{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T18:37:21Z","timestamp":1767638241780,"version":"3.48.0"},"reference-count":25,"publisher":"Maximum Academic Press","issue":"3","license":[{"start":{"date-parts":[[2011,7,28]],"date-time":"2011-07-28T00:00:00Z","timestamp":1311811200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/www.cambridge.org\/core\/terms"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["The Knowledge Engineering Review"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>In this paper, we analyze the special security requirements for software support in health care and the HealthAgents system in particular. Our security solution consists of a link-anonymized data scheme, a secure data transportation service, a secure data sharing and collection service, and a more advanced access control mechanism. The novel security service architecture, as part of the integrated system architecture, provides a secure health-care infrastructure for HealthAgents and can be easily adapted for other health-care applications.<\/jats:p>","DOI":"10.1017\/s0269888911000117","type":"journal-article","created":{"date-parts":[[2011,7,28]],"date-time":"2011-07-28T06:20:12Z","timestamp":1311834012000},"page":"261-282","source":"Crossref","is-referenced-by-count":3,"title":["The design and implementation of a novel security model for HealthAgents"],"prefix":"10.48130","volume":"26","author":[{"given":"Liang","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Srinandan","family":"Dasmahapatra","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Lewis","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Andrew","family":"Peet","sequence":"additional","affiliation":[]},{"given":"Alex","family":"Gibb","sequence":"additional","affiliation":[]},{"given":"David","family":"Dupplaw","sequence":"additional","affiliation":[]},{"given":"Madalina","family":"Croitoru","sequence":"additional","affiliation":[]},{"given":"Francesc","family":"Estanyol","sequence":"additional","affiliation":[]},{"given":"Juan","family":"Mart\u00ednez-Miranda","sequence":"additional","affiliation":[]},{"given":"Horacio","family":"Gonz\u00e1lez-V\u00e9lez","sequence":"additional","affiliation":[]},{"given":"Mag\u00edlluch I","family":"Ariet","sequence":"additional","affiliation":[]}],"member":"27968","published-online":{"date-parts":[[2011,7,28]]},"reference":[{"key":"S0269888911000117_ref18","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"S0269888911000117_ref25","doi-asserted-by":"publisher","DOI":"10.1145\/507711.507731"},{"key":"S0269888911000117_ref15","unstructured":"NIST. 2006. Minimum Security Requirements for Federal Information and Information Systems. Technical report, National Institute of Standards and Technology. http:\/\/csrc.nist.gov\/publications\/fips\/fips200\/FIPS-200-final-march.pdf."},{"key":"S0269888911000117_ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1203228"},{"key":"S0269888911000117_ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ics.2005.03.326"},{"key":"S0269888911000117_ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2003.12.011"},{"key":"S0269888911000117_ref8","unstructured":"GMSC\/RCGP. 1988. GMSC and RCGP Guidelines for the Extraction and Use of Data from General Practitioner Computer Systems by Organisations External to the Practice. Technical report, GMSC\/RCGP Joint Computer Group."},{"key":"S0269888911000117_ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2007.06.001"},{"key":"S0269888911000117_ref5","unstructured":"CCRA. 2006. Common criteria for information technology security evaluation. URL: http:\/\/www.commoncriteriaportal.org\/."},{"key":"S0269888911000117_ref12","unstructured":"IEEE. 1996. IEEE Guide for Software Quality Assurance Planning."},{"key":"S0269888911000117_ref14","unstructured":"Kirn S. , Heine C. , Herrler R. , Krempels K.-H. 2003. Agent.Hospital\u2014agent-based open framework for clinical applications. IEEE International Workshops on Enabling Technologies, 36. doi\/10.1109\/ENABL.2003.1231379."},{"key":"S0269888911000117_ref4","unstructured":"Calam D. (n.d.) Information governance\u2014security, confidentiality and patient identifiable information. URL: http:\/\/etdevents.connectingforhealth.nhs.uk\/eventmanager\/uploads\/ig.ppt."},{"key":"S0269888911000117_ref2","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.322.7284.442"},{"key":"S0269888911000117_ref1","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.312.7023.109"},{"key":"S0269888911000117_ref11","first-page":"16","article-title":"Confidentiality of personal information: a patient survey","volume":"March","author":"Hawker","year":"1995","journal-title":"Journal of Informatics in Primary Care"},{"key":"S0269888911000117_ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2007.11.006"},{"volume-title":"Security in Computing","year":"2002","author":"Pfleeger","key":"S0269888911000117_ref16"},{"key":"S0269888911000117_ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S0959-8049(01)00350-1"},{"key":"S0269888911000117_ref24","unstructured":"Xiao L. , Peet A. , Lewis P. , Dashmapatra S. , Saez C. , Croitoru M. , Vicente J. , Gonz\u00e1lez-V\u00e9lez H. , Lluch i Ariet M. 2007. An adaptive security model for multi-agent systems and application to a clinical trials environment. In Computer Software and Applications Conference, 2007. COMPSAC 2007. 31st Annual International, 2, 261\u2013268."},{"key":"S0269888911000117_ref20","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000688"},{"key":"S0269888911000117_ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.02.002"},{"key":"S0269888911000117_ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-007-0085-8"},{"key":"S0269888911000117_ref17","doi-asserted-by":"crossref","unstructured":"Robertson D. 2004. A lightweight coordination calculus for agent systems. In Declarative Agent Languages and Technologies Lecture Notes in Computer Science 3476, 183\u2013197. Springer.","DOI":"10.1007\/11493402_11"},{"key":"S0269888911000117_ref23","doi-asserted-by":"crossref","unstructured":"Xiao L. , Lewis P. H. , Dasmahapatra S. 2008b. Secure interaction models for the HealthAgents system. In \u2018SAFECOMP\u2019, Springer, 167\u2013180.","DOI":"10.1007\/978-3-540-87698-4_16"},{"key":"S0269888911000117_ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368184"}],"container-title":["The Knowledge Engineering Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.cambridge.org\/core\/services\/aop-cambridge-core\/content\/view\/S0269888911000117","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T14:44:02Z","timestamp":1767624242000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.cambridge.org\/core\/product\/identifier\/S0269888911000117\/type\/journal_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7,28]]},"references-count":25,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2011,7,28]]}},"alternative-id":["S0269888911000117"],"URL":"https:\/\/doi.org\/10.1017\/s0269888911000117","relation":{},"ISSN":["0269-8889","1469-8005"],"issn-type":[{"type":"print","value":"0269-8889"},{"type":"electronic","value":"1469-8005"}],"subject":[],"published":{"date-parts":[[2011,7,28]]}}}