{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T15:23:16Z","timestamp":1770218596449,"version":"3.49.0"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2011,8,26]],"date-time":"2011-08-26T00:00:00Z","timestamp":1314316800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1007\/s10916-011-9770-6","type":"journal-article","created":{"date-parts":[[2011,8,25]],"date-time":"2011-08-25T15:13:33Z","timestamp":1314285213000},"page":"2921-2926","source":"Crossref","is-referenced-by-count":24,"title":["Threat Modeling for Electronic Health Record Systems"],"prefix":"10.1007","volume":"36","author":[{"given":"Ahmad","family":"Almulhem","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,8,26]]},"reference":[{"key":"9770_CR1","unstructured":"Hamilton, B., Electronic health records, 2nd edn. McGraw-Hill, 2010."},{"key":"9770_CR2","unstructured":"HIMSS Analytics. The emr adoption model. http:\/\/www.himssanalytics.org\/ , 2011."},{"issue":"5","key":"9770_CR3","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1016\/j.ijmedinf.2007.09.001","volume":"77","author":"K Hyrinen","year":"2008","unstructured":"Hyrinen, K., Saranto, K., and Nyknen, P., Definition, structure, content, use and impacts of electronic health records: a review of the research literature. Int. J. Med. Inform. 77(5):291\u2013304, 2008.","journal-title":"Int. J. Med. Inform."},{"key":"9770_CR4","doi-asserted-by":"crossref","unstructured":"Anderson, R., A security policy model for clinical information systems. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy. pp. 30\u201343, 1996.","DOI":"10.1109\/SECPRI.1996.502667"},{"key":"9770_CR5","unstructured":"Anderson, R., Clinical system security: interim guidelines. Br. Med. J. 312(7023):109\u2013111, 1996."},{"issue":"2","key":"9770_CR6","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1136\/jamia.1996.96236282","volume":"3","author":"RC Barrows","year":"1996","unstructured":"Barrows, R. C., and Clayton, P. D., Privacy, Confidentiality, and Electronic medical records. J. Am. Med. Inform. Assoc. 3(2):139\u2013148, 1996.","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"9770_CR7","doi-asserted-by":"crossref","unstructured":"Amoroso, E., Fundamentals of Computer Security Technology. Prentice Hall, 1994.","DOI":"10.1016\/0142-0496(94)90187-2"},{"key":"9770_CR8","unstructured":"Schneier, B., Attack trees\u2014modeling security threats. Dr. Dobb\u2019s J. 24(12):21\u201329, 1999."},{"key":"9770_CR9","doi-asserted-by":"crossref","unstructured":"Moore, A. P., Ellison, R. J., and Linger, R. C., Attack modeling for information security and survivability. Software Engineering Institute, CarnegieMellon University, Technical Note: CMU\/SEI-2001-TN-001, 2001.","DOI":"10.21236\/ADA387544"},{"key":"9770_CR10","unstructured":"Beale, T., The health record why is it so hard? IMIA Yearb. Med. Inform. 2005:301\u2013304, 2005."},{"key":"9770_CR11","unstructured":"Health informatics electronic health record definition, scope and context, 2005."},{"key":"9770_CR12","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1145\/1118890.1118891","volume":"37","author":"M Eichelberg","year":"2005","unstructured":"Eichelberg, M., Aden, T., Riesmeier, J., Dogac, A., and Laleci, G. B., A survey and analysis of electronic healthcare record standards. ACM Comput. Surv. 37:277\u2013315, 2005.","journal-title":"ACM Comput. Surv."},{"issue":"1","key":"9770_CR13","first-page":"19","volume":"47","author":"T Sonoda","year":"2011","unstructured":"Sonoda, T., Evolution of electronic medical record solutions. Fujitsu Sci. Tech. J., 47(1):19\u201327, 2011.","journal-title":"Fujitsu Sci. Tech. J."},{"key":"9770_CR14","unstructured":"MITRE Corporation. Electronic health records overview. Technical report, National Institutes of Health National Center for Research Resources, 2006."},{"key":"9770_CR15","doi-asserted-by":"crossref","unstructured":"Huang, H. K., PACS and imaging informatics: Basic principles and applications, 2nd ed. Wiley, 2010.","DOI":"10.1002\/9780470560525"},{"key":"9770_CR16","unstructured":"Morrison, C., Iosif, A., and Danka, M., Report on existing open-source electronic medical records. Technical Report UCAM-CL-TR-768, University of Cambridge, 2010."},{"key":"9770_CR17","unstructured":"Liu, W., Ren, P., Zhang, Y., and xin Duan, H., Ssl-dp: a rootkit of network based ssl and tls traffic decryptor. In: Cybercrime and Trustworthy Computing Workshop (CTC), 2010, 2nd edn. pp.\u00a029\u201333, 2010."},{"key":"9770_CR18","first-page":"60","volume":"112","author":"K Seifried","year":"2010","unstructured":"Seifried, K., Attacks against ssl. Linux Magazine, 112:60\u201361, 2010.","journal-title":"Linux Magazine"},{"key":"9770_CR19","doi-asserted-by":"crossref","unstructured":"Dierks, T., and Rescorla, E., The transport layer security (tls) protocol version 1.2. RFC 5246, Internet Engineering Task Force, 2008.","DOI":"10.17487\/rfc5246"}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-011-9770-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-011-9770-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-011-9770-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,9]],"date-time":"2025-03-09T08:25:43Z","timestamp":1741508743000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-011-9770-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8,26]]},"references-count":19,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2012,10]]}},"alternative-id":["9770"],"URL":"https:\/\/doi.org\/10.1007\/s10916-011-9770-6","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,8,26]]}}}