{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T05:24:43Z","timestamp":1749792283043,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T00:00:00Z","timestamp":1669075200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T00:00:00Z","timestamp":1669075200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,22]]},"DOI":"10.1109\/acit57182.2022.9994164","type":"proceedings-article","created":{"date-parts":[[2023,1,4]],"date-time":"2023-01-04T18:38:43Z","timestamp":1672857523000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["Secure E-health Framework in Cloud-Based Environment"],"prefix":"10.1109","author":[{"given":"Monther","family":"Tarawneh","sequence":"first","affiliation":[{"name":"Isra University,Computer Science department,Amman,jordan"}]},{"given":"Faisal","family":"AlZyoud","sequence":"additional","affiliation":[{"name":"Isra University,Computer Science department,Amman,jordan"}]},{"given":"Yousef","family":"Sharrab","sequence":"additional","affiliation":[{"name":"Isra University,Computer Science department,Amman,jordan"}]},{"given":"Hassan","family":"Kanaker","sequence":"additional","affiliation":[{"name":"Isra University,Cyber security Department,Amman,jordan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-6736(20)30154-9"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-6736(20)30183-5"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijsu.2020.04.018"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3557504"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/5337733"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-022-01015-1"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-020-00195-y"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICBSII49132.2020.9167660"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/app11199005"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/s22051911"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/s22051911"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-021-26040-1"},{"issue":"1","key":"ref13","doi-asserted-by":"crossref","DOI":"10.34768\/amcs-2022-0011","article-title":"Hybrid cryptography with a one-time stamp to secure contact tracing for COVID-19 infection","volume":"32","author":"El-Douh","year":"2022","journal-title":"International Journal of Applied Mathematics and Computer Science"},{"issue":"5","key":"ref14","first-page":"6355","article-title":"Smart devices using internet of things for health monitoring","volume":"7","author":"Soni","year":"2018","journal-title":"International Journal of Innovative Research in Science, Engineering and Technology"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICECA.2018.8474628"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2020.0110126"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21380-4_123"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.14326\/abe.7.88"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.18494\/sam.2013.907"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/W-FiCloud.2016.24"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.7883\/yoken.JJID.2020.061"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3684"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/5931315"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICEPE.2014.6969965"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICICCT.2018.8472957"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ITAB.2003.1222486"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2004.838474"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1177\/1932296818768618"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103164"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICRAIE.2014.6909265"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2647619"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12839-5_41"},{"journal-title":"Health Monitoring Using Smart Home and Active Assisted Living (AAL) Technologies: A Scoping","author":"Sahu","key":"ref33"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2021.102717"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.imu.2021.100588"}],"event":{"name":"2022 International Arab Conference on Information Technology (ACIT)","start":{"date-parts":[[2022,11,22]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2022,11,24]]}},"container-title":["2022 International Arab Conference on Information Technology (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9994070\/9994081\/09994164.pdf?arnumber=9994164","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,11]],"date-time":"2024-10-11T17:05:38Z","timestamp":1728666338000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9994164\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,22]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/acit57182.2022.9994164","relation":{},"subject":[],"published":{"date-parts":[[2022,11,22]]}}}