{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,3]],"date-time":"2025-10-03T08:46:22Z","timestamp":1759481182218,"version":"3.28.0"},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1109\/gcwkshps52748.2021.9681967","type":"proceedings-article","created":{"date-parts":[[2022,1,24]],"date-time":"2022-01-24T16:06:05Z","timestamp":1643040365000},"page":"1-6","source":"Crossref","is-referenced-by-count":7,"title":["Exploring a New Security Framework for Future Healthcare Systems"],"prefix":"10.1109","author":[{"given":"Nattaruedee","family":"Vithanwattana","sequence":"first","affiliation":[]},{"given":"Gayathri","family":"Karthick","sequence":"additional","affiliation":[]},{"given":"Glenford","family":"Mapp","sequence":"additional","affiliation":[]},{"given":"Carlisle","family":"George","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Distributed Ledger Technology and Cyber Security &#x2013; Improving information security in the financial sector [online]","year":"2017","key":"ref39"},{"key":"ref38","article-title":"Securing eHealth and mHealth: moving from frameworks to prototypes","author":"mithchell","year":"2019","journal-title":"Presented at the Health IT Workshop"},{"journal-title":"Developing Network Security Strategies [online]","year":"2010","key":"ref33"},{"key":"ref32","article-title":"Securing eHealth and mHealth: moving from frameworks to prototypes","author":"mapp","year":"2019","journal-title":"Presented at the Health IT Workshop"},{"key":"ref31","first-page":"11","article-title":"Exploring a New Security Framework for Remote Patient Monitoring Devices","volume":"6","author":"ondiege","year":"2017","journal-title":"Journal of Computers"},{"article-title":"What is IPv6, and why aren&#x2019;t we there yet?","year":"2020","author":"shaw","key":"ref30"},{"journal-title":"The blockchain is now being hyped as the solution to all inefficient information processing systems [online]","year":"2016","author":"korolov","key":"ref37"},{"journal-title":"TayloyWessing (N\/A) How secure is blockchain?","year":"0","key":"ref36"},{"journal-title":"The Simple Lightweight Transport Protocol (SLTP) for Low Latency Environments [online]","year":"2017","author":"mapp","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/IoTSMS.2018.8554836"},{"key":"ref10","first-page":"1","author":"mitchell","year":"2019","journal-title":"Quality Audits with Blockchain for Healthcare in the UK and Computer Networks (SoftCOM)"},{"journal-title":"The Secure Blockchain is Bitcoin&#x2019;s Biggest Asset","year":"2015","author":"pair","key":"ref40"},{"journal-title":"Security Controls for Blockchain Applications","year":"2019","author":"julisch","key":"ref11"},{"key":"ref12","first-page":"3327248","article-title":"Blockchain: Security and Confidentiality. Forthcoming, Revue de la Gendarmerie Nationale","author":"hilary","year":"2019","journal-title":"Georgetown McDonough School of Business Research Paper"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.21236\/ADA612733"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.5381\/jot.2004.3.1.c6"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s40860-017-0038-x"},{"key":"ref16","first-page":"67","article-title":"C-RBAC: contextual role-based access control model","volume":"2","author":"tahir","year":"2007","journal-title":"Ubiquitous Computing and Communication Journal"},{"key":"ref17","first-page":"93","article-title":"Implementing Role-Based Access Control Using Object Technology","author":"barkley","year":"1995","journal-title":"Proc First ACM Workshop Role-Based Access Control (RBAC '96)"},{"journal-title":"NHS Digital (N\/A) Transparency notice how we use your personal data","year":"0","key":"ref18"},{"journal-title":"Summary of the HIPAA Privacy Rule","year":"2013","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/365230.365252"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.12.006"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199695591.001.0001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSACW.2010.74"},{"key":"ref6","article-title":"A Security Framework to Protect Data in Cloud Storage","author":"yayah","year":"2017","journal-title":"PhD thesis"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/fi6010001"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13136-3_26"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.23919\/SOFTCOM.2017.8115590"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-07835-3"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.02.018"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.2196\/16748"},{"key":"ref1","first-page":"229","article-title":"Wearable Devices in Healthcare 4.0: Effects, Trends and Challenges","author":"sridhar","year":"2020","journal-title":"International Conference on IoT Based Control Networks and Intelligent Systems (ICICNIS 2020)"},{"journal-title":"Ransomware attacks on healthcare [online]","year":"2021","author":"aver","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-8335-3_24"},{"journal-title":"Center for Internet Security (N\/A) Ransomware In the Healthcare Sector","year":"0","key":"ref21"},{"journal-title":"Introduction to the RPC API [online]","year":"1997","key":"ref42"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2014.69"},{"journal-title":"The Sun Technology Papers","year":"2013","author":"hall","key":"ref41"},{"key":"ref23","first-page":"297","article-title":"DoS\/DDoS Detection for E-Healthcare in Internet of Things","volume":"2","author":"sami","year":"2018","journal-title":"International Journal of Advanced Computer Science and Applications"},{"journal-title":"Security Standards Technical Safeguards [online]","year":"2007","key":"ref26"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.1867"},{"journal-title":"Encryption Frequently Asked Questions [online]","year":"2016","author":"jaikaran","key":"ref25"}],"event":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","start":{"date-parts":[[2021,12,7]]},"location":"Madrid, Spain","end":{"date-parts":[[2021,12,11]]}},"container-title":["2021 IEEE Globecom Workshops (GC Wkshps)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9681915\/9681831\/09681967.pdf?arnumber=9681967","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:57:53Z","timestamp":1652187473000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9681967\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/gcwkshps52748.2021.9681967","relation":{},"subject":[],"published":{"date-parts":[[2021,12]]}}}