{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T00:01:15Z","timestamp":1755993675624,"version":"3.44.0"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2012,6,1]],"date-time":"2012-06-01T00:00:00Z","timestamp":1338508800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2012,6,1]],"date-time":"2012-06-01T00:00:00Z","timestamp":1338508800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/cbms.2012.6266403","type":"proceedings-article","created":{"date-parts":[[2012,9,7]],"date-time":"2012-09-07T15:57:35Z","timestamp":1347033455000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["\u201c3D Cloud\u201d in Life Sciences: An innovative framework for remote 2D\/3D visualization and collaboration"],"prefix":"10.1109","author":[{"given":"Livia","family":"Torterolo","sequence":"first","affiliation":[{"name":"Nice Srl, Italy"}]},{"given":"Gianluca","family":"Papaleo","sequence":"additional","affiliation":[{"name":"IEIIT-CNR, National Research Council, Genoa, Italy"}]},{"given":"Silvia","family":"Scaglione","sequence":"additional","affiliation":[{"name":"IEIIT-CNR, National Research Council, Genoa, Italy"}]},{"given":"Francesco","family":"Ruffino","sequence":"additional","affiliation":[{"name":"Nice Srl, Italy"}]},{"given":"Maurizio","family":"Aiello","sequence":"additional","affiliation":[{"name":"IEIIT-CNR, National Research Council, Genoa, Italy"}]}],"member":"263","reference":[{"key":"15","article-title":"A Case Study in Access Control Requirements for a Health Information System","author":"evered","year":"0","journal-title":"Australasian Information Security Workshop 2004"},{"journal-title":"A Classical Introduction to Cryptography Applications for Communications Security","year":"2006","author":"vaudenay","key":"16"},{"journal-title":"Networking Health Prescriptions for the Internet","year":"2000","key":"13"},{"journal-title":"Role based access control","year":"0","key":"14"},{"year":"0","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2006.260060"},{"journal-title":"Cn3D","year":"0","key":"3"},{"journal-title":"DINO","year":"0","key":"2"},{"journal-title":"UCSF Chimera","year":"0","key":"1"},{"year":"0","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2010.033791"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1038\/nrg2857"},{"journal-title":"EnginFrame","year":"0","key":"5"},{"journal-title":"Discovery Studio","year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/GCE.2008.4738445"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/I-SPAN.2009.150"}],"event":{"name":"2012 25th IEEE International Symposium on Computer-Based Medical Systems (CBMS)","start":{"date-parts":[[2012,6,20]]},"location":"Rome, Italy","end":{"date-parts":[[2012,6,22]]}},"container-title":["2012 25th IEEE International Symposium on Computer-Based Medical Systems (CBMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6255878\/6266284\/06266403.pdf?arnumber=6266403","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:14:34Z","timestamp":1755908074000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6266403\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/cbms.2012.6266403","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}