{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T03:36:40Z","timestamp":1771472200680,"version":"3.50.1"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2011,9,1]],"date-time":"2011-09-01T00:00:00Z","timestamp":1314835200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1007\/s10916-011-9776-0","type":"journal-article","created":{"date-parts":[[2011,8,31]],"date-time":"2011-08-31T15:27:05Z","timestamp":1314804425000},"page":"2981-2992","source":"Crossref","is-referenced-by-count":4,"title":["RBAC-Matrix-Based EMR Right Management System to Improve HIPAA Compliance"],"prefix":"10.1007","volume":"36","author":[{"given":"Hung-Chang","family":"Lee","sequence":"first","affiliation":[]},{"given":"Shih-Hsin","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,9,1]]},"reference":[{"key":"9776_CR1","unstructured":"Apple Daily, Selina\u2019s bedside birthday, Chang Gung medical records of any translation, http:\/\/tw.nextmedia.com\/applenews\/article\/art_id\/32926156\/IssueID\/20101031 , accessed 2010\/11\/02."},{"issue":"4","key":"9776_CR2","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1007\/s10916-006-9019-y","volume":"30","author":"KT Win","year":"2006","unstructured":"Win, K. T., Susilo, W., and Mu, Y., Personal health record systems and their security protection. J. Med. Syst. 30(4):309\u2013315, 2006.","journal-title":"J. Med. Syst."},{"key":"9776_CR3","unstructured":"Ferraiolo, D. F., and Kuhn, R. Role-Based Access Control, Proceedings of the 15th National Computer Security Conference, 1992."},{"key":"9776_CR4","unstructured":"National Institutes of Health, Health Services Research and the HIPAA Privacy Rule, http:\/\/privacyruleandresearch.nih.gov , accessed Aug. 2010."},{"key":"9776_CR5","unstructured":"Office of the Privacy Commissioner of Canada, The Personal Information Protection and Electronic Documents Act (PIPEDA), http:\/\/www.priv,gc.ca , accessed Aug. 2010."},{"key":"9776_CR6","doi-asserted-by":"crossref","unstructured":"Condric, L., Dech, D., and Galic, D. The importance of project office in matrix organization. 8th International Conference on Telecommunications - ConTEL 2005, Zagreb, 2005.","DOI":"10.1109\/CONTEL.2005.185983"},{"key":"9776_CR7","unstructured":"ContentGuard, XrML: eXtensible rights Markup Language. http:\/\/www.xrml.org\/index.asp , accessed Dec. 2010."},{"key":"9776_CR8","unstructured":"Yang, J. -T., The research of XrML-based multimedia digital rights management system. Master\u2019s thesis, National Chung Cheng University, 2005."},{"key":"9776_CR9","unstructured":"Fan, J. -S., The XrML-based enterprise digital rights management system for access control. Master\u2019s thesis, Tatung University, 2010."},{"issue":"2","key":"9776_CR10","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R Sandhu","year":"1996","unstructured":"Sandhu, R., et al., Role-based access control models. IEEE Comput. 29(2):38\u201347, 1996.","journal-title":"IEEE Comput."},{"key":"9776_CR11","doi-asserted-by":"crossref","unstructured":"Ferraiolo, D. F., et al., Proposed NIST standard for role-based access control. ACM Trans. On Information and System Security. 4(3), 2001.","DOI":"10.1145\/501978.501980"},{"key":"9776_CR12","unstructured":"National Institute of Standards and Technology (NIST), security requirements for cryptographic modules, FIPS PUB 140\u20132, 2001."},{"key":"9776_CR13","doi-asserted-by":"crossref","unstructured":"Sauders, G., Hitchens, M., and Varadharajan, V., Role-based access control and the access control matrix. ACM Operating Systems Review, Oct. 2001.","DOI":"10.1145\/506084.506085"},{"key":"9776_CR14","unstructured":"Lee, W. -B., Lee, C. -D., A cryptographic key management solution for HIPAA privacy\/security regulations. Master\u2019s thesis, Feng Chia University, 2008."},{"key":"9776_CR15","unstructured":"Office of the NSW Privacy Commissioner, \u201cHealth Records and Information Privacy Act 2002,\u201d http:\/\/www.ipc.nsw.gov.au , accessed Sep. 2010."},{"key":"9776_CR16","doi-asserted-by":"crossref","unstructured":"Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., and Chung, Y. F., A secure authentication scheme for telecare medicine information systems. J. Med. Syst., 2010. doi: 10.1007\/s10916-010-9614-9 .","DOI":"10.1007\/s10916-010-9614-9"},{"key":"9776_CR17","unstructured":"National Institute of Standards and Technology (NIST), Advanced Encryption Standard (AES), FIPS PUB 197, 2001."},{"issue":"2","key":"9776_CR18","first-page":"133","volume":"7","author":"J-L Chen","year":"2009","unstructured":"Chen, J.-L., A enterprise digital rights management system based on group-oriented authorization. Electron. Commer. Res. 7(2):133\u2013150, 2009.","journal-title":"Electron. Commer. Res."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-011-9776-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-011-9776-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-011-9776-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,22]],"date-time":"2020-06-22T22:18:21Z","timestamp":1592864301000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-011-9776-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9,1]]},"references-count":18,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2012,10]]}},"alternative-id":["9776"],"URL":"https:\/\/doi.org\/10.1007\/s10916-011-9776-0","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,9,1]]}}}