{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T13:32:38Z","timestamp":1778592758881,"version":"3.51.4"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,2]]},"DOI":"10.1109\/bhi.2016.7455821","type":"proceedings-article","created":{"date-parts":[[2016,5,4]],"date-time":"2016-05-04T20:42:44Z","timestamp":1462394564000},"page":"5-8","source":"Crossref","is-referenced-by-count":42,"title":["Data security and privacy management in healthcare applications and clinical data warehouse environment"],"prefix":"10.1109","author":[{"given":"Mamta","family":"Puppala","sequence":"first","affiliation":[]},{"given":"Tiancheng","family":"He","sequence":"additional","affiliation":[]},{"given":"Xiaohui","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Shenyi","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Ogunti","sequence":"additional","affiliation":[]},{"given":"Stephen T. C.","family":"Wong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1940761.1940811"},{"key":"ref11","article-title":"Database state","author":"anderson","year":"2009","journal-title":"Joseph Rowntree Reform Trust York"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2015.2450181"},{"key":"ref13","year":"2012"},{"key":"ref14","article-title":"Transparent Data Encryption&#x2013;Solution for Security of Database Contents","author":"deshmukh","year":"2013","journal-title":"ar Xiv preprint arXiv 1303 0418"},{"key":"ref15","first-page":"143","article-title":"Privacy and Security in Mobile Health (mHealth) Research","volume":"36","author":"arora","year":"2015","journal-title":"Alcohol Res Current Rev"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IWSSIP.2008.4604366"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772866"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2010.10.001"},{"key":"ref6","first-page":"141","article-title":"Building a smarter health and wellness future: Privacy and security challenges","author":"gunter","year":"2013","journal-title":"ICTs and the Health Sector Towards Smarter Health and Wellness Models"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2012.12.003"},{"key":"ref8","year":"0"},{"key":"ref7","first-page":"166","article-title":"Privacy and freedom","volume":"25","author":"westin","year":"1968","journal-title":"Washington and Lee Law Rev"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-009-9276-7"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/01947640701732148"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.05.007"}],"event":{"name":"2016 IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI)","location":"Las Vegas, NV, USA","start":{"date-parts":[[2016,2,24]]},"end":{"date-parts":[[2016,2,27]]}},"container-title":["2016 IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI)"],"original-title":[],"deposited":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T23:47:57Z","timestamp":1475192877000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7455821\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/bhi.2016.7455821","relation":{},"subject":[],"published":{"date-parts":[[2016,2]]}}}