{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T00:10:05Z","timestamp":1743984605825,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642323942"},{"type":"electronic","value":"9783642323959"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32395-9_5","type":"book-chapter","created":{"date-parts":[[2012,8,18]],"date-time":"2012-08-18T10:10:07Z","timestamp":1345284607000},"page":"54-68","source":"Crossref","is-referenced-by-count":7,"title":["A Mobile Based Authorization Mechanism for Patient Managed Role Based Access Control"],"prefix":"10.1007","author":[{"given":"C\u00e1tia","family":"Santos-Pereira","sequence":"first","affiliation":[]},{"given":"Alexandre B.","family":"Augusto","sequence":"additional","affiliation":[]},{"given":"Manuel E.","family":"Correia","sequence":"additional","affiliation":[]},{"given":"Ana","family":"Ferreira","sequence":"additional","affiliation":[]},{"given":"Ricardo","family":"Cruz-Correia","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"publisher","first-page":"997","DOI":"10.1145\/1180639.1180859","volume-title":"Proceedings of the 14th Annual ACM International Conference on Multimedia, MULTIMEDIA 2006","author":"S. Ebadollahi","year":"2006","unstructured":"Ebadollahi, S., Coden, A.R., Tanenblatt, M.A., Chang, S.-F., Syeda-Mahmood, T., Amir, A.: Concept-based electronic health records: opportunities and challenges. In: Proceedings of the 14th Annual ACM International Conference on Multimedia, MULTIMEDIA 2006, pp. 997\u20131006. ACM, New York (2006)"},{"key":"5_CR2","unstructured":"Council of Europe. Protection of medical data - recommendation no r (97) 5 (1997)"},{"key":"5_CR3","unstructured":"U.S. Department of Health & Human\u00a0Services. Health insurance portability and accountability act (1996)"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Pereira, C., Oliveira, C., Vilaa, C., Ferreira, A.: Protection of clinical data - comparison of european with american legislation and respective technological applicability. In: HEALTHINF 2011, pp. 567\u2013570 (2011)","DOI":"10.5220\/0003165505670570"},{"key":"5_CR5","unstructured":"Republica Portuguesa. Lei acesso aos documentos da administra\u00e7ao 46\/2007 (2007)"},{"key":"5_CR6","unstructured":"NHS choices. How do i access my medical records (health records)?, 15\/09\/2010 (2012)"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Santos-Pereira, C., Antunes, L., Cruz-Correia, R., Ferreira, A.: One way to patient empowerment - a proposal for an authorization model. In: Proceedings of the HealthInf 2012 - International Conference on Health Informatics, pp. 249\u2013255 (2012)","DOI":"10.5220\/0003787902490255"},{"issue":"5","key":"5_CR8","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1016\/j.ijmedinf.2007.09.001","volume":"77","author":"K. Hyrinen","year":"2008","unstructured":"Hyrinen, K., Saranto, K., Nyknen, P.: Definition, structure, content, use and impacts of electronic health records: A review of the research literature. International Journal of Medical Informatics\u00a077(5), 291\u2013304 (2008)","journal-title":"International Journal of Medical Informatics"},{"issue":"6","key":"5_CR9","doi-asserted-by":"publisher","first-page":"1028","DOI":"10.1016\/j.jbi.2008.03.014","volume":"41","author":"M. Peleg","year":"2008","unstructured":"Peleg, M., Beimel, D., Dori, D., Denekamp, Y.: Situation-based access control: Privacy management via modeling of patient data access scenarios. J. of Biomedical Informatics\u00a041(6), 1028\u20131040 (2008)","journal-title":"J. of Biomedical Informatics"},{"key":"5_CR10","unstructured":"Dept. of\u00a0Health &\u00a0HS. The office of the national coordinator for health information technology (2011)"},{"key":"5_CR11","unstructured":"Kroll Fraud Solutions. Healthcare information and management systems society (himss) analytics report: Security of patient data. Technical report, Kroll Fraud Solutions (2008)"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Watts, J., Yu, H., Yuan, X.: Case study: Using smart cards with pki to implement data access control for health information systems. In: IEEE Southeastcon 2010: Energizing Our Future, pp. 163\u2013167 (2010)","DOI":"10.1109\/SECON.2010.5453896"},{"key":"5_CR13","unstructured":"ISO\/TS 22600-2. Health informatics - privilege management and access control (2006)"},{"key":"5_CR14","unstructured":"Kuhn, R., Ferraiolo, D., Sandhu, R.: The nist model for role-based access control: towards a unified standard. In: Proceedings of the Fifth ACM Workshop on Role-Based Access Control, pp. 47\u201363 (2000)"},{"key":"5_CR15","unstructured":"CEN\/ISO\u00a0EN 13606-4. Health informatics - electronic health record communication - security (2009)"},{"key":"5_CR16","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/507711.507724","volume-title":"Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, SACMAT 2002","author":"J.B.D. Joshi","year":"2002","unstructured":"Joshi, J.B.D., Bertino, E., Ghafoor, A.: Temporal hierarchies and inheritance semantics for gtrbac. In: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, SACMAT 2002, pp. 74\u201383. ACM, New York (2002)"},{"key":"5_CR17","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1109\/ACSAC.2009.12","volume-title":"Proceedings of the 2009 Annual Computer Security Applications Conference, ACSAC 2009","author":"A. Ferreira","year":"2009","unstructured":"Ferreira, A., Chadwick, D., Farinha, P., Correia, R., Zao, G., Chilro, R., Antunes, L.: How to securely break into rbac: The btg-rbac model. In: Proceedings of the 2009 Annual Computer Security Applications Conference, ACSAC 2009, pp. 23\u201331. IEEE Computer Society, Washington, DC (2009)"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Tacconi, C., Mellone, S., Chiari, L.: Smartphone-based applications for investigating falls and mobility. In: Proceedings of the International Conference on PervasiveHealth and Workshops 2011, pp. 258\u2013261 (2011)","DOI":"10.4108\/icst.pervasivehealth.2011.246060"},{"key":"5_CR19","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-642-30436-1_6","volume-title":"Information Security and Privacy Research","author":"A.B. Augusto","year":"2012","unstructured":"Augusto, A.B., Correia, M.E.: OFELIA \u2013 A Secure Mobile Attribute Aggregation Infrastructure for User-Centric Identity Management. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. IFIP AICT, vol.\u00a0376, pp. 61\u201374. Springer, Heidelberg (2012)"},{"issue":"2","key":"5_CR20","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1109\/TCE.2011.5955222","volume":"57","author":"H.-C. Huang","year":"2011","unstructured":"Huang, H.-C., Chang, F.-C., Fang, W.-C.: Reversible data hiding with histogram-based difference expansion for qr code applications. IEEE Transactions on Consumer Electronics\u00a057(2), 779\u2013787 (2011)","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"5_CR21","unstructured":"Saint-Andre, P., Kevin Smith, A., Remko Tronon, A.: XMPP: The Definitive Guide Building Real-Time Applications with Jabber Technologies. O\u2019Reilly Media, Inc. (2009)"},{"key":"5_CR22","unstructured":"Saint-Andre, P.: Xmpp: Core. RFC 3920, IETF (2004)"},{"key":"5_CR23","unstructured":"Paterson, I.: Xep-0206: Xmpp over bosh, http:\/\/bit.ly\/xep0206 (verified on February 14, 2012)"},{"key":"5_CR24","unstructured":"Augusto, A.B., Correia, M.E.: An xmpp messaging infrastructure for a mobile held security identity wallet of personal and private dynamic identity attributes. In: Proceedings of the XATA 2011 XML: Aplica\u00e7\u00f5es e Tecnologias Associadas (2011)"},{"key":"5_CR25","unstructured":"Poitner, M.: G&D Secure\u00a0Flash Solutions. Mobile security card, http:\/\/tinyurl.com\/SDMSC (verified on February 14, 2012)"},{"key":"5_CR26","unstructured":"Maia, L., Correia, M.E.: Java jca\/jce programming in android with sd smart cards. In: 7 a Conferenc\u00eda Ib\u00e9rica de Sistemas y Tecnolog\u00edas de Informaci\u00f3ns (CISTI 2012), Madrid\/ Spain (2012)"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Bakar, A., Ahmad, A.R., Ismail, R., Manan, J.-L.A.: Trust formation based on subjective logic and pgp web-of-trust for information sharing in mobile ad hoc networks. In: SocialCom 2010, pp. 1004\u20131009 (2010)","DOI":"10.1109\/SocialCom.2010.149"},{"key":"5_CR28","doi-asserted-by":"crossref","unstructured":"Santos, R., Correia, M.E., Antunes, L.: Use of a government issued digital identification card to secure interoperable health information systems. In: The 42nd International Carnahan Conference on Security Technology, ICCST 2008, pp. 1004\u20131009 (2008)","DOI":"10.1109\/CCST.2008.4751292"},{"key":"5_CR29","unstructured":"Eastlake, D.: Randomness recommendations for security, http:\/\/j.mp\/rrsrfc (verified on February 14, 2012)"}],"container-title":["Lecture Notes in Computer Science","Information Technology in Bio- and Medical Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32395-9_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T23:44:51Z","timestamp":1743983091000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32395-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642323942","9783642323959"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32395-9_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}