{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,25]],"date-time":"2025-05-25T20:21:58Z","timestamp":1748204518266},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2007,3,23]],"date-time":"2007-03-23T00:00:00Z","timestamp":1174608000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2007,3,26]]},"DOI":"10.1007\/s10916-006-9035-y","type":"journal-article","created":{"date-parts":[[2007,3,22]],"date-time":"2007-03-22T14:50:50Z","timestamp":1174575050000},"page":"103-107","source":"Crossref","is-referenced-by-count":16,"title":["Security and Access of Health Research Data"],"prefix":"10.1007","volume":"31","author":[{"given":"Willy","family":"Susilo","sequence":"first","affiliation":[]},{"given":"Khin Than","family":"Win","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,3,23]]},"reference":[{"key":"9035_CR1","doi-asserted-by":"crossref","unstructured":"Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., and Shi, H., Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions, Proceedings of Crypto 2005 (to appear), 2005.","DOI":"10.1007\/11535218_13"},{"key":"9035_CR2","unstructured":"Australian Medical Council, Legal, ethical and organisational aspects of the practice of medicine. In: Anthology of Medical Conditions, Marshall, V. C. et\u00a0al. (ed.), Australian Medical Council Incorporated, 2003."},{"key":"9035_CR3","unstructured":"Baek, J., Safavi-Naini, R., and Susilo, W., Public Key Encryption with Keyword Search Revisited. http:\/\/eprint.iacr.org\/2005\/191, 2005."},{"key":"9035_CR4","doi-asserted-by":"crossref","unstructured":"Baek, J., Safavi-Naini, R., and Susilo, W., On the integration of public key data encryption and public key encryption with keyword search. The 9th Information Security Conference, ISC 2006, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 2006.","DOI":"10.1007\/11836810_16"},{"issue":"6","key":"9035_CR5","doi-asserted-by":"crossref","first-page":"435-443","DOI":"10.1136\/jamia.1999.0060435","volume":"6","author":"F. M. Behlen","year":"1999","unstructured":"Behlen, F. M., and Johnson, S. B., Multicenter patient records research: Security policies and tools. J. Am. Med. Inform. Assoc. 6(6):435-443, 1999.","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"9035_CR6","unstructured":"Boneh, D., Crescenzo, G. D., Ostrovsky, R., and Persiano, G., Searchable Public Key Encryption. http:\/\/eprint.iacr.org\/2003\/195, 2003."},{"key":"9035_CR7","doi-asserted-by":"crossref","unstructured":"Boneh, D., and Fraklin, M., Identity-based encryption from the Weil pairing. Proceedings of Crypto 2001, Springer-Verlag, pp. 213\u2013229, 2001.","DOI":"10.1007\/3-540-44647-8_13"},{"key":"9035_CR8","doi-asserted-by":"crossref","unstructured":"Carney, P.A., Geller, B. M., Moffett, H., Ganger, M., Sewell, M., Barlow, W. E., Stalnaker, N., Taplin, S. H., Sisk, C., Ernster, V., Wilkie, H. A., Yankaskas, B., Poplack, S.P., Urban, N., West, M. M., Rosenberg, R. D., Michael, S., Mercurio, T. D., and Ballard-Barbash, R., Current medicolegal and confidentiality issues in large, multicenter research programs. Am. J. Epidemiol. 152(4):371\u2013378, 2000.","DOI":"10.1093\/aje\/152.4.371"},{"issue":"6","key":"9035_CR9","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1197\/jamia.M1240","volume":"9","author":"S. Dreiseitl","year":"2002","unstructured":"Dreiseitl, S., Vinterbo, S., and Ohno-Machado, L., Disambiguation data: Extracting information from anonymized sources. J. Am. Med. Inform. Assoc. 9(6):110\u2013114, 2002.","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"9035_CR10","doi-asserted-by":"crossref","first-page":"8-9","DOI":"10.1016\/S1470-2045(00)00185-6","volume":"2","author":"J. Dudeck","year":"2001","unstructured":"Dudeck, J., Informed consent for cancer registration. Lancet Oncol. 2:8-9, 2001.","journal-title":"Lancet Oncol."},{"key":"9035_CR11","doi-asserted-by":"crossref","first-page":"858","DOI":"10.1136\/bmj.322.7290.858","volume":"322","author":"B. Evans","year":"2001","unstructured":"Evans, B., and Ramay, C. N., Integrity of communicable disease surveillance is important patient care. Brit. Med. J. 322:858, 2001.","journal-title":"Brit. Med. J."},{"key":"9035_CR12","doi-asserted-by":"crossref","first-page":"305-309","DOI":"10.1016\/j.ijmedinf.2003.12.011","volume":"73","author":"D. Gritzalis","year":"2004","unstructured":"Gritzalis, D., and Lambrinoudakis, C., A security architecture for interconnecting health information systems. Int. J. Med. Inform. 73:305-309, 2004.","journal-title":"Int. J. Med. Inform."},{"key":"9035_CR13","unstructured":"Health Records and Information Privacy Act 2002, New South Wales."},{"issue":"14)","key":"9035_CR14","doi-asserted-by":"crossref","first-page":"1452","DOI":"10.1056\/NEJMe048027","volume":"350","author":"J. R. Ingelfinger","year":"2004","unstructured":"Ingelfinger, J. R., and Drazen, J. M., Registry research and medical privacy. New Engl. J. Med. 350(14):1452, 2004.","journal-title":"New Engl. J. Med."},{"issue":"supp 1","key":"9035_CR15","first-page":"S1:2","volume":"8","author":"W. Lowrance","year":"2003","unstructured":"Lowrance, W., Learning from experience: privacy and the secondary use of data in health research. J. Health Serv. Res. Policy 8(supp 1):S1:2\u20137, 2003.","journal-title":"J. Health Serv. Res. Policy"},{"key":"9035_CR16","unstructured":"Muralidhar, K., and Sarathy, R., Can you have your cake and eat it too? Sharing healthcare data without compromising privacy and confidentiality. In: Proceedings of the 11th Americas Conference on Information Systems. Omaha, NE, 2005."},{"key":"9035_CR17","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1016\/j.ijmedinf.2004.05.002","volume":"73","author":"L. Ohno-Machado","year":"2004","unstructured":"Ohno-Machado, L., Silveira, P. S. P., and Vinterbo, S., Protecting patient privacy by quantifiable control of disclosures in disseminated databases. Int. J Med. Inform. 73:599\u2013606, 2004.","journal-title":"Int. J Med. Inform."},{"key":"9035_CR18","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1016\/S1386-5056(00)00118-0","volume":"60","author":"C. Quantin","year":"2000","unstructured":"Quantin, C., Allaert, F.-A., and Dusserre, L., Anonymous statistical methods versus cryptographic methods in epidemiology. Int. J. Med. Inform. 60:177\u2013183, 2000.","journal-title":"Int. J. Med. Inform."},{"key":"9035_CR19","first-page":"858(1 page)","volume":"322","author":"L. Roberts","year":"2001","unstructured":"Roberts, L., and Wilson, S., Argument for consent may invalidate research and stigmatize some patients. Brit. Med. J. 322:858(1 page), 2001.","journal-title":"Brit. Med. J."},{"key":"9035_CR20","unstructured":"Song, D. X., Wagner, D., and Perrig, A., Practical techniques for searches on encrypted data. IEEE Symposium on Security and Privacy, pp. 44\u201355, 2000."},{"key":"9035_CR21","doi-asserted-by":"crossref","first-page":"373-376","DOI":"10.1136\/bmj.326.7385.373","volume":"326","author":"D. J. Willison","year":"2003","unstructured":"Willison, D. J., Keshavjee, K., Nair, K., Goldsmith, C., and Holbrook, A. M., Patients\u2019 consent preferences for research uses of information in electronic medical records: Interview and survey data. BMJ 326:373-376, 2003.","journal-title":"BMJ"},{"issue":"1","key":"9035_CR22","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1177\/183335830503400105","volume":"34","author":"K. T. Win","year":"2005","unstructured":"Win, K. T., Information security of electronic health record systems. Health Inform. Manage. J. 34(1), 13\u201318, 2005.","journal-title":"Health Inform. Manage. J."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-006-9035-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-006-9035-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-006-9035-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T04:46:00Z","timestamp":1559450760000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-006-9035-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,3,23]]},"references-count":22,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2007,3,26]]}},"alternative-id":["9035"],"URL":"https:\/\/doi.org\/10.1007\/s10916-006-9035-y","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,3,23]]}}}