{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T18:58:45Z","timestamp":1777057125617,"version":"3.51.4"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2016,10,8]],"date-time":"2016-10-08T00:00:00Z","timestamp":1475884800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1007\/s10916-016-0630-2","type":"journal-article","created":{"date-parts":[[2016,10,8]],"date-time":"2016-10-08T07:41:54Z","timestamp":1475912514000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Advanced Techniques for Deploying Reliable and Efficient Access Control: Application to E-healthcare"],"prefix":"10.1007","volume":"40","author":[{"given":"Faouzi","family":"Ja\u00efdi","sequence":"first","affiliation":[]},{"given":"Faten","family":"Labbene-Ayachi","sequence":"additional","affiliation":[]},{"given":"Adel","family":"Bouhoula","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,8]]},"reference":[{"key":"630_CR1","doi-asserted-by":"crossref","unstructured":"Jaidi, F., and Labbene-Ayachi, F., The problem of integrity in RBAC-based policies within relational databases: synthesis and problem study. ACM IMCOM 9th Int. Conf. Ubiquit. Inf. Manag. Commun. 21, 2015.","DOI":"10.1145\/2701126.2701196"},{"issue":"1","key":"630_CR2","first-page":"23","volume":"15","author":"G Kaur","year":"2006","unstructured":"Kaur, G., and Gupta, N., E-health: a New perspective on global health. J. Evol. Technol. 15(1):23\u201335, 2006.","journal-title":"J. Evol. Technol."},{"key":"630_CR3","unstructured":"Scherrer, J.R., Spahni, S., Healthcare Information System Architecture (HISA) and its middleware models. AMIA Symp. 1999."},{"key":"630_CR4","unstructured":"SAMTA project. http:\/\/samta.offis.de\/ ."},{"key":"630_CR5","unstructured":"The Telemedicine System Interoperability Architecture (TSIA). http:\/\/telemedicine.sandia.gov\/ ."},{"key":"630_CR6","doi-asserted-by":"crossref","unstructured":"Xiang, Y., Gu, Q., Li, Z., A distributed framework of Web-based telemedicine system. Proc. 16th IEEE Symp. Comput.-Based Med. Syst. 108\u2013113, 2003.","DOI":"10.1109\/CBMS.2003.1212775"},{"key":"630_CR7","doi-asserted-by":"crossref","unstructured":"Omar, W.M., Taleb-Bendiab, A., E-health support services based on service-oriented architecture. IEEE Int. Conf. Serv. Comput. 135\u2013142, 2006.","DOI":"10.1109\/SCC.2006.90"},{"issue":"2","key":"630_CR8","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1136\/jamia.1996.96236282","volume":"13","author":"R Barrows","year":"1996","unstructured":"Barrows, R., Privacy, confidentiality, and electronic medical records. J. Am. Med. Inf. Assoc. 13(2):139\u2013148, 1996.","journal-title":"J. Am. Med. Inf. Assoc."},{"key":"630_CR9","unstructured":"Health Insurance Portability and Accountability Act, United States Public Law, 104\u2013191."},{"issue":"1","key":"630_CR10","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/775265.775268","volume":"8","author":"W Lampson","year":"1974","unstructured":"Lampson, W., Protection. ACM SIGOPS Oper. Syst. Rev. 8(1):18\u201324, 1974.","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"key":"630_CR11","doi-asserted-by":"crossref","unstructured":"Bell, D., LaPadula, L., Secure computer systems: unified exposition and multics interpretation. MTR-2997. 1975.","DOI":"10.21236\/ADA023588"},{"issue":"2","key":"630_CR12","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R Sandhu","year":"1996","unstructured":"Sandhu, R., Coynek, E. J., Feinsteink, H. L., and Youmank, C. E., Role-based access control models. IEEE Comput. 29(2):38\u201347, 1996.","journal-title":"IEEE Comput."},{"key":"630_CR13","doi-asserted-by":"crossref","unstructured":"Lu, S., Hong, Y., Liu, Q., Wang L., Dssouli, R., Access control in e-health portal systems. 4th Int. Conf. Innov. Inf. Technol. 88\u201392, 2007.","DOI":"10.1109\/IIT.2007.4430378"},{"issue":"4","key":"630_CR14","first-page":"1","volume":"26","author":"S Jajodia","year":"2001","unstructured":"Jajodia, S., Samarati, P., Sapino, M. L., and Subrahmanian, V. S., Flexible support for multiple access control policies. ACM Trans. Database Syst. 26(4):1\u201357, 2001.","journal-title":"ACM Trans. Database Syst."},{"key":"630_CR15","unstructured":"Nirmala, D., Madhu Bindu N., Preserving privacy and providing auditability for cloud assisted mobile-access of health data. Int. J. Comput. Sci. Mechatron. 1(2), 2015."},{"key":"630_CR16","unstructured":"Mont, M. C., Bramhall, P., Harrison, K., A flexible role-based secure messaging service: Exploiting IBE technology for privacy in health care. 14th Int. Work. Database Exp. Syst. Appl. 2003."},{"issue":"3","key":"630_CR17","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D Boneh","year":"2003","unstructured":"Boneh, D., and Franklin, M., Identity based encryption from the Weil pairing. SIAM J. Comput. 32(3):586\u2013615, 2003.","journal-title":"SIAM J. Comput."},{"issue":"5","key":"630_CR18","doi-asserted-by":"crossref","first-page":"815","DOI":"10.1016\/j.infsof.2008.05.011","volume":"51","author":"DA Basin","year":"2009","unstructured":"Basin, D. A., Clavel, M., Doser, J., and Egea, M., Automated analysis of security-design models. Inf. Softw. Technol. 51(5):815\u2013831, 2009.","journal-title":"Inf. Softw. Technol."},{"key":"630_CR19","unstructured":"Idani, A., Ledru, Y., Richier, J., Labiadh, M. A., Qamar, N., Gervais, F., Laleau, R., Milhau, J., Frappier, M., Principles of the coupling between UML and formal notations. ANR-08-SEGI-018. 2011."},{"key":"630_CR20","first-page":"592","volume":"83","author":"Y Ledru","year":"2011","unstructured":"Ledru, Y., Idani, A., Milhau, J., Qamar, N., Laleau, R., Richier, J., and Labiadh, M. A., Taking into account functional models in the validation of IS security policies. CAiSE Work. 83:592\u2013606, 2011.","journal-title":"CAiSE Work."},{"issue":"2","key":"630_CR21","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/300830.300832","volume":"1","author":"M Nyanchama","year":"1999","unstructured":"Nyanchama, M., and Osborn, S., The role graph model and conflict of interest. ACM Trans. Inf. Syst. Secur. 1(2):3\u201333, 1999.","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"3","key":"630_CR22","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1145\/545186.545191","volume":"5","author":"M Koch","year":"2002","unstructured":"Koch, M., Mancini, L. V., and Parisi-Presicce, F., A graph-based formalism for RBAC. ACM Trans. Inf. Syst. Secur. 5(3):332\u2013335, 2002.","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"630_CR23","doi-asserted-by":"crossref","unstructured":"Hansen, F., Oleshchuk, V., Conformance checking of RBAC policy and its implementation. 1st Inf. Sec. Pract. Exp. Conf. 144\u2013155, 2005.","DOI":"10.1007\/978-3-540-31979-5_13"},{"key":"630_CR24","doi-asserted-by":"crossref","first-page":"726","DOI":"10.3923\/itj.2009.726.734","volume":"8","author":"C Huang","year":"2009","unstructured":"Huang, C., Sun, J., Wang, X., and Si, Y., Security policy management for systems employing role based access control model. Inf. Technol. J. 8:726\u2013734, 2009.","journal-title":"Inf. Technol. J."},{"issue":"1","key":"630_CR25","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1007\/s10844-010-0146-z","volume":"38","author":"R Thion","year":"2012","unstructured":"Thion, R., and Coulondre, S., A relational database integrity framework for access control policies. J. Intell. Inf. Syst. 38(1):131\u2013159, 2012.","journal-title":"J. Intell. Inf. Syst."},{"key":"630_CR26","unstructured":"Elavathingal, E. E., Sethuramalingam, T. K., Wearable electronic healthcare device for home centric patient monitoring. IOJER. 1(2), 2015."},{"issue":"4","key":"630_CR27","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1016\/j.cose.2010.12.001","volume":"30","author":"N Gunson","year":"2011","unstructured":"Gunson, N., Marshall, D., Morton, H., and Jack, M., User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking. Comput. Secur. 30(4):208\u2013220, 2011.","journal-title":"Comput. Secur."},{"key":"630_CR28","first-page":"1","volume":"203","author":"D He","year":"2012","unstructured":"He, D., Robust biometric-based user authentication scheme for wireless sensor networks. IACR Cryptol. ePrint 203:1\u201315, 2012.","journal-title":"IACR Cryptol. ePrint"},{"issue":"3","key":"630_CR29","doi-asserted-by":"crossref","first-page":"107","DOI":"10.7838\/jsebs.2013.18.3.107","volume":"18","author":"KC Shin","year":"2013","unstructured":"Shin, K. C., A robust biometric-based user authentication protocol in wireless sensor network environment. J. Soc. e-Bus. Stud. 18(3):107\u2013123, 2013.","journal-title":"J. Soc. e-Bus. Stud."},{"key":"630_CR30","doi-asserted-by":"crossref","unstructured":"Yoon, E. J., Yoo, K. Y., A biometric-based authenticated key agreement scheme using ECC for wireless sensor networks. 29th Ann. ACM Symp. Appl. Comput. 699\u2013705, 2014.","DOI":"10.1145\/2554850.2555045"},{"key":"630_CR31","doi-asserted-by":"crossref","unstructured":"Choi, Y., Lee, Y., Won, D., Security improvement on biometric based authentication scheme for wireless sensor networks using fuzzy extraction. Int. J. Distrib. Sens. Netw. 2, 2016.","DOI":"10.1155\/2016\/8572410"},{"key":"630_CR32","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1016\/j.ins.2015.03.070","volume":"321","author":"D Wang","year":"2015","unstructured":"Wang, D., Wang, N., Wang, P., and Qing, S., Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity. Inf. Sci. 321:162\u2013178, 2015.","journal-title":"Inf. Sci."},{"key":"630_CR33","doi-asserted-by":"crossref","unstructured":"Jiang, Q., Kumar, N., Ma, J., Shen, J., He, D., Chilamkurti, N., A privacy\u2010aware two\u2010factor authentication protocol based on elliptic curve cryptography for wireless sensor networks. Int. J. Netw. Manag. 2016.","DOI":"10.1002\/nem.1937"},{"issue":"4","key":"630_CR34","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1109\/TDSC.2014.2355850","volume":"12","author":"D Wang","year":"2015","unstructured":"Wang, D., He, D., Wang, P., and Chu, C. H., Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans. Dependable Secure Comput. 12(4):428\u2013442, 2015.","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"630_CR35","doi-asserted-by":"crossref","unstructured":"Wu, F., Xu, L., Kumari, S., Li, X., An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks. Multimedia Systems 1\u201311, 2015.","DOI":"10.1007\/s00530-015-0476-3"},{"key":"630_CR36","doi-asserted-by":"crossref","unstructured":"Das, A. K., Sutrala, A. K., Kumari, S., Odelu, V., Wazid, M., Li, X., An efficient multi\u2010gateway\u2010based three\u2010factor user authentication and key agreement scheme in hierarchical wireless sensor networks. Secur. Commun. Netw. 2016.","DOI":"10.1002\/sec.1464"},{"issue":"3","key":"630_CR37","doi-asserted-by":"crossref","first-page":"816","DOI":"10.1109\/JSYST.2014.2301517","volume":"9","author":"D He","year":"2015","unstructured":"He, D., and Wang, D., Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst. J. 9(3):816\u2013823, 2015.","journal-title":"IEEE Syst. J."},{"key":"630_CR38","doi-asserted-by":"crossref","unstructured":"Jiang, Q., Khan, M. K., Lu, X., Ma, J., He, D., A privacy preserving three-factor authentication protocol for e-Health clouds. J. Supercomput. 1\u201324, 2016.","DOI":"10.1007\/s11227-015-1610-x"},{"key":"630_CR39","doi-asserted-by":"crossref","first-page":"4319","DOI":"10.1002\/sec.1344","volume":"8","author":"SKH Islam","year":"2015","unstructured":"Islam, S. K. H., and Obaidat, M. S., Design of provably secure and efficient certificateless blind signature scheme using bilinear pairing. Sec. Commun. Netw. 8:4319\u20134332, 2015.","journal-title":"Sec. Commun. Netw."},{"issue":"6","key":"630_CR40","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1049\/iet-ifs.2014.0293","volume":"9","author":"L Cheng","year":"2015","unstructured":"Cheng, L., and Wen, Q., Cryptanalysis and improvement of a certificateless partially blind signature. IET Inf. Secur. 9(6):380\u2013386, 2015.","journal-title":"IET Inf. Secur."},{"issue":"2","key":"630_CR41","doi-asserted-by":"crossref","first-page":"1003","DOI":"10.1590\/0001-3765201420130199","volume":"86","author":"G Dong","year":"2014","unstructured":"Dong, G., Gao, F., Shi, W., and Gong, P., An efficient certificateless blind signature scheme without bilinear pairing. An. Acad. Bras. Cienc. 86(2):1003\u20131011, 2014.","journal-title":"An. Acad. Bras. Cienc."},{"issue":"9","key":"630_CR42","doi-asserted-by":"crossref","first-page":"2510","DOI":"10.1016\/j.mcm.2012.12.037","volume":"57","author":"D He","year":"2013","unstructured":"He, D., Chen, Y., and Chen, J., An efficient certificateless proxy signature scheme without pairing. Math. Comput. Model. 57(9):2510\u20132518, 2013.","journal-title":"Math. Comput. Model."},{"key":"630_CR43","doi-asserted-by":"crossref","unstructured":"Jaidi, F., Labbene-Ayachi, F., An approach to formally validate and verify the compliance of low level access control policies. IEEE 17th Int. Conf. Comput. Sci. Eng. 1550\u20131557, 2014.","DOI":"10.1109\/CSE.2014.287"},{"key":"630_CR44","first-page":"1","volume":"2","author":"F Jaidi","year":"2015","unstructured":"Jaidi, F., and Labbene-Ayachi, F., To summarize the problem of Non-conformity in concrete RBAC-based policies: synthesis, system proposal and future directives. NNGT Int. J. Inf. Sec. 2:1\u201312, 2015.","journal-title":"NNGT Int. J. Inf. Sec."},{"key":"630_CR45","unstructured":"Jaidi, F., Labbene-Ayachi, F., A reverse engineering and model transformation approach for RBAC-administered databases. 13th Int. Conf. High Perform. Comput. Simul. 2015."},{"key":"630_CR46","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/978-3-319-19713-5_5","volume":"369","author":"F Jaidi","year":"2015","unstructured":"Jaidi, F., and Labbene-Ayachi, F., A formal approach based on verification and validation techniques for enhancing the integrity of concrete role based access control policies. Int. Joint Conf. Adv. Intell. Syst. Comput. 369:53\u201364, 2015.","journal-title":"Int. Joint Conf. Adv. Intell. Syst. Comput."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0630-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-016-0630-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0630-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T03:32:16Z","timestamp":1749612736000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-016-0630-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,8]]},"references-count":46,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["630"],"URL":"https:\/\/doi.org\/10.1007\/s10916-016-0630-2","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,10,8]]},"article-number":"262"}}