{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:23:00Z","timestamp":1761582180614,"version":"3.40.5"},"reference-count":37,"publisher":"Informa UK Limited","issue":"1","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2023,1,2]]},"DOI":"10.1080\/19393555.2022.2047839","type":"journal-article","created":{"date-parts":[[2022,3,17]],"date-time":"2022-03-17T11:06:52Z","timestamp":1647515212000},"page":"21-38","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":6,"title":["Implementing a secure remote patient monitoring system"],"prefix":"10.1080","volume":"32","author":[{"given":"Othmane","family":"Nait Hamoud","sequence":"first","affiliation":[{"name":"Laboratoire des M\u00e9thodes de Conception des Syst\u00e8mes, Ecole Nationale Sup\u00e9rieure d\u2019Informatique, Oued-Smar, Algiers, Algeria"},{"name":"Laboratoire S\u00e9curit\u00e9 Informatique, Ecole Militaire Polytechnique, Bordj El-Bahri, Algiers, Algeria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4240-2978","authenticated-orcid":false,"given":"Tayeb","family":"Kenaza","sequence":"additional","affiliation":[{"name":"Laboratoire S\u00e9curit\u00e9 Informatique, Ecole Militaire Polytechnique, Bordj El-Bahri, Algiers, Algeria"}]},{"given":"Yacine","family":"Challal","sequence":"additional","affiliation":[{"name":"Laboratoire des M\u00e9thodes de Conception des Syst\u00e8mes, Ecole Nationale Sup\u00e9rieure d\u2019Informatique, Oued-Smar, Algiers, Algeria"}]},{"given":"Lina","family":"Ben-Abdelatif","sequence":"additional","affiliation":[{"name":"D\u00e9partement Informatique, Universit\u00e9 M\u2019Hamed Bougara, Boumerd\u00e8s, Algeria"}]},{"given":"Maroua","family":"Ouaked","sequence":"additional","affiliation":[{"name":"D\u00e9partement Informatique, Universit\u00e9 M\u2019Hamed Bougara, Boumerd\u00e8s, Algeria"}]}],"member":"301","published-online":{"date-parts":[[2022,3,17]]},"reference":[{"key":"e_1_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2014.2300846"},{"key":"e_1_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"e_1_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4423"},{"key":"e_1_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2018.12.001"},{"key":"e_1_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/11556992_10"},{"key":"e_1_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2011.043666"},{"key":"e_1_3_3_8_1","volume-title":"Proceedings of the 3rd international conference on ehealth, telemedicine, and social medicine (e Telemed)","author":"Benzschawel S.","year":"2011","unstructured":"Benzschawel, S., & Da Silveira, M. (2011). Protecting patient privacy when sharing medical data. In Proceedings of the 3rd international conference on ehealth, telemedicine, and social medicine (e Telemed), France. Citeseer."},{"key":"e_1_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCITechn.2014.7073139"},{"key":"e_1_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.3.2.e22"},{"key":"e_1_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78440-1"},{"key":"e_1_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-019-1471-6"},{"key":"e_1_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2907298"},{"key":"e_1_3_3_14_1","first-page":"99","volume-title":"The Fourth International Conference on eHealth, Telemedicine, and Social Medicine, eTELEMED 2012","author":"Fan L.","year":"2012","unstructured":"Fan, L., Buchanan, W., Lo, O., Th\u00fcmmler, C., Lawson, A., Uthmani, O., Ekonomou, E., Khedim, A. S., & Sharif, T. (2012). SPoC: Protecting Patient Privacy for e-Health Services in the Cloud. The Fourth International Conference on eHealth, Telemedicine, and Social Medicine, eTELEMED 2012, January 30 - February 4, 2012, Valencia, Spain. Xpert Publishing Services. (pp.99\u2013104). http:\/\/researchrepository.napier.ac.uk\/id\/eprint\/4992"},{"key":"e_1_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1023787"},{"key":"e_1_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2110363.2110448"},{"issue":"1","key":"e_1_3_3_17_1","first-page":"1075","article-title":"Securing medical data using extended role based access control model and twofish algorithms on cloud platform","volume":"8","author":"Jayasankar T.","year":"2021","unstructured":"Jayasankar, T., Nagarajan, G. S. R., & Bhavadharini, R. M. (2021). Securing medical data using extended role based access control model and twofish algorithms on cloud platform. European Journal of Molecular Amp; Clinical Medicine, 8(1), 1075\u20131089. https:\/\/ejmcm.com\/article_6677.html","journal-title":"European Journal of Molecular Amp; Clinical Medicine"},{"key":"e_1_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45455-1_3"},{"key":"e_1_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.3390\/s120100055"},{"key":"e_1_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-017-0598-x"},{"key":"e_1_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud\/EdgeCom.2019.00022"},{"key":"e_1_3_3_23_1","volume-title":"IoT Use Cases and Implementations, chap. 12","author":"Monshizadeh M.","year":"2020","unstructured":"Monshizadeh, M., Khatri, V., Koskimies, O., & Honkanen, M. (2020). IoT Use Cases and Implementations, chap. 12. John Wiley Sons, Ltd. https:\/\/onlinelibrary.wiley.com\/doi\/abs\/10.1002\/9781119527978.ch12"},{"key":"e_1_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.5220\/0007841500840095"},{"issue":"9","key":"e_1_3_3_25_1","first-page":"556","article-title":"Wireless body area networks: Attacks and countermeasures","volume":"6","author":"Niksaz P.","year":"2015","unstructured":"Niksaz, P., & Branch, M. (2015). Wireless body area networks: Attacks and countermeasures. Ournal of Journal of Science Engineering Research, 6(9), 556\u2013568.","journal-title":"Ournal of Journal of Science Engineering Research"},{"key":"e_1_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.3390\/computers6010011"},{"key":"e_1_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2020.2973467"},{"key":"e_1_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3018793"},{"key":"e_1_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"key":"e_1_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7"},{"key":"e_1_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/937914"},{"key":"e_1_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-017-0720-9"},{"key":"e_1_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-015-0404-5"},{"key":"e_1_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.1900627"},{"key":"e_1_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3034307"},{"key":"e_1_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSPA48992.2020.9068699"},{"key":"e_1_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.817"},{"key":"e_1_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897871"},{"key":"e_1_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2016.070933"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393555.2022.2047839","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,16]],"date-time":"2023-12-16T12:45:10Z","timestamp":1702730710000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2022.2047839"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,17]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1,2]]}},"alternative-id":["10.1080\/19393555.2022.2047839"],"URL":"https:\/\/doi.org\/10.1080\/19393555.2022.2047839","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"type":"print","value":"1939-3555"},{"type":"electronic","value":"1939-3547"}],"subject":[],"published":{"date-parts":[[2022,3,17]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2022-03-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}