{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T23:40:41Z","timestamp":1742946041039,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030161866"},{"type":"electronic","value":"9783030161873"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-16187-3_9","type":"book-chapter","created":{"date-parts":[[2019,3,29]],"date-time":"2019-03-29T09:02:58Z","timestamp":1553850178000},"page":"83-93","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Logging Integrity with Blockchain Structures"],"prefix":"10.1007","author":[{"given":"Marco","family":"Rosa","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5029-6191","authenticated-orcid":false,"given":"Jo\u00e3o Paulo","family":"Barraca","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3801-7249","authenticated-orcid":false,"given":"Nelson Pacheco","family":"Rocha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,30]]},"reference":[{"issue":"9","key":"9_CR1","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/JSAC.2013.SUP.0513001","volume":"2","author":"G Chiarini","year":"2013","unstructured":"Chiarini, G., Ray, P., Akter, S., Masella, C., Ganz, A.: MHealth technologies for chronic diseases and elders: A systematic review. IEEE J. Sel. Areas Commun. 2(9), 6\u201318 (2013)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"9603","key":"9_CR2","doi-asserted-by":"publisher","first-page":"1929","DOI":"10.1016\/S0140-6736(07)61696-1","volume":"370","author":"DO Abegunde","year":"2007","unstructured":"Abegunde, D.O., Mathers, C.D., Adam, T., Ortegon, M., Strong, K.: The burden and costs of chronic diseases in low-income and middle-income countries. Lancet 370(9603), 1929\u20131938 (2007)","journal-title":"Lancet"},{"key":"9_CR3","unstructured":"WHO global strategy on people-centred and integrated health services. WHO (2015)"},{"key":"9_CR4","first-page":"52","volume":"177","author":"B Blobel","year":"2012","unstructured":"Blobel, B.: Co-production of health enabled by next generation personal health systems. Stud. Health Technol. Inform. 177, 52\u201358 (2012)","journal-title":"Stud. Health Technol. Inform."},{"issue":"1","key":"9_CR5","first-page":"23","volume":"7","author":"M H\u00e4gglund","year":"2009","unstructured":"H\u00e4gglund, M., Scandurra, I., Koch, S.: Studying intersection points - an analysis of information needs for shared homecare of elderly patients. J. Inf. Technol. Healthc. 7(1), 23\u201342 (2009)","journal-title":"J. Inf. Technol. Healthc."},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Sousa, M., Arieira, L., Queir\u00f3s, A., Martins, A.I., Rocha, N.P., Augusto, F., Duarte, F., Neves, T., Damasceno, A.: SOCIAL platform. In: Advances in Intelligent Systems and Computing, vol. 746, pp. 1162\u20131168 (2018)","DOI":"10.1007\/978-3-319-77712-2_111"},{"key":"9_CR7","first-page":"41","volume":"177","author":"M Rigby","year":"2012","unstructured":"Rigby, M.: Integrating health and social care informatics to enable holistic health care. Stud. Health Technol. Inform. 177, 41\u201351 (2012)","journal-title":"Stud. Health Technol. Inform."},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"King, J., Williams, L.: Log your CRUD: design principles for software logging mechanisms. In: Proceedings of the 2014 Symposium and Bootcamp on the Science of Security (HotSoS 2014), pp. 5\u201315, ACM, Raleigh (2014)","DOI":"10.1145\/2600176.2600183"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Zhao, X., Rodrigues, K., Luo, Y., Stumm, M., Yuan, D., Zhou, Y.: The game of twenty questions: do you know where to log? In: Proceedings of the 16th Workshop on Hot Topics in Operating Systems (HotOS 2017), pp. 125\u2013131. ACM, Whistler (2017)","DOI":"10.1145\/3102980.3103001"},{"issue":"3","key":"9_CR10","first-page":"29","volume":"150","author":"K Yang","year":"2016","unstructured":"Yang, K.: Aggregated containerized logging solution with Fluentd, Elasticsearch and Kibana. Int. J. Comput. Appl. 150(3), 29\u201331 (2016)","journal-title":"Int. J. Comput. Appl."},{"key":"9_CR11","unstructured":"Stackify, Retrace. \n                    https:\/\/stackify.com\/retrace\/\n                    \n                  . Accessed 22 Oct 2018"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Sekharan, S.S., Kandasamy, K.: Profiling SIEM tools and correlation engines for security analytics. In: 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 717\u2013721. IEEE, Chennai (2017)","DOI":"10.1109\/WiSPNET.2017.8299855"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Okumura, M., Fujimura, S.: Constructing a log collecting system using using splunk and its application for service support. In: Proceedings of the 2016 ACM on SIGUCCS Annual Conference (SIGUCCS 2016), pp. 103\u2013106. ACM, Denver (2016)","DOI":"10.1145\/2974927.2974934"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Hartung, G.: Secure audit logs with verifiable excerpts. In: Topics in Cryptology - CT-RSA, pp. 183\u2013199. Springer International Publishing (2016)","DOI":"10.1007\/978-3-319-29485-8_11"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Ning, F., et al.: Efficient tamper-evident logging of distributed systems via concurrent authenticated tree. In: 36th IEEE International Performance Computing and Communications Conference, pp. 1\u20139. IEEE, San Diego (2017)","DOI":"10.1109\/PCCC.2017.8280476"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Lin, C.-Y., et al.: Secure logging framework integrating with cloud database. In: 2015 International Carnahan Conference on Security Technology, pp. 13\u201317. IEEE, Taipei (2015)","DOI":"10.1109\/CCST.2015.7389650"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Aniello, L., Baldoni, R., Gaetani, E., Lombardi, F., Margheri, A., Sassone, V.: A prototype evaluation of a tamper-resistant high performance blockchain-based transaction log for a distributed database. In: 13th IEEE European Dependable Computing Conference, pp. 151\u2013154. IEEE, Geneva (2017)","DOI":"10.1109\/EDCC.2017.31"},{"key":"9_CR18","unstructured":"Zawoad, S., et al.: FAL: a forensics aware language for secure logging. In: Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, Warsaw, Poland, pp. 1579\u20131586 (2013)"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Rajalakshmi, J., et al.: Anonymizing log management process for secure logging in the cloud. In: 2014 International Conference on Circuit, Power and Computing Technologies, pp. 1559\u20131564. IEEE, Kanyakumari (2014)","DOI":"10.1109\/ICCPCT.2014.7055014"},{"key":"9_CR20","volume-title":"Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction","author":"A Narayanan","year":"2016","unstructured":"Narayanan, A., Bonneau, J., Felten, E., Miller, A., Goldfeder, S.: Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Princeton University Press, Princeton (2016)"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Magyar, G.: Blockchain: solving the privacy and research availability tradeoff for EHR data: a new disruptive technology in health data management. In: IEEE 30th Neumann Colloquium (NC), pp. 135\u2013140. IEEE, Budapest (2017)","DOI":"10.1109\/NC.2017.8263269"},{"key":"9_CR22","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/j.csbj.2018.07.004","volume":"16","author":"P Zhang","year":"2018","unstructured":"Zhang, P., et al.: FHIRChain: Applying Blockchain to Securely and Scalably Share Clinical Data. Comput. Struct. Biotechnol. J. 16, 267\u2013278 (2018)","journal-title":"Comput. Struct. Biotechnol. J."}],"container-title":["Advances in Intelligent Systems and Computing","New Knowledge in Information Systems and Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-16187-3_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T03:54:13Z","timestamp":1558151653000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-16187-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030161866","9783030161873"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-16187-3_9","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"30 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WorldCIST'19","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"World Conference on Information Systems and Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Galicia","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 April 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 April 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"worldcist2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.worldcist.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}