{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T15:32:48Z","timestamp":1771515168178,"version":"3.50.1"},"reference-count":35,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2001,6,1]],"date-time":"2001-06-01T00:00:00Z","timestamp":991353600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2001,6,1]],"date-time":"2001-06-01T00:00:00Z","timestamp":991353600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"}],"content-domain":{"domain":["clinicalkey.com","clinicalkey.com.au","clinicalkey.es","clinicalkey.fr","clinicalkey.jp","elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Medical Informatics"],"published-print":{"date-parts":[[2001,6]]},"DOI":"10.1016\/s1386-5056(01)00147-2","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T17:54:34Z","timestamp":1027619674000},"page":"51-78","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":33,"title":["A systematic approach for analysis and design of secure health information systems"],"prefix":"10.1016","volume":"62","author":[{"given":"Bernd","family":"Blobel","sequence":"first","affiliation":[]},{"given":"Francis","family":"Roger-France","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1386-5056(01)00147-2_BIB1","first-page":"53","article-title":"Legal issues in medical informatics: a bird's eye view","volume":"27","author":"Laske","year":"1995"},{"key":"10.1016\/S1386-5056(01)00147-2_BIB2","series-title":"UML Toolkit","author":"Eriksson","year":"1998"},{"issue":"3","key":"10.1016\/S1386-5056(01)00147-2_BIB3","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1016\/S1386-5056(00)00104-0","article-title":"Application of the component paradigm for analysis and design of advanced health system architectures","volume":"60","author":"Blobel","year":"2000","journal-title":"Int. J. Med. Informat."},{"issue":"1\u20133","key":"10.1016\/S1386-5056(01)00147-2_BIB4","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/S1386-5056(98)00122-1","article-title":"CORBA security services for health information systems","volume":"52","author":"Blobel","year":"1998","journal-title":"Int. J. Med. Informat."},{"key":"10.1016\/S1386-5056(01)00147-2_BIB5","unstructured":"Council of Europe, Infosec Business Advisory Group. The IBAG Framework for Commercial IT Security, V2.0, Frankfurt, 1993."},{"key":"10.1016\/S1386-5056(01)00147-2_BIB6","unstructured":"B. Blobel, Clinical record systems in oncology. Experiences and developments on cancer registries in eastern Germany. In: Preproceedings of the International Workshop on Personal Information \u2014 Security, Engineering and Ethics\u2019, Cambridge, 21\u201322 June 1996, pp. 37\u201354."},{"key":"10.1016\/S1386-5056(01)00147-2_BIB7","series-title":"Personal Medical Information \u2014 Security, Engineering, and Ethics","first-page":"39","year":"1997"},{"key":"10.1016\/S1386-5056(01)00147-2_BIB8","unstructured":"B. Blobel, G. Bleumer, A. M\u00fcller, K. Louwerse, E. Flikkenschild, F. Ottes, Current Security Issues Faced by Health Care Establishments. ISHTAR Project HC 1028, Deliverable 09 (Final), February 1997."},{"key":"10.1016\/S1386-5056(01)00147-2_BIB9","volume":"66","year":"2001"},{"key":"10.1016\/S1386-5056(01)00147-2_BIB10","unstructured":"B. Blobel, V. Spiegel, R. Krohn, P. Pharow, K. Engel, Standard Guide for HL7 Communication Security. ISIS MEDSEC Project, Deliverable 30, August 1998, http:\/\/www.math.aegean.gr\/medsec\/d1.html."},{"key":"10.1016\/S1386-5056(01)00147-2_BIB11","unstructured":"B. Blobel, V. Spiegel, R. Krohn, P. Pharow, K. Engel, Standard Guide for Implementing EDI Communication Security. ISIS MEDSEC Project, Deliverable 31, August 1998, http:\/\/www.math.aegean.gr\/medsec\/d1.html."},{"key":"10.1016\/S1386-5056(01)00147-2_BIB12","unstructured":"CEN TC 251 prENV 13608, Health Informatics-Security for Healthcare Communications, 1999."},{"key":"10.1016\/S1386-5056(01)00147-2_BIB13","unstructured":"Council of Europe, Infosec Business Advisory Group. The IBAG Framework for Commercial IT Security, V2.0, Frankfurt, 1993."},{"key":"10.1016\/S1386-5056(01)00147-2_BIB14","unstructured":"European Communities, ITSEC: Information Technology Security Evaluation Criteria; (Provisional Harmonised Criteria, Version 1.2, 28 June 1991). Office for Official Publications of the European Communities, Luxembourg, 1991."},{"key":"10.1016\/S1386-5056(01)00147-2_BIB15","unstructured":"The SEISMED Consortium (Ed.), Data Security for Health Care, vols. 31\u201333 in the series of Studies in Health Technology and Informatics, IOS Press, Amsterdam, 1996."},{"key":"10.1016\/S1386-5056(01)00147-2_BIB16","unstructured":"OMG, The CORBA Security Specification. Framingham: Object Management Group, Inc., 1995, 1997."},{"key":"10.1016\/S1386-5056(01)00147-2_BIB17","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/S1386-5056(97)00058-0","article-title":"Comparing middleware concepts for advanced healthcare system architectures","volume":"46","author":"Blobel","year":"1997","journal-title":"Int. J. Med. Informat."},{"key":"10.1016\/S1386-5056(01)00147-2_BIB18","doi-asserted-by":"crossref","first-page":"S5","DOI":"10.1016\/S1386-5056(98)00025-2","article-title":"Patient data and the Internet-security issues. Chairpersons\u2019 introduction","volume":"49","author":"Blobel","year":"1998","journal-title":"Int. J. Med. Informat."},{"key":"10.1016\/S1386-5056(01)00147-2_BIB19","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/S1386-5056(98)00011-2","article-title":"Using trusted third parties for secure telemedical applications over the WWW: the EUROMED-ETS approach","volume":"49","author":"Katsikas","year":"1998","journal-title":"Int. J. Med. Informat."},{"key":"10.1016\/S1386-5056(01)00147-2_BIB20","first-page":"323","article-title":"Security infrastructure of an oncological network using health professional cards","volume":"49","author":"Blobel","year":"1997"},{"key":"10.1016\/S1386-5056(01)00147-2_BIB21","series-title":"Recent Advances in Signal Processing and Communications","first-page":"379","article-title":"Trusted third party services for Internet security","author":"Pharow","year":"1999"},{"key":"10.1016\/S1386-5056(01)00147-2_BIB22","unstructured":"The European TrustHealth project. http:\/\/www.ehto.be\/projects\/trusthealth."},{"key":"10.1016\/S1386-5056(01)00147-2_BIB23","unstructured":"CEN TC 251 prENV 13729, Health Informatics-Secure User Identification \u2014 Strong Authentication using Microprocessor Cards (SEC-ID\/CARDS), 1999."},{"key":"10.1016\/S1386-5056(01)00147-2_BIB24","series-title":"MEDINFO'98","first-page":"1119","article-title":"Results of European projects improving security of distributed health information systems","author":"Blobel","year":"1998"},{"key":"10.1016\/S1386-5056(01)00147-2_BIB25","unstructured":"B. Baum-Waidner, B. Blobel, F. Ottes, K. Louwerse, R. Krohn, G. Bleumer, Security requirements of a HIS-architecture. ISHTAR Project HC 1028, Deliverable 23 (Final), February 1998."},{"key":"10.1016\/S1386-5056(01)00147-2_BIB26","volume":"66","year":"2001"},{"key":"10.1016\/S1386-5056(01)00147-2_BIB27","series-title":"Object-Oriented Analysis and Design. With Applications","author":"Booch","year":"1994"},{"key":"10.1016\/S1386-5056(01)00147-2_BIB28","series-title":"Object-Oriented Software Engineering","author":"Jacobson","year":"1992"},{"key":"10.1016\/S1386-5056(01)00147-2_BIB29","series-title":"Object-Oriented Modeling and Design","author":"Rumbaugh","year":"1991"},{"key":"10.1016\/S1386-5056(01)00147-2_BIB30","unstructured":"B. Blobel, F. Roger-France, Healthcare Security View Based on the Security Services Concept. ISHTAR Project HC 1028, Deliverable, August 1998."},{"key":"10.1016\/S1386-5056(01)00147-2_BIB31","unstructured":"Council of Europe, Directive 95\/46\/EC, On the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of such Data (OJ L281\/31\u201350, 24 October 1995), Strasbourg, 1995."},{"key":"10.1016\/S1386-5056(01)00147-2_BIB32","first-page":"S23","article-title":"Modelling for design and implementation of secure health information systems","volume":"43","author":"Blobel","year":"1996","journal-title":"Int. J. Bio-Med. Computing"},{"key":"10.1016\/S1386-5056(01)00147-2_BIB33","first-page":"153","article-title":"A life-cycle based authorisation expert database system","volume":"1620","author":"O","year":"1999"},{"key":"10.1016\/S1386-5056(01)00147-2_BIB34","unstructured":"CEN TC 251 prENV 13606, Health Informatics \u2014 Electronic Healthcare Record Communication."},{"key":"10.1016\/S1386-5056(01)00147-2_BIB35","series-title":"Database Security","author":"Castano","year":"1995"}],"container-title":["International Journal of Medical Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1386505601001472?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1386505601001472?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T02:50:40Z","timestamp":1761360640000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1386505601001472"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001,6]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2001,6]]}},"alternative-id":["S1386505601001472"],"URL":"https:\/\/doi.org\/10.1016\/s1386-5056(01)00147-2","relation":{},"ISSN":["1386-5056"],"issn-type":[{"value":"1386-5056","type":"print"}],"subject":[],"published":{"date-parts":[[2001,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A systematic approach for analysis and design of secure health information systems","name":"articletitle","label":"Article Title"},{"value":"International Journal of Medical Informatics","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/S1386-5056(01)00147-2","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"converted-article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2001 Elsevier Science Ireland Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}