},{"key":"1169_CR52","unstructured":"U.S. Department of Health & Human Services, Office for Civil Rights. Methods for de-identification of protect\u00aded health information (hipaa privacy rule). https:\/\/www.hhs.gov\/hipaa\/for-professionals\/special-topics\/de-identification\/index.html (2025). Accessed on 2025-08-15; provides guidance on Expert Determination and Safe Harbor methods under 164.514 of the HIPAA Privacy Rule"},{"key":"1169_CR53","unstructured":"Patient $match operation. https:\/\/build.fhir.org\/patient-operation-match.html"},{"key":"1169_CR54","unstructured":"HL7 International FHIR Infrastructure. Fhir bulk data access (flat fhir) implementation guide, version 2.0.0 (stu). https:\/\/hl7.org\/fhir\/uv\/bulkdata\/ (2025). Current published version (STU 2.0.0); continuous build and maintained under the FHIR Infrastructure"},{"key":"1169_CR55","unstructured":"NHS England. Records management code of practice. https:\/\/transform.england.nhs.uk\/information-governance\/guidance\/records-management-code\/records-management-code-of-practice\/ (2021)"},{"key":"1169_CR56","unstructured":"European Union. General data protection regulation. https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj\/eng. Official consolidated legal text. Reader-friendly mirror: https:\/\/gdpr-info.eu\/art-32-gdpr\/"},{"key":"1169_CR57","doi-asserted-by":"publisher","unstructured":"Nguyen, D.C., Pham, Q.V., Pathirana, P.N., Ding, M., Seneviratne, A., Lin, Z., Dobre, O., Hwang, W.J.: Federated Learning for Smart Healthcare: A Survey, ACM Comput. Surv. 55(3) (2022). https:\/\/doi.org\/10.1145\/3501296","DOI":"10.1145\/3501296"},{"key":"1169_CR58","doi-asserted-by":"publisher","unstructured":"Bahaa, S., Ghalwash, A.Z., Harb, H., DataOps Lifecycle with a Case Study in Healthcare, International Journal of Advanced Computer Science and Applications 14(1) (2023). https:\/\/doi.org\/10.14569\/IJACSA.2023.0140115","DOI":"10.14569\/IJACSA.2023.0140115"},{"key":"1169_CR59","unstructured":"45 c.f.r. 164.312 \u2014 technical safeguards. Promulgated at 68\u00a0Fed. Reg. 8376 (Feb. 20, 2003), as amended at 78\u00a0Fed. Reg. 5694 (Jan. 25, 2013). For a reader-friendly mirror of the text, see also https:\/\/www.law.cornell.edu\/cfr\/text\/45\/164.312"},{"key":"1169_CR60","unstructured":"U.S. Department of Health and Human Services, Office for Civil Rights (OCR). The hipaa privacy rule. https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/index.html. The Privacy Rule is located at 45\u00a0C.F.R. Part\u00a0160 and Subparts\u00a0A and\u00a0E of Part\u00a0164"},{"key":"1169_CR61","unstructured":"Halperin, D., Clark, S.S., Fu, K., Heydt-Benjamin, T.S., Defend, B., Kohno, T., et\u00a0al.: Proceedings - IEEE Symposium on Security and Privacy (2008)"},{"key":"1169_CR62","unstructured":"Defend, B., Salajegheh, M., Fu, K., Inoue, S.: University of Massachusetts Amherst and Kyushu University, Trustees of Dartmouth College (2008)"},{"key":"1169_CR63","unstructured":"Li, C., Raghunathan, A., Jha, N.K.: 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services, HEALTHCOM 2011 (2011)"},{"key":"1169_CR64","unstructured":"Rathore, H., Mohamed, A., Al-Ali, A., Du, X., Guizani, M.: 2017 13th International Wireless Communications and Mobile Computing Conference, IWCMC 2017 (2017)"},{"key":"1169_CR65","unstructured":"The Indian Medical Council (Professional Conduct, Etiquette And Ethics) Regulations, 2002 (2002). https:\/\/indiankanoon.org\/doc\/100527417\/"},{"key":"1169_CR66","doi-asserted-by":"crossref","unstructured":"The Indian Medical Council Act, 1956 (102 of 1956) (1956). http:\/\/www.bareactslive.com\/ACA\/ACT725.HTM","DOI":"10.25291\/VR\/1956-VLR-102"},{"key":"1169_CR67","unstructured":"U.D.o.H..H.S. Office for Civil Rights, Summary of HIPAA Privacy Rule (2003). www.hhs.gov\/sites\/default\/files\/privacysummary.pdf"},{"key":"1169_CR68","unstructured":"Isidore, C.: Radioshack trying to sell data of 100 million customers (2015). https:\/\/money.cnn.com\/2015\/03\/25\/news\/companies\/radioshack-customer-data\/?iid=EL"},{"key":"1169_CR69","unstructured":"Isidore, C.: Apple, at & t fight sale of radioshack customer data. https:\/\/money.cnn.com\/2015\/05\/15\/news\/companies\/radioshack-apple-att\/index.html(2015)"},{"key":"1169_CR70","doi-asserted-by":"crossref","unstructured":"Seh, A.H., Zarour, M., Alenezi, M., Sarkar, A.K., Agrawal, A., Kumar, R., Khan, R.A.: Healthcare data breaches: Insights and implications, Healthcare (Switzerland) 8(2) (2020)","DOI":"10.3390\/healthcare8020133"},{"key":"1169_CR71","unstructured":"Ramirez, E., Brill, J., Ohlhausen, M.K., Wright, J., McSweeny, T.\u00a0D.: DATA Brokers: A Call for TRansparency and Accountability, Federal Trade Commission (May) (2014)"},{"key":"1169_CR72","unstructured":"Solove, B.D.J.: Nothing to Hide: The False Tradeoff Between Privacy and Security, Yale University Press (2011)"},{"key":"1169_CR73","doi-asserted-by":"crossref","unstructured":"Altawy, R., Youssef, A.M.R.M., Member, S.: Security Tradeoffs in Cyber Physical Systems : A Case Study Survey on Implantable Medical Devices, IEEE Access 4 (2016)","DOI":"10.1109\/ACCESS.2016.2521727"},{"key":"1169_CR74","unstructured":"Greene, T.: Nhs trust \u2019deliberately\u2019 deleted up to 90,000 emails before tribunal hearing (2022). https:\/\/www.computerweekly.com\/news\/252522787\/NHS-trust-deliberately-deleted-up-to-90000-emails-before-tribunal-hearing"},{"key":"1169_CR75","doi-asserted-by":"crossref","unstructured":"Thomas, J.: Medical records and issues in negligence, Indian Journal of Urology 25(3) (2009)","DOI":"10.4103\/0970-1591.56208"},{"key":"1169_CR76","unstructured":"Sharrett, L.: Kentucky mom alleges hospital workers missed her cancer \u2014 then covered up their mistake (2021). https:\/\/www.nbcnews.com\/news\/us-news\/kentucky-mom-alleges-hospital-workers-missed-her-cancer-then-covered-n1258533"},{"key":"1169_CR77","unstructured":"Forensics, E.: Electronic medical records manipulated post lawsuit (2021). https:\/\/enigmaforensics.com\/blog\/electronic_medical_records_manipulation\/"},{"key":"1169_CR78","unstructured":"Hannon, B.P.d.: Kentucky woman, 59, with aggressive breast cancer sues hospital after worker sent her the wrong letter saying she was in the clear and then \u2019covered it up by editing electronic records\u2019 (2021). https:\/\/www.dailymail.co.uk\/news\/article-9373713\/Kentucky-woman-breast-cancer-sues-hospital-WRONG-letter-says-clear.html"},{"key":"1169_CR79","doi-asserted-by":"crossref","unstructured":"Dyer, C.: Police investigate allegations of data falsification at Essex hospital, BMJ (Clinical research ed.) 347(November) (2013)","DOI":"10.1136\/bmj.f6719"},{"key":"1169_CR80","unstructured":"Sweeney, L.: Simple demographics often identify people uniquely, Health (San Francisco) 671(2000)"},{"key":"1169_CR81","doi-asserted-by":"publisher","unstructured":"Golle, P.: in Proceedings of the 5th ACM Workshop on Privacy in Electronic Society (Association for Computing Machinery, New York, NY, USA, 2006), WPES \u201906, p. 77\u201380. https:\/\/doi.org\/10.1145\/1179601.1179615","DOI":"10.1145\/1179601.1179615"},{"key":"1169_CR82","doi-asserted-by":"crossref","unstructured":"Emam, K.E., Kosseim, P.: Privacy interests in prescription data, part 2: Patient privacy, IEEE Security and Privacy 7(2) (2009)","DOI":"10.1109\/MSP.2009.47"},{"key":"1169_CR83","unstructured":"MacRae, J., Dobbie, S., Ranchhod, D.: Assessing re-identification risk of de-identified health data in new zealand, Health Care and Informatics Review Online 16(2) (2012)"},{"issue":"6","key":"1169_CR84","doi-asserted-by":"publisher","first-page":"1184","DOI":"10.1016\/j.ijinfomgt.2016.08.002","volume":"36","author":"J Henriksen-bulmer","year":"2016","unstructured":"Henriksen-bulmer, J., Jeary, S.: Re-identification attacks\u2013A systematic literature review Jane. International Journal of Information Management 36(6), 1184\u20131192 (2016)","journal-title":"International Journal of Information Management"},{"key":"1169_CR85","unstructured":"Deuber, D., Christin, N.: Assessing Anonymity Techniques Employed in German Court Decisions : A De-Anonymization Experiment, Proceedings of the 31st USENIX Security Symposium, Security 2022 (2022)"},{"key":"1169_CR86","doi-asserted-by":"publisher","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: in 2017 IEEE Symposium on Security and Privacy (SP) (IEEE Computer Society, Los Alamitos, CA, USA, 2017), pp. 3\u201318. https:\/\/doi.org\/10.1109\/SP.2017.41","DOI":"10.1109\/SP.2017.41"},{"key":"1169_CR87","doi-asserted-by":"crossref","unstructured":"Steeg, K., Bohrer, E., Sch\u00e4fer, S.B., Vu, V.D., Scherberich, J., Windfelder, A.G., Krombach, G.A.: Re-identification of anonymised MRI head images with publicly available software: investigation of the current risk to patient privacy, eClinicalMedicine 78 (2024). https:\/\/api.semanticscholar.org\/CorpusID:274258782","DOI":"10.1016\/j.eclinm.2024.102930"},{"key":"1169_CR88","doi-asserted-by":"publisher","unstructured":"Xiao, Y.: W.\u00a0Ashbee, V.D. Calhoun, S.\u00a0Plis, in 2022 International Joint Conference on Neural Networks (IJCNN) (2022), pp. 1\u20137. https:\/\/doi.org\/10.1109\/IJCNN55064.2022.9891937","DOI":"10.1109\/IJCNN55064.2022.9891937"},{"issue":"11","key":"1169_CR89","doi-asserted-by":"publisher","first-page":"3874","DOI":"10.3390\/s21113874","volume":"21","author":"N Subbanna","year":"2021","unstructured":"Subbanna, N., Wilms, M., Tuladhar, A., Forkert, N.D.: An Analysis of the Vulnerability of Two Common Deep Learning-Based Medical Image Segmentation Techniques to Model Inversion Attacks. Sensors 21(11), 3874 (2021). https:\/\/doi.org\/10.3390\/s21113874","journal-title":"Sensors"},{"key":"1169_CR90","doi-asserted-by":"crossref","unstructured":"Yan, W., Hylamia, S., Voigt, T., Rohner, C.: PHY-IDS: A physical-layer spoofing attack detection system for wearable devices, WearSys 2020 - Proceedings of the 6th ACM Workshop on Wearable Systems and Applications, Part of MobiSys 2020 (2020)","DOI":"10.1145\/3396870.3400010"},{"key":"1169_CR91","unstructured":"Rasmussen, K.B., Castelluccia, C., Heydt-Benjamin, T.S., Capkun, S.:Proceedings of the ACM Conference on Computer and Communications Security (2009)"},{"issue":"3","key":"1169_CR92","doi-asserted-by":"publisher","first-page":"2053","DOI":"10.1109\/TII.2021.3089462","volume":"18","author":"O Salem","year":"2022","unstructured":"Salem, O., Alsubhi, K., Shaafi, A., Gheryani, M., Mehaoua, A., Boutaba, R.: Man-in-the-Middle Attack Mitigation in Internet of Medical Things. IEEE Transactions on Industrial Informatics 18(3), 2053\u20132062 (2022)","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"1169_CR93","unstructured":"Kim, J., Lee, B.J., Yoo, S.K.: Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS (2013)"},{"key":"1169_CR94","unstructured":"Xu, F., Qin, Z., Tan, C.C., Wang, B., Li, Q.: Proceedings - IEEE INFOCOM (2011)"},{"key":"1169_CR95","doi-asserted-by":"crossref","unstructured":"Shi, L., Yuan, J., Yu, S., Li, M., MASK-BAN: Movement-aided authenticated secret key extraction utilizing channel characteristics in body area networks, IEEE Internet of Things Journal 2(1) (2015)","DOI":"10.1109\/JIOT.2015.2391113"},{"issue":"3","key":"1169_CR96","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/s10916-018-0896-7","volume":"42","author":"H Li","year":"2018","unstructured":"Li, H., Guo, F., Zhang, W., Wang, J., Xing, J.: (a, k)-Anonymous Scheme for Privacy-Preserving Data Collection in IoT-based Healthcare Services Systems. Journal of Medical Systems 42(3), 56 (2018)","journal-title":"Journal of Medical Systems"},{"issue":"2","key":"1169_CR97","doi-asserted-by":"publisher","first-page":"326","DOI":"10.3390\/s19020326","volume":"19","author":"AD Dwivedi","year":"2019","unstructured":"Dwivedi, A.D., Srivastava, G., Dhar, S., Singh, R.: A decentralized privacy-preserving healthcare blockchain for IoT. Sensors (Switzerland) 19(2), 326 (2019)","journal-title":"Sensors (Switzerland)"},{"issue":"4","key":"1169_CR98","doi-asserted-by":"publisher","first-page":"1274","DOI":"10.1109\/TCC.2016.2617382","volume":"8","author":"M Chen","year":"2020","unstructured":"Chen, M., Qian, Y., Chen, J., Hwang, K., Mao, S., Hu, L.: Privacy Protection and Intrusion Avoidance for Cloudlet-Based Medical Data Sharing. IEEE Transactions on Cloud Computing 8(4), 1274\u20131283 (2020)","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"1169_CR99","doi-asserted-by":"crossref","unstructured":"Liu, J., Li, X., Ye, L., Zhang, H., Du, X., Guizani, M.: in 2018 IEEE Global Communications Conference (GLOBECOM) (2018), pp. 1\u20136","DOI":"10.1109\/GLOCOM.2018.8647713"},{"issue":"5","key":"1169_CR100","doi-asserted-by":"publisher","first-page":"8770","DOI":"10.1109\/JIOT.2019.2923525","volume":"6","author":"J Xu","year":"2019","unstructured":"Xu, J., Xue, K., Li, S., Tian, H., Hong, J., Hong, P., Yu, N.: Healthchain: A Blockchain-Based Privacy Preserving Scheme for Large-Scale Health Data. IEEE Internet of Things Journal 6(5), 8770\u20138781 (2019)","journal-title":"IEEE Internet of Things Journal"},{"key":"1169_CR101","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.jpdc.2022.03.009","volume":"164","author":"J Jayabalan","year":"2022","unstructured":"Jayabalan, J., Jeyanthi, N.: Scalable blockchain model using off-chain IPFS storage for healthcare data security and privacy. Journal of Parallel and Distributed Computing 164, 152\u2013167 (2022)","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"1169_CR102","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.future.2014.06.004","volume":"43\u201344","author":"JJ Yang","year":"2015","unstructured":"Yang, J.J., Li, J.Q., Niu, Y.: A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Generation Computer Systems 43\u201344, 74\u201386 (2015)","journal-title":"Future Generation Computer Systems"},{"key":"1169_CR103","doi-asserted-by":"crossref","unstructured":"Qiu, H., Qiu, M., Liu, M., Memmi, G.:Secure Health Data Sharing for Medical Cyber-Physical Systems for the Healthcare 4.0, IEEE Journal of Biomedical and Health Informatics 24(9) (2020)","DOI":"10.1109\/JBHI.2020.2973467"},{"key":"1169_CR104","unstructured":"Thummavet, P., Vasupongayya, S.: 2013 International Computer Science and Engineering Conference, ICSEC 2013 (2013)"},{"issue":"2","key":"1169_CR105","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/s10916-018-1144-x","volume":"43","author":"H Tian","year":"2019","unstructured":"Tian, H., He, J., Ding, Y.: Medical Data Management on Blockchain with Privacy. Journal of Medical Systems 43(2), 26 (2019)","journal-title":"Journal of Medical Systems"},{"key":"1169_CR106","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1016\/j.future.2018.12.044","volume":"95","author":"AA Omar","year":"2019","unstructured":"Omar, A.A., Bhuiyan, M.Z.A., Basu, A., Kiyomoto, S., Rahman, M.S.: Privacy-friendly platform for healthcare data in cloud based on blockchain environment. Future Generation Computer Systems 95, 511\u2013521 (2019)","journal-title":"Future Generation Computer Systems"},{"key":"1169_CR107","doi-asserted-by":"crossref","unstructured":"Yang, Y., Xiao, X., Cai, X., Zhang, W.: A secure and high visual-quality framework for medical images by contrast-enhancement reversible data hiding and homomorphic encryption, IEEE Access 7 (2019)","DOI":"10.1109\/ACCESS.2019.2929298"},{"key":"1169_CR108","doi-asserted-by":"crossref","unstructured":"Domadiya, N., Rao, U.P.:Privacy Preserving Distributed Association Rule Mining Approach on Vertically Partitioned Healthcare Data, Procedia Computer Science 148(Icds 2018) (2019)","DOI":"10.1016\/j.procs.2019.01.023"},{"key":"1169_CR109","doi-asserted-by":"crossref","unstructured":"Huang, H., Zhu, P., Xiao, F., Sun, X., Huang, Q.:A blockchain-based scheme for privacy-preserving and secure sharing of medical data, Computers and Security 99 (2020)","DOI":"10.1016\/j.cose.2020.102010"},{"key":"1169_CR110","unstructured":"Eskeland, S., Oleshchuk, V.: in European Conference on eHealth 2007 (Gesellschaft fur Informatik e. V., Bonn, 2007), pp. 11\u201321"},{"key":"1169_CR111","unstructured":"Jose, J.T., Anju, S.:Threshold Cryptography Based Secure Access Control for Electronic Medical Record in an Intensive Care Unit, International Journal of Engineering Research & Technology (IJERT) 2(9) (2013)"},{"issue":"10","key":"1169_CR112","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/s10916-016-0574-6","volume":"40","author":"X Yue","year":"2016","unstructured":"Yue, X., Wang, H., Jin, D., Li, M., Jiang, W.: Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control. Journal of Medical Systems 40(10), 218 (2016)","journal-title":"Journal of Medical Systems"},{"issue":"8","key":"1169_CR113","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/s10916-018-0995-5","volume":"42","author":"A Zhang","year":"2018","unstructured":"Zhang, A., Lin, X.: Towards Secure and Privacy-Preserving Data Sharing in e-Health Systems via Consortium Blockchain. Journal of Medical Systems 42(8), 140 (2018)","journal-title":"Journal of Medical Systems"},{"key":"1169_CR114","doi-asserted-by":"crossref","unstructured":"Xie, Y., He, Q., Zhang, D., Hu, X.:Medical ethics privacy protection based on combining distributed randomization with K-anonymity, Proceedings - 2015 8th International Congress on Image and Signal Processing, CISP 2015 (Cisp) (2016)","DOI":"10.1109\/CISP.2015.7408136"},{"key":"1169_CR115","unstructured":"Puppala, M., He, T., Yu, X., Chen, S., Ogunti, R.: S.T. Wong, 3rd IEEE EMBS Int. Conf. on Biomedical and Health Informatics, BHI 2016 (2016)"},{"issue":"3","key":"1169_CR116","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/s10916-016-0657-4","volume":"41","author":"A Miyaji","year":"2017","unstructured":"Miyaji, A., Nakasho, K., Nishida, S.: Privacy-Preserving Integration of Medical Data: A Practical Multiparty Private Set Intersection. Journal of Medical Systems 41(3), 37 (2017)","journal-title":"Journal of Medical Systems"},{"issue":"1","key":"1169_CR117","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1186\/s12911-017-0478-5","volume":"17","author":"AP Brown","year":"2017","unstructured":"Brown, A.P., Borgs, C., Randall, S.M., Schnell, R.: Evaluating privacy-preserving record linkage using cryptographic long-term keys and multibit trees on large medical datasets. BMC Medical Informatics and Decision Making 17(1), 83 (2017)","journal-title":"BMC Medical Informatics and Decision Making"},{"key":"1169_CR118","doi-asserted-by":"crossref","unstructured":"Chen, F., Jiang, X., Wang, S., Schilling, L.M., Meeker, D., Ong, T., Matheny, M.E., Doctor, J.N.: L.e.a. Ohno-Machado,Perfectly Secure and Efficient Two-Party Electronic-Health-Record Linkage, IEEE Internet Computing 22(2) 32-41(2018)","DOI":"10.1109\/MIC.2018.112102542"},{"key":"1169_CR119","unstructured":"Schnell, R., Borgs, C.: in Machine Learning and Knowledge Discovery in Databases (Springer International Publishing, 2020)"},{"key":"1169_CR120","doi-asserted-by":"crossref","unstructured":"Chi, Y.,Hong, J., Jurek, A., Liu, W., O\u2019Reilly, D.: Privacy preserving record linkage in the presence of missing values, Information Systems 71 (2017)","DOI":"10.1016\/j.is.2017.07.001"},{"key":"1169_CR121","doi-asserted-by":"crossref","unstructured":"Vaiwsri, S., Ranbaduge, T., Christen, P., Schnell, R.: Accurate privacy-preserving record linkage for databases with missing values, Information Systems 106 (2022)","DOI":"10.1016\/j.is.2021.101959"},{"key":"1169_CR122","doi-asserted-by":"crossref","unstructured":"Schnell, R., Bachteler, T., Reiher, J.:Privacy-preserving record linkage using Bloom filters, BMC Medical Informatics and Decision Making 9(1) (2009)","DOI":"10.1186\/1472-6947-9-41"},{"key":"1169_CR123","doi-asserted-by":"crossref","unstructured":"Ghadamyari, M., Samet, S.: Privacy-Preserving Statistical Analysis of Health Data Using Paillier Homomorphic Encryption and Permissioned Blockchain,Proceedings - 2019 IEEE International Conference on Big Data, Big Data 2019 (2019)","DOI":"10.1109\/BigData47090.2019.9006231"},{"key":"1169_CR124","doi-asserted-by":"crossref","unstructured":"Sinhal, R.: I.A. Ansari,Machine learning based multipurpose medical image watermarking, Neural Computing and Applications 5 (2023)","DOI":"10.1007\/s00521-023-08457-5"},{"key":"1169_CR125","unstructured":"Sharif, H.U.: Privacy Preservation of Medical Data using Random Decision Tree,International Journal of All Research Education & Scientific Methods 9(10) (2021)"},{"key":"1169_CR126","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1016\/j.future.2020.07.023","volume":"113","author":"X Guo","year":"2020","unstructured":"Guo, X., Lin, H., Wu, Y., Peng, M.: A new data clustering strategy for enhancing mutual privacy in healthcare IoT systems. Future Generation Computer Systems 113, 407\u2013417 (2020)","journal-title":"Future Generation Computer Systems"},{"key":"1169_CR127","doi-asserted-by":"crossref","unstructured":"Gheid, Z., Challal, Y.:Efficient and Privacy-Preserving k-Means Clustering for Big Data Mining, IEEE TrustCom (2016)","DOI":"10.1109\/TrustCom.2016.0140"},{"issue":"1","key":"1169_CR128","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/s11277-020-07040-8","volume":"117","author":"R Chauhan","year":"2021","unstructured":"Chauhan, R., Kaur, H., Chang, V.: An Optimized Integrated Framework of Big Data Analytics Managing Security and Privacy in Healthcare Data. Wireless Personal Communications 117(1), 87\u2013108 (2021)","journal-title":"Wireless Personal Communications"},{"key":"1169_CR129","unstructured":"Park, J., Lee, D.H.: Security and privacy for implantable medical devices,Journal of Healthcare Engineering (2018)"},{"key":"1169_CR130","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101887","volume":"96","author":"C Ge","year":"2020","unstructured":"Ge, C., Yin, C., Liu, Z., Fang, L., Zhu, J., Ling, H.: A privacy preserve big data analysis system for wearable wireless sensor network. Computers and Security 96, 101887 (2020)","journal-title":"Computers and Security"},{"key":"1169_CR131","unstructured":"Zhang, Q.: in 2021 2nd International Conference on Computing and Data Science (CDS) (2021)"},{"key":"1169_CR132","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/3-540-45861-1_22","volume-title":"Information Security and Cryptology \u2013 ICISC 2001","author":"R Steinfeld","year":"2002","unstructured":"Steinfeld, R., Bull, L.: Y. Zheng. In: Kim, K. (ed.) Information Security and Cryptology \u2013 ICISC 2001, pp. 285\u2013304. Springer, Berlin Heidelberg, Berlin, Heidelberg (2002)"},{"key":"1169_CR133","unstructured":"L.\u00a0Malina., J.\u00a0Hajny., P.\u00a0Dzurenda., S.\u00a0Ricci., in Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - SECRYPT. INSTICC (SciTePress, 2018)"},{"key":"1169_CR134","unstructured":"Wang, W.,Jiang, Y., Shen, Q.,Huang, W., Chen, H., Wang, S., Wang, X., Tang, H., Chen, K., Lauter, K., Lin, D.: Toward scalable fully homomorphic encryption through light trusted computing assistance (2019)"},{"key":"1169_CR135","unstructured":"Sasson, E.B., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., Virza, M.:in 2014 IEEE symposium on security and privacy (IEEE, 2014)"},{"key":"1169_CR136","unstructured":"Yao, A.C.: in 23rd annual symposium on foundations of computer science (sfcs 1982) (IEEE, 1982)"},{"key":"1169_CR137","unstructured":"Kissner, L., Song, D.: in Annual International Cryptology Conference (Springer, 2005)"},{"key":"1169_CR138","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2022.100492.","volume":"45","author":"D Marijan","year":"2022","unstructured":"Marijan, D., Lal, C.: Computer Science Review 45, 100492 (2022). https:\/\/doi.org\/10.1016\/j.cosrev.2022.100492. (https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1574013722000314)","journal-title":"Computer Science Review"},{"issue":"5","key":"1169_CR139","doi-asserted-by":"publisher","first-page":"2020","DOI":"10.1109\/JBHI.2022.3140831","volume":"26","author":"X Li","year":"2022","unstructured":"Li, X., Liu, S., Lu, R., Khan, M.K., Gu, K., Zhang, X.: An Efficient Privacy-Preserving Public Auditing Protocol for Cloud-Based Medical Storage System. IEEE J. Biomed. Health Inform. 26(5), 2020 (2022). https:\/\/doi.org\/10.1109\/JBHI.2022.3140831","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"1169_CR140","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3013153","volume":"8","author":"Y Miao","year":"2020","unstructured":"Miao, Y., Huang, Q., Xiao, M., Li, H.: Decentralized and Privacy-Preserving Public Auditing for Cloud Storage Based on Blockchain. IEEE Access 8, 139813 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3013153","journal-title":"IEEE Access"},{"key":"1169_CR141","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2024.103927.","volume":"92","author":"F Tang","year":"2025","unstructured":"Tang, F., Li, Y., Zhang, Y., Susilo, W., Li, B.: Real-time privacy-preserved auditing for shared outsourced data. Computer Standards & Interfaces 92, 103927 (2025). https:\/\/doi.org\/10.1016\/j.csi.2024.103927. (https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0920548924000965)","journal-title":"Computer Standards & Interfaces"},{"key":"1169_CR142","unstructured":"Saleheen, N., Ullah, M.A., Chakraborty, S., Ones, D.S., Srivastava, M., Kumar, S.: ACM Conference on Computer and Communications Security (2021)"},{"key":"1169_CR143","doi-asserted-by":"crossref","unstructured":"K.\u00a0Packh\u00e4user, S.\u00a0G\u00fcndel, N.\u00a0M\u00fcnster, C.\u00a0Syben, V.\u00a0Christlein, A.\u00a0Maier,Deep learning-based patient re-identification is able to exploit the biometric nature of medical chest X-ray data, Scientific Reports 12(1) (2022)","DOI":"10.1038\/s41598-022-19045-3"},{"key":"1169_CR144","unstructured":"Ghazarian, A., Zheng, J., El-Askary, H., Chu, H., Fu, G., Rakovski, C.:Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS (2021)"},{"key":"1169_CR145","doi-asserted-by":"crossref","unstructured":"Sweeney, L.:A model for protecting privacy, Ieee S&P \u201902 10(5) (2002)","DOI":"10.1142\/S0218488502001648"},{"key":"1169_CR146","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: in 22nd International Conference on Data Engineering (ICDE\u201906) (IEEE, 2006)"},{"key":"1169_CR147","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: in 2007 IEEE 23rd international conference on data engineering (IEEE, 2006), pp. 106\u2013115","DOI":"10.1109\/ICDE.2007.367856"},{"issue":"1","key":"1169_CR148","doi-asserted-by":"publisher","first-page":"29669","DOI":"10.1038\/s41598-024-81170-y","volume":"14","author":"A Sarkar","year":"2024","unstructured":"Sarkar, A., Rahman, Y.S., Chuang, N., Mohammed, X. Jiang.: De-identification is not enough: a comparison between de-identified and synthetic clinical notes. Scientific Reports 14(1), 29669 (2024). https:\/\/doi.org\/10.1038\/s41598-024-81170-y","journal-title":"Scientific Reports"},{"key":"1169_CR149","doi-asserted-by":"publisher","unstructured":"Wang, Z., Li, Q., Wang, Y., Liu, B., Zhang, J., Liu, Q.: in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (Association for Computing Machinery, New York, NY, USA, 2019), CCS \u201919, p. 2549\u20132551. https:\/\/doi.org\/10.1145\/3319535.3363253","DOI":"10.1145\/3319535.3363253"},{"key":"1169_CR150","unstructured":"Mirsky, Y., Mahler, I.\u00a0Shelef, Y.\u00a0Elovici, in 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019 (USENIX Association, 2019)"},{"key":"1169_CR151","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2022.106211.","volume":"151","author":"DJ Delbarre","year":"2022","unstructured":"Delbarre, D.J., Santos, L., Ganjgahi, H., Horner, N., McCoy, A., Westerberg, H., H\u00e4ring, D.A., Nichols, T.E., Mallon, A.M.: Comput. Biol. Med. 151, 106211 (2022). https:\/\/doi.org\/10.1016\/j.compbiomed.2022.106211. (https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0010482522009192)","journal-title":"Comput. Biol. Med."},{"key":"1169_CR152","first-page":"2019","volume":"12","author":"W Wang","year":"2017","unstructured":"Wang, W., Shi, X., Qin, T.: Smart Health 12, 2019 (2017)","journal-title":"Smart Health"},{"key":"1169_CR153","unstructured":"Belkhouja, T., Mohamed, A., Al-Ali, A.K., Du, X., Guizani, M.: 2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings (2018)"},{"key":"1169_CR154","doi-asserted-by":"publisher","first-page":"800","DOI":"10.1016\/j.future.2018.01.031","volume":"92","author":"T Bai","year":"2019","unstructured":"Bai, T., Lin, J., Li, G., Wang, H., Ran, P., Li, Z., Li, D., Pang, Y., Wu, W., Jeon, G.: A lightweight method of data encryption in BANs using electrocardiogram signal. Future Generation Computer Systems 92, 800\u2013811 (2019)","journal-title":"Future Generation Computer Systems"},{"key":"1169_CR155","unstructured":"Sudarsono, A., Yuliana, M., Darwito, H.A.: Proceeding - 2017 3rd International Conference on Science in Information Technology: Theory and Application of IT for Education, Industry and Society in Big Data Era, ICSITech 2017 2018-Janua (2017)"},{"issue":"5","key":"1169_CR156","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1007\/s00779-017-1056-7","volume":"21","author":"X Sun","year":"2017","unstructured":"Sun, X., Zhang, P., Sookhak, M., Yu, J., Xie, W.: Utilizing fully homomorphic encryption to implement secure medical computation in smart cities. Personal and Ubiquitous Computing 21(5), 831\u2013839 (2017)","journal-title":"Personal and Ubiquitous Computing"},{"key":"1169_CR157","doi-asserted-by":"crossref","unstructured":"Domadiya, N., Rao, U.P.: ElGamal Homomorphic Encryption-Based Privacy Preserving Association Rule Mining on Horizontally Partitioned Healthcare Data, Journal of The Institution of Engineers (India): Series B (2022)","DOI":"10.1007\/s40031-021-00696-1"},{"key":"1169_CR158","doi-asserted-by":"crossref","unstructured":"Strydis, C., Seepers, R.M., Peris-Lopez, P., Siskos, D., Sourdis, I.: A system architecture, processor, and communication protocol for secure implants Transactions on Architecture and Code Optimization 10(4) (2013)","DOI":"10.1145\/2541228.2555313"},{"key":"1169_CR159","doi-asserted-by":"crossref","unstructured":"Guillaudeux, O., Rousseau, M., Petot, J., Bennis, Z., Dein, C.A., Goronflot, T., Vince, N., Limou, S., Karakachoff, M., Wargny, M.: et\u00a0al.,Patient-centric synthetic data generation, no reason to risk re-identification in biomedical data analysis NPJ Digital Medicine 6(1) (2023)","DOI":"10.1038\/s41746-023-00771-5"},{"issue":"6","key":"1169_CR160","doi-asserted-by":"crossref","first-page":"1849","DOI":"10.1109\/TBCAS.2013.2245664","volume":"7","author":"M Zhang","year":"2013","unstructured":"Zhang, M., Raghunathan, A., Jha, N.K.: IEEE Transactions on Biomedical Circuits and Systems. IEEE Transactions on Biomedical Circuits and Systems 7(6), 1849\u20131862 (2013)","journal-title":"IEEE Transactions on Biomedical Circuits and Systems"},{"key":"1169_CR161","doi-asserted-by":"crossref","unstructured":"Yurdagul, M.A., Sencar, H.T.: BLEKeeper: Response Time Behavior Based Man-In-The-Middle Attack Detection, Proceedings - 2021 IEEE Symposium on Security and Privacy Workshops, SPW 2021 (2021)","DOI":"10.1109\/SPW53761.2021.00035"},{"key":"1169_CR162","doi-asserted-by":"crossref","unstructured":"Bathalapalli, V.K., Mohanty, S.P., Kougianos, E., Baniya, B.K., Rout, B.:PUFchain 2.0: Hardware-assisted robust blockchain for sustainable simultaneous device and data security in smart healthcare, SN Computer Science 3(5), 344 (2022)","DOI":"10.1007\/s42979-022-01238-2"},{"key":"1169_CR163","doi-asserted-by":"publisher","unstructured":"Satra, S., Sadhu, P.K., Yanambaka, V.P., Abdelgawad, A.:Octopus: A Novel Approach for Health Data Masking and Retrieving Using Physical Unclonable Functions and Machine Learning,Sensors 23(8) (2023). https:\/\/doi.org\/10.3390\/s23084082","DOI":"10.3390\/s23084082"},{"key":"1169_CR164","doi-asserted-by":"crossref","unstructured":"Burleson, W., Carrara, S.: Security and Privacy for Implantable Medical Devices 9781461416 (2013)","DOI":"10.1007\/978-1-4614-1674-6"},{"key":"1169_CR165","unstructured":"Yuliana, M., Darwito, H.A., Sudarsono, A., Yofie, G.: 2nd Int. Conf. on Science in Information Technology, ICSITech 2016: Information Science for Green Society and Environment (2017)"},{"key":"1169_CR166","doi-asserted-by":"crossref","unstructured":"Xue, L.,Yu, Y., Li, Y., Au, M.H., Du, X., Yang, B.: Efficient attribute-based encryption with attribute revocation for assured data deletion,Information Sciences 479 (2019)","DOI":"10.1016\/j.ins.2018.02.015"},{"key":"1169_CR167","unstructured":"Fox, I., Ang, L., Jaiswal, M., Pop-Busui, R., Wiens, J.: in ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (2018), KDD \u201918"},{"key":"1169_CR168","unstructured":"J.\u00a0Vora, P.\u00a0Italiya, S.\u00a0Tanwar, S.\u00a0Tyagi, N.\u00a0Kumar, M.S. Obaidat, K.F. Hsiao, CITS 2018 - 2018 International Conference on Computer, Information and Telecommunication Systems (2018)"},{"key":"1169_CR169","unstructured":"R.\u00a0Gajanayake, R.\u00a0Iannella, T.\u00a0Sahama,Privacy oriented access control for electronic health records, Electronic Journal of Health Informatics 8(2) (2014)"},{"key":"1169_CR170","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/3-540-45861-1_22","volume-title":"Information Security and Cryptology \u2013 ICISC 2001","author":"R Steinfeld","year":"2002","unstructured":"Steinfeld, R., Bull, L.: Y. Zheng. In: Kim, K. (ed.) Information Security and Cryptology \u2013 ICISC 2001, pp. 285\u2013304. Springer, Berlin Heidelberg, Berlin, Heidelberg (2002)"},{"key":"1169_CR171","doi-asserted-by":"publisher","unstructured":"M.\u00a0Backes, M.\u00a0Barbosa, D.\u00a0Fiore, R.M. Reischuk, in 2015 IEEE Symposium on Security and Privacy (2015), pp. 271\u2013286. https:\/\/doi.org\/10.1109\/SP.2015.24","DOI":"10.1109\/SP.2015.24"},{"key":"1169_CR172","doi-asserted-by":"crossref","unstructured":"Y.\u00a0Chen, S.\u00a0Ding, Z.\u00a0Xu, H.\u00a0Zheng, S.\u00a0Yang,Blockchain-Based Medical Records Secure Storage and Medical Service Framework, Journal of Medical Systems 43(1) (2018)","DOI":"10.1007\/s10916-018-1121-4"},{"key":"1169_CR173","doi-asserted-by":"publisher","unstructured":"Assiri, B.: A Modified and Effective Blockchain Model for E-Healthcare Systems. Appl. Sci. 13(23), 12630 (2023). https:\/\/doi.org\/10.3390\/app132312630. Publisher: MDPI AG","DOI":"10.3390\/app132312630"},{"key":"1169_CR174","doi-asserted-by":"crossref","unstructured":"W.H. Wolberg, O.L. Mangasarian,Multisurface method of pattern separation for medical diagnosis applied to breast cytology, Proceedings of the National Academy of Sciences 87(23) (1990)","DOI":"10.1073\/pnas.87.23.9193"},{"key":"1169_CR175","doi-asserted-by":"crossref","unstructured":"Detrano, R., Janosi, A., Steinbrunn, W., Pfisterer, M., Schmid, J.J., e.a. Sandhu, Sarbjit,: International application of a new probability algorithm for the diagnosis of coronary artery disease. The American journal of cardiology 64(5), 304\u2013310 (1989)","DOI":"10.1016\/0002-9149(89)90524-9"},{"issue":"3","key":"1169_CR176","first-page":"552","volume":"105","author":"N Dowlin","year":"2017","unstructured":"Dowlin, N., Gilad-Bachrach, R., Laine, K., Lauter, K., Naehrig, M., Wernsing, J.: Manual for Using Homomorphic Encryption for Bioinformatics. Proceedings of the IEEE 105(3), 552\u2013567 (2017)","journal-title":"Proceedings of the IEEE"},{"key":"1169_CR177","unstructured":"Sharma, P., Moparthi, N.R., Namasudra, S., Shanmuganathan, V., Hsu, C.H.: Expert Systems, Expert Systems (November) (2021)"},{"issue":"1","key":"1169_CR178","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1186\/s13023-020-01497-3","volume":"15","author":"J Gow","year":"2020","unstructured":"Gow, J., Moffatt, C., Blackport, J.: Participation in patient support forums may put rare disease patient data at risk of re-identification. Orphanet Journal of Rare Diseases 15(1), 226 (2020)","journal-title":"Orphanet Journal of Rare Diseases"},{"issue":"2","key":"1169_CR179","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSEC.2018.2888775","volume":"17","author":"M Al-Rubaie","year":"2019","unstructured":"Al-Rubaie, M., Chang, J.M.: Privacy-Preserving Machine Learning: Threats and Solutions. IEEE Security & Privacy 17(2), 49 (2019). https:\/\/doi.org\/10.1109\/MSEC.2018.2888775","journal-title":"IEEE Security & Privacy"},{"key":"1169_CR180","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3447017","volume":"12","author":"I Makhdoom","year":"2024","unstructured":"Makhdoom, I., Abolhasan, M., Lipman, J., Shariati, N., Franklin, D., Piccardi, M.: IEEE Access 12, 116740 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3447017","journal-title":"IEEE Access"},{"key":"1169_CR181","doi-asserted-by":"publisher","unstructured":"Calandrino, J.A., Kilzer, A., Narayanan, A., Felten, E.W., Shmatikov, V.: Proceedings - IEEE Symposium on Security and Privacy pp. 231\u2013246 (2011). https:\/\/doi.org\/10.1109\/SP.2011.40","DOI":"10.1109\/SP.2011.40"},{"key":"1169_CR182","unstructured":"Fredrikson, M., Lantz, E., Jha, S., Lin, S., Page, D., Ristenpart, T.: in Proceedings of the 23rd USENIX Conference on Security Symposium (USENIX Association, USA, 2014), SEC\u201914, p. 17\u201332"},{"issue":"April","key":"1169_CR183","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSEC.2018.2888775","volume":"17","author":"M Al-rubaie","year":"2019","unstructured":"Al-rubaie, M., Chang, J.M.: IEEE Security & Privacy 17(April), 49 (2019). https:\/\/doi.org\/10.1109\/MSEC.2018.2888775","journal-title":"IEEE Security & Privacy"},{"key":"1169_CR184","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/978-3-031-72764-1_17","volume-title":"Computer Vision - ECCV 2024","author":"Y Liu","year":"2025","unstructured":"Liu, Y., Zhang, W., Wu, D., Lin, Z., Gu, J.: W. Wang. In: Leonardis, A., Ricci, E., Roth, S., Russakovsky, O., Sattler, T., Varol, G. (eds.) Computer Vision - ECCV 2024, pp. 288\u2013306. Springer Nature Switzerland, Cham (2025)"},{"issue":"7","key":"1169_CR185","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00607-025-01507-x","volume":"107","author":"CC Nikolaidis","year":"2025","unstructured":"Nikolaidis, C.C., Efraimidis, P.S.: Computing 107(7), 1 (2025). https:\/\/doi.org\/10.1007\/s00607-025-01507-x","journal-title":"Computing"},{"key":"1169_CR186","doi-asserted-by":"publisher","unstructured":"Bai, L., Hu, Q., Ye, Li, H., Wang, L., Xu, J.: ACM Computing Surveys 57(4) (2024). https:\/\/doi.org\/10.1145\/3704633","DOI":"10.1145\/3704633"},{"issue":"6","key":"1169_CR187","doi-asserted-by":"publisher","first-page":"1696","DOI":"10.1093\/bioinformatics\/btz837","volume":"36","author":"N Almadhoun","year":"2020","unstructured":"Almadhoun, N., Ayday, E., Ulusoy, \u00d6.: Bioinformatics 36(6), 1696 (2020). https:\/\/doi.org\/10.1093\/bioinformatics\/btz837","journal-title":"Bioinformatics"},{"issue":"1","key":"1169_CR188","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-022-05539-7","volume":"12","author":"M Adnan","year":"2022","unstructured":"Adnan, M., Kalra, S., Cresswell, J.C., Taylor, G.W., Tizhoosh, H.R.: Sci. Rep. 12(1), 1 (2022). https:\/\/doi.org\/10.1038\/s41598-022-05539-7","journal-title":"Sci. Rep."},{"key":"1169_CR189","doi-asserted-by":"crossref","unstructured":"S.\u00a0Kalra, M.\u00a0Adnan, G.W. Taylor, H.R. Tizhoosh, in European Conference on Computer Vision (ECCV) (Springer, 2020), pp. 677\u2013693","DOI":"10.1007\/978-3-030-58526-6_40"},{"key":"1169_CR190","unstructured":"McMahan, H.B., Moore, E., Ramage, D., Hampson, S., y\u00a0Arcas, B.A.: in Proceedings of the 20th International Conference on Artificial Intelligence and Statistics (AISTATS), Proceedings of Machine Learning Research, vol.\u00a054 (PMLR, 2017), Proceedings of Machine Learning Research, vol.\u00a054, pp. 1273\u20131282"},{"key":"1169_CR191","doi-asserted-by":"publisher","unstructured":"Li, Z., Wang, B., Li, J., Hua, Y., Zhang, S.: PLoS ONE 17(8 August), 1 (2022). https:\/\/doi.org\/10.1371\/journal.pone.0272766","DOI":"10.1371\/journal.pone.0272766"},{"key":"1169_CR192","unstructured":"Tang, J., Korolova, A., Bai, X., Wang, X., Wang, X.: (2017). arxiv:1709.02753"},{"issue":"7","key":"1169_CR193","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/3433638","volume":"64","author":"J Domingo-Ferrer","year":"2021","unstructured":"Domingo-Ferrer, J., S\u00e1nchez, D., Blanco-Justicia, A.: Commun. ACM 64(7), 33 (2021). https:\/\/doi.org\/10.1145\/3433638","journal-title":"Commun. ACM"},{"key":"1169_CR194","unstructured":"Greenberg, A.: How one of apple\u2019s key privacy safeguards falls short (2017). https:\/\/www.wired.com\/story\/apple-differential-privacy-shortcomings\/. WIRED. Accessed: 2025-08-15"},{"key":"1169_CR195","unstructured":"Kohavi, R.: et\u00a0al., in Kdd, vol.\u00a096 (1996), vol.\u00a096"},{"key":"1169_CR196","unstructured":"Chen, M., Cang, L.S., Chang, Z., Iqbal, M., Almakhles, D.: Wireless Networks 6 (2023)"},{"key":"1169_CR197","doi-asserted-by":"crossref","unstructured":"Jiang, Y., Mosquera, L., Jiang, B., Kong, L., El Emam, K.: PLoS ONE 17(6 June) (2022)","DOI":"10.1371\/journal.pone.0269097"},{"key":"1169_CR198","doi-asserted-by":"crossref","unstructured":"Premnath, S.N., Jana, S., Croft, J., Gowda, P.L., Clark, M., Kasera, S.K., Patwari, N., Krishnamurthy, S.V.: IEEE Trans. on Mobile Computing 12(5) (2013)","DOI":"10.1109\/TMC.2012.63"},{"key":"1169_CR199","doi-asserted-by":"crossref","unstructured":"Puppala, M., He, T., Chen, S., Ogunti, R., Yu, X., Li, F., Jackson, R., Wong, S.T.C.: IEEE Transactions on Biomedical Engineering 62(12) (2015)","DOI":"10.1109\/TBME.2015.2450181"},{"key":"1169_CR200","unstructured":"Boneh, D., Crescenzo, G.D., Ostrovsky, R., Persiano, G.: in Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, Lecture Notes in Computer Science, vol. 3027, ed. by C.\u00a0Cachin, J.\u00a0Camenisch (Springer, 2004), Lecture Notes in Computer Science, vol. 3027"},{"key":"1169_CR201","doi-asserted-by":"crossref","unstructured":"Rajput, A.R., Li, Q., Taleby Ahvanooey, M., Masood, I.:IEEE Access 7 (2019)","DOI":"10.1109\/ACCESS.2019.2917976"},{"key":"1169_CR202","unstructured":"Zhang, M., Chen, Y., Susilo, W.: IEEE Transactions on Dependable and Secure Computing PP (2022)"},{"key":"1169_CR203","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/3-540-57332-1_10","volume-title":"Cryptology \u2013 ASIACRYPT \u201991","author":"Y Zheng","year":"1993","unstructured":"Zheng, Y., Hardjono, T., Pieprzyk, J.: in Advances. In: Imai, H., Rivest, R.L., Matsumoto, T. (eds.) Cryptology \u2013 ASIACRYPT \u201991, pp. 124\u2013138. Springer, Berlin Heidelberg (1993)"},{"key":"1169_CR204","doi-asserted-by":"crossref","unstructured":"Wang, Z., Ma, P., Chi, Zhang, J.: in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (2018), pp. 2309\u20132311","DOI":"10.1145\/3243734.3278513"},{"key":"1169_CR205","doi-asserted-by":"crossref","unstructured":"Donawa, A., Orukari, I., Baker, C.E.: Scaling Blockchains to Support Electronic Health Records for Hospital Systems (2020). arXiv:2001.05525 [cs]","DOI":"10.1109\/UEMCON47517.2019.8993101"},{"key":"1169_CR206","doi-asserted-by":"publisher","unstructured":"Ma, S., Zhang, X.: Scientific Reports 14(1) (2024). https:\/\/doi.org\/10.1038\/s41598-024-62292-9. Publisher: Springer Science and Business Media LLC","DOI":"10.1038\/s41598-024-62292-9"},{"key":"1169_CR207","doi-asserted-by":"publisher","unstructured":"Mazlan, A.A., Mohd\u00a0Daud, S., Mohd\u00a0Sam, S., Abas, H., Abdul\u00a0Rasid, S.Z., Yusof, M.F.: IEEE Access 8, 23663 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2969230. https:\/\/ieeexplore.ieee.org\/document\/8968381\/","DOI":"10.1109\/ACCESS.2020.2969230"},{"key":"1169_CR208","doi-asserted-by":"publisher","unstructured":"Kasyapa, M.S.B., Vanmathi, C.: Frontiers in Digital Health 6 (2024). https:\/\/doi.org\/10.3389\/fdgth.2024.1359858. Publisher: Frontiers Media SA","DOI":"10.3389\/fdgth.2024.1359858"},{"key":"1169_CR209","doi-asserted-by":"publisher","unstructured":"Radanovic, I., Likic, R.: Applied Health Economics and Health Policy 16(5), 583 (2018). https:\/\/doi.org\/10.1007\/s40258-018-0412-8. Publisher: Springer Science and Business Media LLC","DOI":"10.1007\/s40258-018-0412-8"},{"key":"1169_CR210","doi-asserted-by":"crossref","unstructured":"Wood, A., Najarian, K., Kahrobaei, D.: ACM Computing Surveys 53(4) (2020)","DOI":"10.1145\/3394658"},{"key":"1169_CR211","doi-asserted-by":"crossref","unstructured":"Reveilhac, M., Blanchard, A.: International Journal of Information Management Data Insights 2(1) (2022)","DOI":"10.1016\/j.jjimei.2022.100068"},{"key":"1169_CR212","doi-asserted-by":"crossref","unstructured":"Reddy, S., Allan, S., Coghlan, Cooper, S.\u00a0P.: Journal of the American Medical Informatics Association 27(3) (2020)","DOI":"10.1093\/jamia\/ocz192"},{"issue":"01","key":"1169_CR213","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1055\/s-0043-1768719","volume":"32","author":"AJ Holmgren","year":"2023","unstructured":"Holmgren, A.J., Esdar, M., H\u00fcsers, J., Coutinho-Almeida, J.: Health information exchange: understanding the policy landscape and future of data interoperability, Health information exchange: understanding the policy landscape and future of data interoperability. Yearb. Med. Inform. 32(01), 184 (2023)","journal-title":"Yearb. Med. Inform."},{"issue":"1","key":"1169_CR214","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1147\/JRD.2013.2288068","volume":"58","author":"M Ahmed","year":"2014","unstructured":"Ahmed, M., Ahamad, M., Jaiswal, T.: Augmenting security and accountability within the eHealth Exchange. IBM Journal of Research and Development 58(1), 81 (2014). https:\/\/doi.org\/10.1147\/JRD.2013.2288068","journal-title":"IBM Journal of Research and Development"},{"issue":"4","key":"1169_CR215","first-page":"36","volume":"1","author":"RJ Johnson","year":"2016","unstructured":"Johnson, R.J.: J Healthc Commun 1(4), 36 (2016)","journal-title":"J Healthc Commun"},{"key":"1169_CR216","unstructured":"McFarlane, C., Beer, M., Brown, J., Prendergast, N.: Entrust Inc.: Addison, TX, USA 3, 19 (2017)"},{"key":"1169_CR217","doi-asserted-by":"publisher","first-page":"61656","DOI":"10.1109\/ACCESS.2019.2916503","volume":"7","author":"H Jin","year":"2019","unstructured":"Jin, H., Luo, Y., Li, P., Mathew, J.: IEEE Access 7, 61656 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2916503","journal-title":"IEEE Access"},{"key":"1169_CR218","unstructured":"ISO, ISO\/IEC 27032:2012 Information technology \u2014 Security techniques \u2014 Guidelines for cybersecurity (2012). https:\/\/www.iso.org\/standard\/44375.html"},{"key":"1169_CR219","unstructured":"ISO, ISO\/TR 80002-2:2017 Medical device software \u2014 Part 2: Validation of software for medical device quality systems (2017). https:\/\/www.iso.org\/standard\/60044.html"},{"key":"1169_CR220","doi-asserted-by":"crossref","unstructured":"ISO, IEC 62304:2006 Medical device software \u2014 Software life cycle processes (2006). https:\/\/www.iso.org\/standard\/38421.html","DOI":"10.1049\/ic:20060141"},{"key":"1169_CR221","unstructured":"ISO, IEC 80001-1:2021 Application of risk management for IT-networks incorporating medical devices \u2014 Part 1: Safety, effectiveness and security in the implementation and use of connected medical devices or connected health software (2021). https:\/\/www.iso.org\/standard\/72026.html"},{"key":"1169_CR222","unstructured":"ISO, IEC 82304-1:2016 Health software \u2014 Part 1: General requirements for product safety (2016). https:\/\/www.iso.org\/standard\/59543.html"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01169-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01169-y","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01169-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T16:08:41Z","timestamp":1769875721000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01169-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,22]]},"references-count":222,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["1169"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01169-y","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,22]]},"assertion":[{"value":"21 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no financial or proprietary interests in any material discussed in this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"33"}}