{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T12:15:52Z","timestamp":1775564152945,"version":"3.50.1"},"reference-count":16,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T00:00:00Z","timestamp":1772841600000},"content-version":"vor","delay-in-days":65,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1016\/j.procs.2026.03.121","type":"journal-article","created":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T12:39:40Z","timestamp":1774355980000},"page":"1366-1373","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["LINDDUN based Threat Modeling of a Healthcare Distributed Ledger Platform"],"prefix":"10.1016","volume":"278","author":[{"given":"Daniela","family":"Dinis","sequence":"first","affiliation":[]},{"given":"Jo\u00e3o","family":"Oliveira","sequence":"additional","affiliation":[]},{"given":"Marisa","family":"Maximiano","sequence":"additional","affiliation":[]},{"given":"Ricardo","family":"Gomes","sequence":"additional","affiliation":[]},{"given":"V\u00edtor","family":"T\u00e1vora","sequence":"additional","affiliation":[]},{"given":"Manuel","family":"Dias","sequence":"additional","affiliation":[]},{"given":"Ricardo Correia","family":"Bezerra","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.procs.2026.03.121_bib1","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1038\/s41431-023-01471-0","article-title":"\u201cSpecific measures for data-intensive health research without consent: a systematic review of soft law instruments and academic literature,\u201d","volume":"32","author":"Smit","year":"2024","journal-title":"Eur. J. Hum. Genet."},{"key":"10.1016\/j.procs.2026.03.121_bib2","doi-asserted-by":"crossref","first-page":"5629","DOI":"10.1109\/ACCESS.2023.3236505","article-title":"\u201cBlockchain for Healthcare Management Systems: A Survey on Interoperability and Security,\u201d","volume":"11","author":"Villarreal","year":"2023","journal-title":"IEEE Access"},{"key":"10.1016\/j.procs.2026.03.121_bib3","unstructured":"\u201cHealth Level Seven International,\u201d \u201cIntroducing HL7 FHIR,\u201d 2024. Available: https:\/\/www.hl7.org\/fhir\/summary.html. [Accessed: Jul. 16, 2024]"},{"key":"10.1016\/j.procs.2026.03.121_bib4","unstructured":"LINDDUN, \u201clinddun.org | Privacy Engineering.\u201d Available: https:\/\/linddun.org\/. [Accessed: Jul. 02, 2025]"},{"key":"10.1016\/j.procs.2026.03.121_bib5","unstructured":"OWASP Foundation, \u201cOWASP Threat Dragon | OWASP Foundation.\u201d Available: https:\/\/owasp.org\/www-project-threat-dragon\/. [Accessed: Jul. 02, 2025]"},{"key":"10.1016\/j.procs.2026.03.121_bib6","unstructured":"A. Shostack, Threat modeling: designing for security. Indianapolis, IN: Wiley, 2014."},{"key":"10.1016\/j.procs.2026.03.121_bib7","doi-asserted-by":"crossref","unstructured":"R. Khan, K. McLaughlin, D. Laverty, and S. Sezer, \u201cSTRIDE-based threat modeling for cyber-physical systems,\u201d in 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe), Sep. 2017, pp. 1\u20136. doi: 10.1109\/ISGTEurope.2017.8260283. Available: https:\/\/ieeexplore.ieee.org\/abstract\/document\/8260283. [Accessed: Mar. 17, 2025]","DOI":"10.1109\/ISGTEurope.2017.8260283"},{"key":"10.1016\/j.procs.2026.03.121_bib8","doi-asserted-by":"crossref","unstructured":"L. O. Nweke, M. Abomhara, S. Y. Yayilgan, D. Comparin, O. Heurtier, and C. Bunney, \u201cA LINDDUN-Based Privacy Threat Modelling for National Identification Systems,\u201d in 2022 IEEE Nigeria 4th International Conference on Disruptive Technologies for Sustainable Development (NIGERCON), Apr. 2022, pp. 1\u20138. doi: 10.1109\/NIGERCON54645.2022.9803177. Available: https:\/\/ieeexplore.ieee.org\/abstract\/document\/9803177. [Accessed: Mar. 19, 2025]","DOI":"10.1109\/NIGERCON54645.2022.9803177"},{"key":"10.1016\/j.procs.2026.03.121_bib9","unstructured":"European Parliament and of the Council, Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation). 2016. Available: https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj\/eng. [Accessed: Mar. 19, 2025]"},{"key":"10.1016\/j.procs.2026.03.121_bib10","doi-asserted-by":"crossref","unstructured":"K. Trunner et al., \u201cThe development of new Electronic Health Record Exchange Format Use Cases - an evaluating perspective,\u201d Eur. J. Public Health, vol. 32, no. Supplement_3, p. ckac131.171, Oct. 2022, doi: 10.1093\/eurpub\/ckac131.171. Available: https:\/\/doi.org\/10.1093\/eurpub\/ckac131.171. [Accessed: Mar. 19, 2025]","DOI":"10.1093\/eurpub\/ckac131.171"},{"key":"10.1016\/j.procs.2026.03.121_bib11","doi-asserted-by":"crossref","first-page":"44929","DOI":"10.1109\/ACCESS.2024.3381034","article-title":"\u201cAnonymization and Pseudonymization of FHIR Resources for Secondary Use of Healthcare Data,\u201d","volume":"12","author":"Raso","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.procs.2026.03.121_bib12","doi-asserted-by":"crossref","first-page":"103529","DOI":"10.1016\/j.jnca.2022.103529","article-title":"\u201cReview of healthcare industry 4.0 application-based blockchain in terms of security and privacy development attributes: Comprehensive taxonomy, open issues and challenges and recommended solution,\u201d","volume":"209","author":"Qahtan","year":"2023","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.procs.2026.03.121_bib13","unstructured":"H. Tawfik, H. Alshamrani, A. M. Alghamdi, and M. Alshammari, \u201cPriCollabAnalysis: privacy-preserving healthcare collaborative analysis on blockchain using homomorphic encryption and secure multiparty computation,\u201d Cluster Computing, 2025. doi: 10.1007\/s10586-024-04928-z. Available: https:\/\/link.springer.com\/article\/10.1007\/s10586-024-04928-z. [Accessed: Sep. 18, 2025]"},{"issue":"32","key":"10.1016\/j.procs.2026.03.121_bib14","first-page":"1","article-title":"\u201cBeyond Conventional Threat Defense: Implementing Advanced Threat Modeling Techniques, Risk Modeling Frameworks and Contingency Planning in the Healthcare Sector for Enhanced Data Security,\u201d","volume":"187","author":"Salami","year":"2024","journal-title":"International Journal of Computer Applications"},{"key":"10.1016\/j.procs.2026.03.121_bib15","unstructured":"H. Khan, L. Menten, and L. M. Peeters, \u201cAn Algorithmic Pipeline for GDPR-Compliant Healthcare Data Anonymisation: Moving Toward Standardisation,\u201d arXiv preprint, arXiv:2506.02942, 2025. Available: https:\/\/arxiv.org\/abs\/2506.02942. [Accessed: Sep. 18, 2025]"},{"issue":"3","key":"10.1016\/j.procs.2026.03.121_bib16","first-page":"100","article-title":"\u201cChallenges and Opportunities of Distributed Ledger Technologies for Consent Management\u2013A Review,\u201d","volume":"5","author":"Zhang","year":"2024","journal-title":"Blockchain: Research and Applications"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926007167?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926007167?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T11:37:02Z","timestamp":1775561822000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050926007167"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":16,"alternative-id":["S1877050926007167"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2026.03.121","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"LINDDUN based Threat Modeling of a Healthcare Distributed Ledger Platform","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2026.03.121","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}