{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T17:50:48Z","timestamp":1767117048112},"reference-count":36,"publisher":"Informa UK Limited","issue":"2","funder":[{"name":"European Regional Development Fund (FEDER)"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Privacy and Security"],"published-print":{"date-parts":[[2017,4,3]]},"DOI":"10.1080\/15536548.2017.1322415","type":"journal-article","created":{"date-parts":[[2017,7,18]],"date-time":"2017-07-18T11:12:14Z","timestamp":1500376334000},"page":"51-68","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["Handling confidentiality and privacy on cloud-based health information systems"],"prefix":"10.1080","volume":"13","author":[{"given":"Carlos","family":"Serr\u00e3o","sequence":"first","affiliation":[{"name":"Department of Information Science and Technology (ISTAR-IUL), Instituto Universit\u00e1rio de Lisboa (ISCTE-IUL), Lisboa, Portugal"}]},{"given":"Elsa","family":"Cardoso","sequence":"additional","affiliation":[{"name":"Department of Information Science and Technology, INESC-ID, Instituto Universit\u00e1rio de Lisboa (ISCTE-IUL), Lisboa, Portugal"}]}],"member":"301","published-online":{"date-parts":[[2017,7,18]]},"reference":[{"key":"CIT0001","volume-title":"Marlin Architecture Overview. Marlin Developer Community","author":"Marlin","year":"2006"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2014.2300846"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.3390\/fi4030621"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-2801-4"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2008.09.001"},{"key":"CIT0006","doi-asserted-by":"crossref","first-page":"W5","DOI":"10.1377\/hlthaff.W5.19","volume":"24","author":"Brailer D. J.","year":"2005","journal-title":"Health Affairs"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2010.09.001"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.273084"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.08.004"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2010.05.003"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19228-9_4"},{"key":"CIT0012","volume-title":"Project dream: an architectural overview","author":"Fernando G.","year":"2005"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2009.08.006"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2014.09.005"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2005.08.002"},{"issue":"1","key":"CIT0016","first-page":"15","volume":"2","author":"Ikuomola A. J.","year":"2014","journal-title":"International Journal of Computer Networks and Communications Security"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2015.2"},{"key":"CIT0019","volume-title":"Invisible Ink: Blockchain for data privacy","author":"Lazarovich A.","year":"2015"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.97"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23068"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.14236\/jhi.v22i2.159"},{"issue":"31","key":"CIT0024","first-page":"22","volume":"35","author":"Meyer J.","year":"2005","journal-title":"Modern Healthcare"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2015.36"},{"key":"CIT0026","doi-asserted-by":"crossref","DOI":"10.4316\/AECE.2011.01007","volume-title":"A generalized DRM architectural framework","author":"Patriciu V. V.","year":"2011"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.2494"},{"key":"CIT0031","first-page":"1","volume":"3","author":"Serr\u00e3o C.","year":"2005","journal-title":"IADIS International Journal on Internet\/WWW"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2005.04.005"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.04.001"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2010.08.001"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2013.12.011"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.09.011"},{"key":"CIT0041","volume-title":"SSL & TLS Essentials: Securing the Web (Pap\/Cdr)","author":"Thomas S.","year":"2000"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1007\/11915034_55"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2008.38"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2014.2309951"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2314119"}],"container-title":["Journal of Information Privacy and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/15536548.2017.1322415","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,30]],"date-time":"2019-09-30T15:58:45Z","timestamp":1569859125000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/15536548.2017.1322415"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,3]]},"references-count":36,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2017,7,18]]},"published-print":{"date-parts":[[2017,4,3]]}},"alternative-id":["10.1080\/15536548.2017.1322415"],"URL":"https:\/\/doi.org\/10.1080\/15536548.2017.1322415","relation":{},"ISSN":["1553-6548","2333-696X"],"issn-type":[{"value":"1553-6548","type":"print"},{"value":"2333-696X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,3]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uips20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uips20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}