{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T13:06:37Z","timestamp":1768741597209,"version":"3.49.0"},"reference-count":41,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,1]]},"DOI":"10.1109\/comsnets.2011.5716518","type":"proceedings-article","created":{"date-parts":[[2011,2,18]],"date-time":"2011-02-18T14:10:46Z","timestamp":1298038246000},"page":"1-6","source":"Crossref","is-referenced-by-count":67,"title":["A threat taxonomy for mHealth privacy"],"prefix":"10.1109","author":[{"given":"D","family":"Kotz","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409959"},{"key":"ref38","first-page":"2745","article-title":"On inferring application protocol behaviors in encrypted network traffic","volume":"7","author":"wright","year":"2006","journal-title":"Journal of Machine Learning Research"},{"key":"ref33","article-title":"Role based access control","author":"ferraiolo","year":"1992","journal-title":"Proc National Computer Security Conference NIST"},{"key":"ref32","article-title":"TP-30: HITSP manage consent directives transaction package","year":"2008","journal-title":"Healthcare Information Technology Standards Panel"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/359205.359241"},{"key":"ref30","year":"2009","journal-title":"HIPAA website"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1504\/IJEH.2007.015320"},{"key":"ref36","year":"2009","journal-title":"IHE profiles IHE International"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2003.816562"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74835-9_6"},{"key":"ref10","year":"2008","journal-title":"Google health"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287866"},{"key":"ref11","year":"2008","journal-title":"Microsoft HealthVault-web-based PHR Microsoft"},{"key":"ref12","article-title":"Medical identity theft: The information crime that can kill you","author":"dixon","year":"2006","journal-title":"The World Privacy Forum"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-03549-4_5","article-title":"Data hemorrhages in the health-care sector","author":"johnson","year":"2009","journal-title":"Financial Cryptography and Data Security"},{"key":"ref14","first-page":"524","article-title":"Re-identification of familial database records","author":"malin","year":"2006","journal-title":"AMIA Annual Symposium Proceedings AMIA Symposium"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-77322-3_10"},{"key":"ref16","article-title":"Information security and privacy in healthcare: Current state of research","author":"appari","year":"2008","journal-title":"Proc Workshop on Information Security and Privacy (WISP)"},{"key":"ref17","article-title":"Health care organizations see cyberattacks as growing threat","author":"messmer","year":"2008","journal-title":"Network World"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1409635.1409663"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MPRV.2008.16","article-title":"Security and privacy for implantable medical devices","volume":"7","author":"thomas","year":"2008","journal-title":"IEEE Pervasive Computing"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1409635.1409660"},{"key":"ref4","year":"2008","journal-title":"Digital Home project at Intel Intel Research"},{"key":"ref27","article-title":"NHS trust uncovers password sharing risk to patient data","author":"collins","year":"2006","journal-title":"Computer Weekly"},{"key":"ref3","year":"2008","journal-title":"Smart Home project Center for Future Health Univ Rochester"},{"key":"ref6","year":"2009","journal-title":"Dailystrength org Daily Strength"},{"key":"ref29","first-page":"296","article-title":"secFleck: A public key technology platform for wireless sensor networks","author":"hu","year":"2009","journal-title":"Proc 5th European Conference on Wireless Sensor Networks (EWSN)"},{"key":"ref5","first-page":"380","article-title":"A compact, high-speed, wearable sensor network for biomotion capture and interactive media","author":"aylward","year":"2007","journal-title":"Proc International Workshop on Information Processing in Sensor Networks (IPSN) ACM Press"},{"key":"ref8","article-title":"Privacy and confidentiality in the nationwide health information network","author":"cohn","year":"2006","journal-title":"National Committee on Vital and Health Statistics"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2006.260060"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2006.384805"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1655084.1655086"},{"key":"ref1","article-title":"mHealth for development: The opportunity of mobile technology for healthcare in the developing world","year":"2009","journal-title":"United Nations Foundation and Vodafone Foundation Technology Partnership Vital Wave Consulting"},{"key":"ref20","article-title":"The feds and PHR privacy","author":"moore","year":"2009","journal-title":"Government Health IT"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2003.1240399"},{"key":"ref21","article-title":"On usable authentication for wireless body area networks","author":"cornelius","year":"2010","journal-title":"Proceedings of the USENIX Workshop on Health Security (HealthSec)"},{"key":"ref24","article-title":"An introductory resource guide for implementing the Health Insurance Portability and Accountability Act (HIPAA) security rule","author":"scholl","year":"2008","journal-title":"Tech Rep 800&#x2013;66-Rev1"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653691"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1647314.1647378"},{"key":"ref26","year":"2009","journal-title":"Connecting for Health Systems and Services UK National Health Service"},{"key":"ref25","year":"2009","journal-title":"HITECH Act expands HIPAA privacy and security rules Coppersmith Gordon Schermer and Brockelman"}],"event":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","location":"Bangalore","start":{"date-parts":[[2011,1,4]]},"end":{"date-parts":[[2011,1,8]]}},"container-title":["2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5710820\/5716386\/05716518.pdf?arnumber=5716518","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T15:57:43Z","timestamp":1497887863000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5716518\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/comsnets.2011.5716518","relation":{},"subject":[],"published":{"date-parts":[[2011,1]]}}}