{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T12:34:43Z","timestamp":1770294883046,"version":"3.49.0"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,10,8]],"date-time":"2020-10-08T00:00:00Z","timestamp":1602115200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,8]],"date-time":"2020-10-08T00:00:00Z","timestamp":1602115200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Health Inf Sci Syst"],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1007\/s13755-020-00126-4","type":"journal-article","created":{"date-parts":[[2020,10,8]],"date-time":"2020-10-08T19:03:01Z","timestamp":1602183781000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":48,"title":["Improving accessibility of the Australian My Health Records while preserving privacy and security of the system"],"prefix":"10.1007","volume":"8","author":[{"given":"Pasupathy","family":"Vimalachandran","sequence":"first","affiliation":[]},{"given":"Hong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yongzheng","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Ji","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8465-0996","authenticated-orcid":false,"given":"Hua","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yanchun","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,8]]},"reference":[{"key":"126_CR1","unstructured":"Zhou N. My Health Record: privacy, cybersecurity and the hacking risk. The Guardian. 2018. https:\/\/www.theguardian.com\/australia-news\/2018\/jul\/16\/my-health-record-privacy-cybersecurity-and-the-hacking-risk. Accessed 12 May 2019."},{"issue":"6 Suppl.","key":"126_CR2","doi-asserted-by":"publisher","first-page":"5S","DOI":"10.1177\/1077558709343295","volume":"66","author":"M Bosch","year":"2009","unstructured":"Bosch M, et al. Review article: Effectiveness of patient care teams and the role of clinical expertise and coordination: a literature review. Med Care Res Rev. 2009;66(6 Suppl.):5S\u201335S.","journal-title":"Med Care Res Rev"},{"issue":"6","key":"126_CR3","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1016\/j.jbi.2011.06.006","volume":"44","author":"TG Kannampallil","year":"2011","unstructured":"Kannampallil TG, et al. Considering complexity in healthcare systems. J Biomed Inform. 2011;44(6):943\u20137.","journal-title":"J Biomed Inform"},{"issue":"2","key":"126_CR4","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1016\/j.jbi.2011.01.007","volume":"44","author":"B Malin","year":"2011","unstructured":"Malin B, Nyemba S, Paulett J. Learning relational policies from electronic health record access logs. J Biomed Inform. 2011;44(2):333\u201342.","journal-title":"J Biomed Inform"},{"issue":"8","key":"126_CR5","doi-asserted-by":"publisher","first-page":"1493","DOI":"10.1016\/j.jcss.2014.04.017","volume":"80","author":"H Wang","year":"2014","unstructured":"Wang H, Sun L, Bertino E. Building access control policy model for privacy preserving and testing policy conflicting problems. J Comput Syst Sci. 2014;80(8):1493\u2013503.","journal-title":"J Comput Syst Sci"},{"key":"126_CR6","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2707552","author":"K Cheng","year":"2017","unstructured":"Cheng K, et al. Secure k-nn query on encrypted cloud data with multiple keys. IEEE Trans Big Data. 2017. https:\/\/doi.org\/10.1109\/TBDATA.2017.2707552.","journal-title":"IEEE Trans Big Data"},{"key":"126_CR7","doi-asserted-by":"publisher","unstructured":"Lohr H, Sadeghi A-R, Winandy M. Securing the e-health cloud. In: Proceedings of the 1st ACM international health informatics symposium, IHI\u201910. New York: ACM. 2010. p. 220\u20139. https:\/\/doi.org\/10.1145\/1882992.1883024.","DOI":"10.1145\/1882992.1883024"},{"issue":"1","key":"126_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2806890","volume":"16","author":"J Ma","year":"2016","unstructured":"Ma J, et al. Supervised anomaly detection in uncertain pseudoperiodic data streams. ACM Trans Internet Technol (TOIT). 2016;16(1):1\u201320.","journal-title":"ACM Trans Internet Technol (TOIT)"},{"issue":"5","key":"126_CR9","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1109\/TDSC.2015.2483503","volume":"14","author":"J Zhang","year":"2015","unstructured":"Zhang J, et al. On efficient and robust anonymization for privacy protection on massive streaming categorical information. IEEE Trans Depend Secure Comput. 2015;14(5):507\u201320.","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"126_CR10","doi-asserted-by":"crossref","unstructured":"Yu W, Chekhanovskiy M. An electronic health record content protection system using smartcard and PMR. In: 2007 9th international conference on e-Health networking, application and services. 2007. p. 11\u201318.","DOI":"10.1109\/HEALTH.2007.381595"},{"issue":"5","key":"126_CR11","doi-asserted-by":"publisher","first-page":"2957","DOI":"10.1007\/s11280-020-00813-y","volume":"23","author":"F Zhang","year":"2020","unstructured":"Zhang F, et al. Decision-based evasion attacks on tree ensemble classifiers. World Wide Web. 2020;23(5):2957\u201377.","journal-title":"World Wide Web"},{"key":"126_CR12","doi-asserted-by":"publisher","first-page":"34885","DOI":"10.1109\/ACCESS.2019.2904236","volume":"7","author":"RU Rasool","year":"2019","unstructured":"Rasool RU, et al. Cyberpulse: a machine learning based link flooding attack mitigation system for software defined networks. IEEE Access. 2019;7:34885\u201399.","journal-title":"IEEE Access"},{"key":"126_CR13","doi-asserted-by":"crossref","unstructured":"Hu H, et al. Combined gene selection methods for microarray data analysis. In: International conference on knowledge-based and intelligent information and engineering systems. 2006. p. 976\u201383.","DOI":"10.1007\/11892960_117"},{"key":"126_CR14","unstructured":"Kabir M, Wang H. Conditional purpose based access control model for privacy protection. In: Proceedings of the 12th Australasian conference on Australasian Database, vol. 92. 2009. p. 135\u2013142."},{"key":"126_CR15","doi-asserted-by":"publisher","unstructured":"Williams J. Social networking applications in health care: threats to the privacy and security of health information. In: Proceedings of the 2010 ICSE workshop on software engineering in health care. 2010. p. 39\u201349. https:\/\/doi.org\/10.1145\/1809085.1809091.","DOI":"10.1145\/1809085.1809091"},{"issue":"5","key":"126_CR16","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1016\/j.cose.2011.05.005","volume":"30","author":"X Sun","year":"2011","unstructured":"Sun X, et al. Injecting purpose and trust into data anonymization. Comput Security. 2011;30(5):332\u201345.","journal-title":"Comput Security"},{"key":"126_CR17","unstructured":"Khalil F, Wang H, Li J. Integrating markov model with clustering for predicting web page accesses. In: Proceeding of the 13th Australasian world wide web conference. 2007. p. 63\u201374."},{"issue":"3","key":"126_CR18","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1002\/cpe.3286","volume":"28","author":"H Wang","year":"2016","unstructured":"Wang H, Yi X, Bertino E, Sun L. Protecting outsourced data in cloud computing through access management. Concurr Comput Pract Experience. 2016;28(3):600\u201315.","journal-title":"Concurr Comput Pract Experience"},{"issue":"8","key":"126_CR19","first-page":"e4","volume":"3","author":"P Vimalachandran","year":"2016","unstructured":"Vimalachandran P, et al. The Australian PCEHR System: ensuring privacy and security through an improved access control mechanism. EAI Endorsed Trans Scalable Inf Syst. 2016;3(8):e4.","journal-title":"EAI Endorsed Trans Scalable Inf Syst"},{"issue":"4","key":"126_CR20","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/s11280-011-0114-8","volume":"14","author":"M Li","year":"2011","unstructured":"Li M, Sun X, Wang H, Zhang Y, Zhang J. Privacy-aware access control with trust management in web service. World Wide Web. 2011;14(4):407\u201330.","journal-title":"World Wide Web"},{"key":"126_CR21","unstructured":"New London Consulting. Australia: how privacy considerations drive patient decisions and impact patient care outcomes. Fair Warning. Australian Patient Survey. 2012."},{"issue":"4","key":"126_CR22","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/s11280-013-0218-4","volume":"17","author":"J Zhang","year":"2014","unstructured":"Zhang J, Tao X, Wang H. Outlier detection from large distributed databases. World Wide Web. 2014;17(4):539\u201368.","journal-title":"World Wide Web"},{"issue":"2","key":"126_CR23","first-page":"150","volume":"4","author":"EFE Ahmet","year":"2018","unstructured":"Ahmet EFE, Calik E. Holistic security architecture for effective management of healthcare cyber threats. Int J Health Manag Strateg Res. 2018;4(2):150\u201367.","journal-title":"Int J Health Manag Strateg Res"},{"key":"126_CR24","first-page":"5","volume":"9","author":"RP Hartwig","year":"2014","unstructured":"Hartwig RP. Cyber risks: the growing threat. Glob Risks. 2014;9:5\u201314.","journal-title":"Glob Risks"},{"issue":"1","key":"126_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11280-017-0490-9","volume":"21","author":"H Wang","year":"2018","unstructured":"Wang H, Zhang Z, Taleb T. Special issue on security and privacy of IoT. World Wide Web. 2018;21(1):1\u20136.","journal-title":"World Wide Web"},{"issue":"1","key":"126_CR26","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s11280-017-0456-y","volume":"21","author":"M Peng","year":"2018","unstructured":"Peng M, et al. Personalized app recommendation based on app permissions. World Wide Web. 2018;21(1):89\u2013104.","journal-title":"World Wide Web"},{"issue":"8","key":"126_CR27","doi-asserted-by":"publisher","first-page":"11","DOI":"10.5120\/ijais14-451225","volume":"7","author":"A Omotosho","year":"2014","unstructured":"Omotosho A, Emuoyibofarhe J. A criticism of the current security, privacy and accountability issues in electronic health records. IJAIS. 2014;7(8):11\u20138.","journal-title":"IJAIS"},{"issue":"3","key":"126_CR28","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1007\/s10618-010-0208-4","volume":"23","author":"X Sun","year":"2011","unstructured":"Sun X, Wang H, Li J, Pei J. Publishing anonymous survey rating data. Data Min Knowl Discov. 2011;23(3):379\u2013406.","journal-title":"Data Min Knowl Discov"},{"key":"126_CR29","unstructured":"Sellars C, Easey DA. Electronic health records: data protection issues in Europe. BNA International, BNA\u2018s World Data Protection Report, April 2008."},{"issue":"4","key":"126_CR30","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1504\/IJIEM.2010.035624","volume":"6","author":"A Appari","year":"2010","unstructured":"Appari A, Johnson M. Information security and privacy in healthcare: current state of research. Int J Internet Enterprise Manag. 2010;6(4):279.","journal-title":"Int J Internet Enterprise Manag"},{"issue":"2","key":"126_CR31","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1016\/j.datak.2007.04.001","volume":"63","author":"X Yi","year":"2007","unstructured":"Yi X, Zhang Y. Privacy-preserving distributed association rule mining via semi-trusted mixer. Data Knowl Eng. 2007;63(2):550\u201367.","journal-title":"Data Knowl Eng"},{"issue":"4","key":"126_CR32","first-page":"71","volume":"6","author":"RM \u00c5hlfeldt","year":"2010","unstructured":"\u00c5hlfeldt RM, S\u00f6derstr\u00f6m E. Patient safety and patient privacy in information security from the patient\u2019s view: a case study19. Inf Security Distrib Healthc. 2010;6(4):71\u201385.","journal-title":"Inf Security Distrib Healthc"},{"issue":"9","key":"126_CR33","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/MCOM.2017.1700104","volume":"55","author":"Y Shen","year":"2017","unstructured":"Shen Y, et al. Microthings: a generic IoT architecture for flexible data aggregation and scalable service cooperation. IEEE Commun Mag. 2017;55(9):86\u201393.","journal-title":"IEEE Commun Mag"},{"key":"126_CR34","doi-asserted-by":"publisher","first-page":"5","DOI":"10.4135\/9781412952644","volume-title":"Encyclopedia of measurement and statistics","author":"NJ Salkind","year":"2007","unstructured":"Salkind NJ, Kristin R. Encyclopedia of measurement and statistics. 1st ed. Thousand Oaks, CA: SAGE; 2007. p. 5.","edition":"1"},{"key":"126_CR35","unstructured":"Sun X, et al. An efficient hash-based algorithm for minimal k-anonymity. In: Proceedings of the 31st Australasian conference on Computer science, vol. 74 (ACSC \u201808). 2008. p. 101\u2013107."},{"key":"126_CR36","unstructured":"National Institute of Standards and Technology. Performance measurement guide for information security. NIST Special Publication. Gaithersburg: NIST; 2012"},{"key":"126_CR37","doi-asserted-by":"crossref","unstructured":"Vimalachandran P, Zhang Y, Cao J, Sun L, Yong J (2018) Preserving data privacy and security in australian my health record system: a quality health care implication. In Web information systems engineering\u2014WISE 2018. Lecture notes in computer science, vol. 11234. p. 111\u2013120.","DOI":"10.1007\/978-3-030-02925-8_8"},{"issue":"1","key":"126_CR38","first-page":"285","volume":"24","author":"H Wang","year":"2002","unstructured":"Wang H, Cao J, Zhang Y. Ticket-based service access scheme for mobile users. Aust Comput Sci Commun. 2002;24(1):285\u201392.","journal-title":"Aust Comput Sci Commun"},{"issue":"3","key":"126_CR39","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1109\/TKDE.2005.35","volume":"17","author":"H Wang","year":"2005","unstructured":"Wang H, Cao J, Zhang Y. A flexible payment scheme and its role-based access control. IEEE Trans Knowl Data Eng. 2005;17(3):425\u201336.","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"6 Suppl","key":"126_CR40","doi-asserted-by":"publisher","first-page":"5S","DOI":"10.1177\/1077558709343295","volume":"66","author":"M Bosch","year":"2009","unstructured":"Bosch M, et al. Review article: Effectiveness of patient care teams and the role of clinical expertise and coordination: a literature review. Med Care Res Rev. 2009;66(6 Suppl):5S\u201335S.","journal-title":"Med Care Res Rev"},{"issue":"6","key":"126_CR41","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1016\/j.jbi.2011.06.006","volume":"44","author":"TG Kannampallil","year":"2011","unstructured":"Kannampallil TG, et al. Considering complexity in health care systems. J Biomed Informatics. 2011;44(6):943\u20137.","journal-title":"J Biomed Informatics"},{"issue":"2","key":"126_CR42","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1016\/j.jbi.2011.01.007","volume":"44","author":"B Malin","year":"2011","unstructured":"Malin B, Nyemba S, Paulett J. Learning relational policies from electronic health record access logs. J Biomed Informatics. 2011;44(2):333\u201342.","journal-title":"J Biomed Informatics"},{"issue":"5","key":"126_CR43","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/s40266-018-0537-3","volume":"35","author":"K Wang","year":"2018","unstructured":"Wang K, et al. Medications and prescribing patterns as factors associated with hospitalizations from long-term care facilities: a systematic review. Drugs Aging. 2018;35(5):423\u201357.","journal-title":"Drugs Aging"},{"key":"126_CR44","unstructured":"Kemp K, Arnold BB, Vaile D. My Health Record: the case for opting out. The conversation [Online]. 2018. https:\/\/theconversation.com\/my-health-record-the-case-for-opting-out-99302."},{"key":"126_CR45","unstructured":"Australian Privacy Foundation. MEDIA RELEASE: \u2018Open Data\u2019: too much sharing, too little care? Who\u2019s reading your health information now? [Online]. 2018. https:\/\/privacy.org.au\/2018\/01\/07\/media-release-open-data-too-much-sharing-too-little-care-whos-reading-your-health-information-now\/."},{"key":"126_CR46","doi-asserted-by":"crossref","unstructured":"Vimalachandran P, Wang H, Zhang Y. Securing electronic medical record and electronic health record systems through an improved access control. In 4th international health information science conference (HIS), Melbourne, vol. 9085. New York: Springer; 2015. p. 17\u201330.","DOI":"10.1007\/978-3-319-19156-0_3"},{"issue":"2","key":"126_CR47","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1007\/s11280-019-00704-x","volume":"23","author":"H Wang","year":"2020","unstructured":"Wang H, Wang Y, Taleb T, Jiang X. Special issue on security and privacy in network computing. World Wide Web. 2020;23(2):951\u20137.","journal-title":"World Wide Web"}],"container-title":["Health Information Science and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13755-020-00126-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13755-020-00126-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13755-020-00126-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,8]],"date-time":"2021-10-08T12:29:06Z","timestamp":1633696146000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13755-020-00126-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,8]]},"references-count":47,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["126"],"URL":"https:\/\/doi.org\/10.1007\/s13755-020-00126-4","relation":{},"ISSN":["2047-2501"],"issn-type":[{"value":"2047-2501","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,8]]},"assertion":[{"value":"3 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 September 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 October 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"31"}}