{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T22:08:01Z","timestamp":1769810881207,"version":"3.49.0"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2009,6,2]],"date-time":"2009-06-02T00:00:00Z","timestamp":1243900800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1007\/s10916-009-9313-6","type":"journal-article","created":{"date-parts":[[2009,6,1]],"date-time":"2009-06-01T11:36:24Z","timestamp":1243856184000},"page":"975-983","source":"Crossref","is-referenced-by-count":37,"title":["Biometrics for Electronic Health Records"],"prefix":"10.1007","volume":"34","author":[{"given":"Alejandro Enrique","family":"Flores Zuniga","sequence":"first","affiliation":[]},{"given":"Khin Than","family":"Win","sequence":"additional","affiliation":[]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,6,2]]},"reference":[{"key":"9313_CR1","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1016\/j.ijmedinf.2006.09.015","volume":"76","author":"R. Agrawala","year":"2007","unstructured":"Agrawala, R., and Johnson, C., Securing electronic health records without impeding the flow of information. Int. J. Med. Inform. 76:471\u2013479, 2007. doi: 10.1016\/j.ijmedinf.2006.09.015 .","journal-title":"Int. J. Med. Inform."},{"key":"9313_CR2","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1016\/j.ijmedinf.2006.09.022","volume":"76","author":"J. G. Anderson","year":"2007","unstructured":"Anderson, J. G., Social, ethical and legal barriers to E-health. Int. J. Med. Inform. 76:480\u2013483, 2007. doi: 10.1016\/j.ijmedinf.2006.09.016 .","journal-title":"Int. J. Med. Inform."},{"issue":"9","key":"9313_CR3","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1016\/S0969-4765(00)09010-X","volume":"8","author":"W. Atkins","year":"2000","unstructured":"Atkins, W., A bill of health for biometrics. Biometric Technol. Today. 8 (9)8\u201311, 2000. doi: 10.1016\/S0969-4765(00)09010-X .","journal-title":"Biometric Technol. Today"},{"key":"9313_CR4","doi-asserted-by":"crossref","unstructured":"Au, M., Huang, Q., Liu, J., Susilo, W., Wong, D., and Yang, G., Traceable and retrievable identity-based encryption. Applied Cryptography and Network Security, 2008, pp. 94\u2013110.","DOI":"10.1007\/978-3-540-68914-0_6"},{"key":"9313_CR5","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1016\/j.ijmedinf.2003.11.008","volume":"73","author":"A. Bakker","year":"2004","unstructured":"Bakker, A., Access to EHR and access control at a moment in the past: a discussion of the need and an exploration of the consequences. Int. J. Med. Inform. 73:267\u2013270, 2004. doi: 10.1016\/j.ijmedinf.2003.11.008 .","journal-title":"Int. J. Med. Inform."},{"issue":"3","key":"9313_CR6","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1016\/S1386-5056(00)00104-0","volume":"60","author":"B. Blobel","year":"2000","unstructured":"Blobel, B., Application of the component paradigm for analysis and design of advanced health system architectures. Int. J. Med. Inform. 60 (3)281\u2013301, 2000. doi: 10.1016\/S1386-5056(00)00104-0 .","journal-title":"Int. J. Med. Inform."},{"issue":"3","key":"9313_CR7","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1016\/j.ijmedinf.2003.11.018","volume":"73","author":"B. Blobel","year":"2004","unstructured":"Blobel, B., Authorisation and access control for electronic health record systems. Int. J. Med. Inform. 73 (3)251\u2013257, 2004. doi: 10.1016\/j.ijmedinf.2003.11.018 .","journal-title":"Int. J. Med. Inform."},{"issue":"5\u20136","key":"9313_CR8","first-page":"442","volume":"76","author":"B. Blobel","year":"2007","unstructured":"Blobel, B., Comparing approaches for advanced e-health security infrastructures. Int. J. Med. Inform. 76 (5\u20136)442\u2013448, 2007. doi: 10.1016\/j.ijmedinf.2006.09.012 .","journal-title":"Int. J. Med. Inform."},{"issue":"8","key":"9313_CR9","doi-asserted-by":"crossref","first-page":"597","DOI":"10.1016\/j.ijmedinf.2005.08.010","volume":"75","author":"B. Blobel","year":"2006","unstructured":"Blobel, B., Nordberg, R., Davis, J. M., and Pharow, P., Modelling privilege management and access control. Int. J. Med. Inform. 75 (8)597\u2013623, 2006. doi: 10.1016\/j.ijmedinf.2005.08.010 .","journal-title":"Int. J. Med. Inform."},{"issue":"1","key":"9313_CR10","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/S1386-5056(01)00147-2","volume":"62","author":"B. Blobel","year":"2001","unstructured":"Blobel, B., and Roger-France, F., A systematic approach for analysis and design of secure health information systems. Int. J. Med. Inform. 62 (1)51\u201378, 2001. doi: 10.1016\/S1386-5056(01)00147-2 .","journal-title":"Int. J. Med. Inform."},{"key":"9313_CR11","unstructured":"CEN-ENV. Health informatics\u2014Security for healthcare communication\u2014Part 1: Concepts and terminology. Published Standard CEN ENV 13608-1:2000: European Committee for Standardization; 2000."},{"key":"9313_CR12","unstructured":"CEN-ENV. Health informatics\u2014Security for healthcare communication\u2014Part 2: Secure data objects. Published Standard CEN ENV 13608-2:2000: European Committee for Standardization; 2000."},{"key":"9313_CR13","unstructured":"CEN-ENV. Health informatics\u2014Security for healthcare communication\u2014Part 3: Secure data channels. Published Standard CEN ENV 13608-3:2000: European Committee for Standardization; 2000."},{"issue":"3","key":"9313_CR14","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1016\/j.cmpb.2007.11.014","volume":"89","author":"Y.-C. Chen","year":"2008","unstructured":"Chen, Y.-C., Chen, L.-K., Tsai, M.-D., Chiu, H.-C., Chiu, J.-S., and Chong, C.-F., Fingerprint verification on medical image reporting system. Comput. Methods Programs Biomed. 89 (3)282\u2013288, 2008. doi: 10.1016\/j.cmpb.2007.11.007 .","journal-title":"Comput. Methods Programs Biomed."},{"issue":"4","key":"9313_CR15","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1016\/j.ijmedinf.2007.06.001","volume":"77","author":"J. Choe","year":"2008","unstructured":"Choe, J., and Yoo, S. K., Web-based secure access from multiple patient repositories. Int. J. Med. Inform. 77 (4)242\u2013248, 2008. doi: 10.1016\/j.ijmedinf.2007.06.001 .","journal-title":"Int. J. Med. Inform."},{"issue":"1","key":"9313_CR16","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/s10916-006-7405-0","volume":"30","author":"Y. B. Choi","year":"2006","unstructured":"Choi, Y. B., Capitan, K. E., Krause, J. S., and Streeper, M. M., Challenges associated with privacy in health care industry: implementation of HIPAA and the security rules. J. Med. Syst. 30 (1)57\u201364, 2006. doi: 10.1007\/s10916-006-7405-0 .","journal-title":"J. Med. Syst."},{"key":"9313_CR17","volume-title":"Health informatics: transforming healthcare with technology","author":"M. Conrick","year":"2006","unstructured":"Conrick, M., and Newell, C., Issues of ethics and law. In: Conrick, M. (Ed.), Health informatics: transforming healthcare with technologyThomson Social Science Press, Melbourne, 2006."},{"key":"9313_CR18","unstructured":"Delac, K., and Grgic, M., A survey of biometric recognition methods. 46th International SymPoSium Electronic in Marine. ELMAR 2004, Zadar, 2004."},{"key":"9313_CR19","doi-asserted-by":"crossref","unstructured":"Garson, K., and Adams, C., Security and privacy system architecture for an e-hospital environment. Proceedings of the 7th Symposium on Identity and Trust on the Internet. ACM, Gaithersburg, Maryland, 2008.","DOI":"10.1145\/1373290.1373306"},{"issue":"17","key":"9313_CR20","first-page":"28","volume":"8","author":"M. A. Gates","year":"2007","unstructured":"Gates, M. A., Biometrics\u2014passing on using passwords. Radiol. Today. 8 (17)28\u201331, 2007.","journal-title":"Radiol. Today"},{"key":"9313_CR21","volume-title":"Health informatics: transforming healthcare with technology","author":"H. Grain","year":"2006","unstructured":"Grain, H., Consumer issues in Informatics. In: Conrick, M. (Ed.), Health informatics: transforming healthcare with technologyThomson Social Science Press, Melbourne, 2006."},{"issue":"3","key":"9313_CR22","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1016\/j.ijmedinf.2003.12.011","volume":"73","author":"D. Gritzalis","year":"2004","unstructured":"Gritzalis, D., and Lambrinoudakis, C., A security architecture for interconnecting health information systems. Int. J. Med. Inform. 73 (3)305\u2013309, 2004. doi: 10.1016\/j.ijmedinf.2003.12.011 .","journal-title":"Int. J. Med. Inform."},{"key":"9313_CR23","doi-asserted-by":"crossref","unstructured":"Heckle, R. R., and Lutters, W. G., Privacy implications for single sign-on authentication in a hospital environment. Proceedings of the 3rd Symposium on Usable Privacy and Security. ACM, Pittsburgh, Pennsylvania, 2007.","DOI":"10.1145\/1280680.1280714"},{"issue":"6","key":"9313_CR24","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1049\/el:20057524","volume":"41","author":"S. Hoque","year":"2005","unstructured":"Hoque, S., Fairhurst, M. C., Deravi, F., and Howells, W. G. J., On the feasibility of generating biometric encryption keys. IEEE Electron. Lett. 41 (6)309\u2013311, 2005. doi: 10.1049\/el:20057524 .","journal-title":"IEEE Electron. Lett."},{"key":"9313_CR25","unstructured":"IBG, Biometric Basics: What are the Benefits of Biometric Technology? In International Biometric Group Reports and Research International Biometric Group < http:\/\/www.biometricgroup.com\/reports\/public\/reports_and_research.html >. Accessed, 2008"},{"issue":"1","key":"9313_CR26","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/s12204-009-0086-3","volume":"14","author":"S.-L. Liu","year":"2009","unstructured":"Liu, S.-L., Guo, B.-A., and Zhang, Q.-A., An identity-based encryption scheme with compact ciphertexts. J. Shanghai Jiaotong Univ. Sci. 14 (1)86\u201389, 2009. doi: 10.1007\/s12204-009-0086-3 .","journal-title":"J. Shanghai Jiaotong Univ. Sci."},{"key":"9313_CR27","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1016\/j.ijmedinf.2005.11.003","volume":"76","author":"S. D. Lusignan","year":"2007","unstructured":"Lusignan, S. D., Chan, T., Theadom, A., and Dhoul, N., The roles of policy and professionalism in the protection of processed clinical data: a literature review. Int. J. Med. Inform. 76:261\u2013268, 2007. doi: 10.1016\/j.ijmedinf.2005.11.003 .","journal-title":"Int. J. Med. Inform."},{"issue":"9","key":"9313_CR28","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/S0969-4765(06)70592-6","volume":"14","author":"D. Marohn","year":"2006","unstructured":"Marohn, D., Biometrics in healthcare. Biometric Technol. Today. 14 (9)9\u201311, 2006. doi: 10.1016\/S0969-4765(06)70592-6 .","journal-title":"Biometric Technol. Today"},{"issue":"7\u20138","key":"9313_CR29","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1016\/j.ijmedinf.2004.05.002","volume":"73","author":"L. Ohno-Machadoa","year":"2004","unstructured":"Ohno-Machadoa, L., Silveira, P. S. P., and Vinterbo, S., Protecting patient privacy by quantifiable control of disclosures in disseminated databases. Int. J. Med. Inform. 73 (7\u20138)599\u2013606, 2004. doi: 10.1016\/j.ijmedinf.2004.05.002 .","journal-title":"Int. J. Med. Inform."},{"issue":"5","key":"9313_CR30","first-page":"38","volume":"24","author":"F. S. Pierce","year":"2003","unstructured":"Pierce, F. S., Biometric identification. Health Manag. Technol. 24 (5)38, 2003.","journal-title":"Health Manag. Technol."},{"issue":"9","key":"9313_CR31","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1145\/1378727.1389971","volume":"51","author":"A. P. Pons","year":"2008","unstructured":"Pons, A. P., and Polak, P., Understanding user perspectives on biometric technology. Commun. ACM. 51 (9)115\u2013118, 2008. doi: 10.1145\/1378727.1389971 .","journal-title":"Commun. ACM"},{"key":"9313_CR32","unstructured":"Rash, M. C., Privacy concerns hinder electronic medical records. The Business Journal of the Greater Triad Area 2005 April 4."},{"key":"9313_CR33","unstructured":"Reynolds, P., The keys to identity: as healthcare organizations strive for greater security, some are using a very personal approach in the form of biometrics.(Security\/Authentication) (Cover Story). Health Manag. Technol. 25(12):12(14), 2004."},{"issue":"1","key":"9313_CR34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1197\/jamia.M2273","volume":"14","author":"C. Safran","year":"2007","unstructured":"Safran, C., Bloomrosen, M., Hammond, W. E., Labkoff, S., Markel-Fox, S., Tang, P. C., and Detmer, D. E., Toward a national framework for the secondary use of health data: an American medical informatics association white paper. J. Am. Med. Inform. Assoc. 14 (1)1\u20139, 2007. doi: 10.1197\/jamia.M2273 .","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"9313_CR35","doi-asserted-by":"crossref","unstructured":"Sahai, A., and Waters, B., Fuzzy identity-based encryption. Advances in Cryptolog EUROCRYPT 2005, 2005, pp. 457\u2013473.","DOI":"10.1007\/11426639_27"},{"key":"9313_CR36","volume-title":"Security engineering: a guide to building dependable distributed systems","author":"B. Schneier","year":"2001","unstructured":"Schneier, B., Security engineering: a guide to building dependable distributed systems. Wiley, New York, 2001."},{"key":"9313_CR37","doi-asserted-by":"crossref","unstructured":"Shamir, A., Identity-based cryptosystems and signature schemes. Advances in Cryptology, 1985, pp. 47\u201353.","DOI":"10.1007\/3-540-39568-7_5"},{"key":"9313_CR38","unstructured":"Shin, Y. N., Lee, Y. J., Shin, W., and Choi, J., 110 P.s.-. and 10.1109\/WAINA.2008.289 D.O.I. Designing Fingerprint-Recognition-Based Access Control for Electronic Medical Records Systems. INAW 2008\u20142nd International Conference on Advanced Information Networking and Applications\u2014Workshops, Okinawa, Japan, 2008."},{"key":"9313_CR39","volume-title":"Information security: principles and practice","author":"M. Stamp","year":"2006","unstructured":"Stamp, M., Information security: principles and practice. Wiley, Hoboken, 2006."},{"issue":"3","key":"9313_CR40","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1016\/j.ijmedinf.2008.06.013","volume":"78","author":"H. Linden van der","year":"2009","unstructured":"van der Linden, H., Kalra, D., Hasman, A., and Talmon, J., Inter-organizational future proof EHR systems: a review of the security and privacy related issues. Int. J. Med. Inform. 78 (3)141\u2013160, 2009. doi: 10.1016\/j.ijmedinf.2008.06.013 .","journal-title":"Int. J. Med. Inform."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-009-9313-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-009-9313-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-009-9313-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T08:51:33Z","timestamp":1559465493000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-009-9313-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6,2]]},"references-count":40,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2010,10]]}},"alternative-id":["9313"],"URL":"https:\/\/doi.org\/10.1007\/s10916-009-9313-6","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,6,2]]}}}