{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:40:55Z","timestamp":1761709255877,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2016,9,24]],"date-time":"2016-09-24T00:00:00Z","timestamp":1474675200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1007\/s10916-016-0581-7","type":"journal-article","created":{"date-parts":[[2016,9,24]],"date-time":"2016-09-24T06:43:30Z","timestamp":1474699410000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Semantically Enriched Data Access Policies in eHealth"],"prefix":"10.1007","volume":"40","author":[{"given":"Micha\u0142","family":"Drozdowicz","sequence":"first","affiliation":[]},{"given":"Maria","family":"Ganzha","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8069-2152","authenticated-orcid":false,"given":"Marcin","family":"Paprzycki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,24]]},"reference":[{"key":"581_CR1","unstructured":"Security assertion markup language (SAML) v2.0. https:\/\/www.oasis-open.org\/standards (2005)"},{"key":"581_CR2","unstructured":"CASAGRAS final report: RFID and the inclusive model for the Internet of Things. Tech. rep., EU FP7 Project CASAGRAS (2009)"},{"key":"581_CR3","unstructured":"Balana \u2013 Open Source XACML 3.0 implementation. http:\/\/xacmlinfo.org\/2012\/08\/16\/balana-the-open-source-xacml-3-0-implementation\/ http:\/\/xacmlinfo.org\/2012\/08\/16\/balana-the-open-source-xacml-3-0-implementation\/ http:\/\/xacmlinfo.org\/2012\/08\/16\/balana-the-open-source-xacml-3-0-implementation\/ (2012)"},{"key":"581_CR4","unstructured":"eXtensible Access Control Markup Language (XACML) version 3.0. http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.html http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.html (2013)"},{"key":"581_CR5","unstructured":"Hl7 v3 ActInformationSensitivityPolicy value set (oid = 2.16.840.1.113883.1.11.20429). http:\/\/www.hl7.org\/documentcenter\/public_temp_6F42FF1A-1C23-BA17-0C97D0E4BA30D830\/standards\/vocabulary\/vocabulary_tables\/infrastructure\/vocabulary\/ActCode.html#_ActInformationSensitivityPolicy (2013a)"},{"key":"581_CR6","unstructured":"Hl7 v3 confidentiality value set (oid = 2.16.840.1.113883.1.11. 10228). http:\/\/www.hl7.org\/documentcenter\/public_temp_6F70C4CC-1C23-BA17-0C20679D971FA269\/standards\/vocabulary\/vocabulary_tables\/infrastructure\/vocabulary\/Confidentiality.html (2013b)"},{"key":"581_CR7","unstructured":"HL7 healthcare privacy and security classification system (HCS). http:\/\/www.hl7.org\/implement\/standards\/product_brief.cfm?product_id=345 (2014)"},{"key":"581_CR8","unstructured":"XACML v3.0 core and hierarchical role based access control (RBAC) profile version 1.0. http:\/\/docs.oasis-open.org\/xacml\/3.0\/rbac\/v1.0\/xacml-3.0-rbac-v1.0.html (2014a)"},{"key":"581_CR9","unstructured":"XACML v3.0 hierarchical resource profile version 1.0. http:\/\/docs.oasis-open.org\/xacml\/3.0\/hierarchical\/v1.0\/xacml-3.0-hierarchical-v1.0.html (2014b)"},{"key":"581_CR10","unstructured":"Bringing big data to the enterprise. http:\/\/www-01.ibm.com\/software\/data\/bigdata\/ (2015)"},{"key":"581_CR11","unstructured":"Collaborative open market to place objects at your service. http:\/\/www.compose-project.eu\/ (2015)"},{"key":"581_CR12","unstructured":"Internet-of-Things Architecture. http:\/\/www.iot-a.eu\/public (2015)"},{"key":"581_CR13","unstructured":"IoT@Work. https:\/\/www.iot-at-work.eu\/ (2015)"},{"key":"581_CR14","unstructured":"Open Source cloud solution for the Internet of Things. http:\/\/www.openiot.eu\/ (2015)"},{"key":"581_CR15","unstructured":"uBiquitous, secUre inTernet-of-things with Location and contEx-awaReness (BUTLER: Smart life. http:\/\/www.iot-butler.eu\/ (2015)"},{"key":"581_CR16","unstructured":"web of Objects ITEA 2 Project. https:\/\/itea3.org\/project\/web-of-objects.html (2015)"},{"key":"581_CR17","unstructured":"WSO2 Balana Implementation. https:\/\/github.com\/wso2\/balana (2015)"},{"key":"581_CR18","unstructured":"Anzelmo, E, Bassi, A, Caprio, D, Dodson, S, Kranenburg, R, Ratto M: Internet of things. discussion paper, institute for Internet and Society. Berlin (2011)"},{"key":"581_CR19","doi-asserted-by":"crossref","unstructured":"Atzori, L, Iera, A, Morabito, G: The internet of things: a survey. In: Computer Networks: The International Journal of Computer and Telecommunications Networking, Vol. 54, pp. 2787\u20132805. Elsevier North-Holland Inc. (2010)","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"581_CR20","doi-asserted-by":"crossref","unstructured":"Drozdowicz, M, Wasielewska, K, Ganzha, M, Paprzycki, M, Attaui, N, Lirkov, I, Olejnik, R, Petcu, D, Badica, C: Ontology for contract negotiations in agent-based grid resource management system. In: Ivanyi, P, and Topping, B (Eds.) Trends in Parallel, Distributed, Grid and Cloud Computing for Engineering. Saxe-Coburg Publications, Stirlingshire (2011)","DOI":"10.4203\/csets.27.15"},{"key":"581_CR21","doi-asserted-by":"crossref","unstructured":"Drozdowicz, M, Ganzha, M, Wasielewska, K, Paprzycki, M, Szmeja, P: Using ontologies to manage resources in grid computing: Practical aspects. In: Ossowski, S (Ed.) Agreement Technologies, Law, Governance and Technology Series, pp. 149\u2013168. Springer (2013)","DOI":"10.1007\/978-94-007-5583-3_9"},{"key":"581_CR22","doi-asserted-by":"crossref","unstructured":"Drozdowicz, M, Ganzha, M, Paprzycki, M: Semantic policy information point - preliminary considerations. In: Loshkovska, S, and Koceski, S (Eds.) ICT Innovations 2015: Engineering Technologies for Better Living, Springer, Advances in Intelligent Systems and Computing, Vol. 399, pp. 11\u201321 (2016)","DOI":"10.1007\/978-3-319-25733-4_2"},{"key":"581_CR23","unstructured":"Evans, D: The internet of things: How the next evolution of the internet is changing everything. Tech. rep., Cisco Internet Business Solutions Group (IBSG (2011)"},{"key":"581_CR24","unstructured":"FASyS: Absolutely safe and healthy factory. http:\/\/www.fasys.es\/en\/index.php (2015)"},{"key":"581_CR25","first-page":"162","volume":"800","author":"VC Hu","year":"2014","unstructured":"Hu, V C, Ferraiolo, D, Kuhn, R, Schnitzer, A, Sandlin, K, Miller, R, Scarfone, K, Guide to attribute based access control (abac) definition and considerations. NIST Special Publ. 800:162, 2014.","journal-title":"NIST Special Publ."},{"key":"581_CR26","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1016\/j.jnca.2013.06.006","volume":"38","author":"Z Li","year":"2014","unstructured":"Li, Z, Chu, C H, Yao, W, A semantic authorization model for pervasive healthcare. J. Netw. Comput. Appl. 38:76\u201387 , 2014.","journal-title":"J. Netw. Comput. Appl."},{"key":"581_CR27","doi-asserted-by":"crossref","unstructured":"Poulymenopoulou, M, Malamateniou, F, Vassilacopoulos, G: An access control framework for pervasive mobile healthcare systems utilizing cloud services. In: Wireless Mobile Communication and Healthcare, Springer, pp 380\u2013 385 (2011)","DOI":"10.1007\/978-3-642-29734-2_52"},{"key":"581_CR28","doi-asserted-by":"publisher","unstructured":"Priebe, T, Dobmeier, W, Kamprath, N: Supporting attribute-based access control with ontologies. In: The First International Conference on Availability, Reliability, and Security 2006. ARES 2006, p 8. doi: http:\/\/dx.doi.org\/10.1109\/ARES.2006.127 (2006)","DOI":"10.1109\/ARES.2006.127"}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-016-0581-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0581-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0581-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T20:04:14Z","timestamp":1568405054000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-016-0581-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,24]]},"references-count":28,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2016,11]]}},"alternative-id":["581"],"URL":"https:\/\/doi.org\/10.1007\/s10916-016-0581-7","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"type":"print","value":"0148-5598"},{"type":"electronic","value":"1573-689X"}],"subject":[],"published":{"date-parts":[[2016,9,24]]},"article-number":"238"}}