{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T21:03:24Z","timestamp":1745615004578,"version":"3.28.0"},"reference-count":47,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/healthcom.2013.6720705","type":"proceedings-article","created":{"date-parts":[[2014,1,31]],"date-time":"2014-01-31T17:36:56Z","timestamp":1391189816000},"page":"382-387","source":"Crossref","is-referenced-by-count":10,"title":["Norms and standards in modular medical architectures"],"prefix":"10.1109","author":[{"given":"Christoph","family":"Thuemmler","sequence":"first","affiliation":[]},{"given":"Oli","family":"Mival","sequence":"additional","affiliation":[]},{"given":"David","family":"Benyon","sequence":"additional","affiliation":[]},{"given":"William","family":"Buchanan","sequence":"additional","affiliation":[]},{"given":"Alois","family":"Paulin","sequence":"additional","affiliation":[]},{"given":"Samuel","family":"Fricker","sequence":"additional","affiliation":[]},{"given":"Markus","family":"Fiedler","sequence":"additional","affiliation":[]},{"given":"Astrid","family":"Grottland","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Jell","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Magedanz","sequence":"additional","affiliation":[]},{"given":"Ioana","family":"Ispas","sequence":"additional","affiliation":[]},{"given":"Bert-Jaap","family":"Koops","sequence":"additional","affiliation":[]},{"given":"Eleni","family":"Kosta","sequence":"additional","affiliation":[]},{"given":"Armin","family":"Schneider","sequence":"additional","affiliation":[]},{"given":"Anastasius","family":"Gavras","sequence":"additional","affiliation":[]},{"given":"Maria","family":"Barros","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Cousin","sequence":"additional","affiliation":[]},{"given":"Euripides","family":"Petrakis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511750496.014"},{"journal-title":"Attitudes on Data Protection and Electronic Identity in the European Union","year":"2011","key":"35"},{"key":"17","article-title":"Freedom to provide health care services within the eu: An opportunity for a transformative directive","volume":"13","author":"hervey","year":"2007","journal-title":"Columbia Journal of European Law"},{"key":"36","article-title":"Privacy, practices and the claim for accountability","author":"guagnin","year":"2011","journal-title":"Towards Responsible Research and Innovation in the Information and Communication Technologies and Security Technologies Fields"},{"journal-title":"Guidelines of 7 March 2013 on Good Distribution Practice of Medicinal Products for Human Use Official Journal","year":"2013","key":"18"},{"key":"33","article-title":"It for a better ethics. How to integrate ethics politics and innovation","author":"stahl","year":"2011","journal-title":"Towards Responsible Research and Innovation in the Information and Communication Technologies and Security Technologies Fields"},{"journal-title":"Proposal for A Regulation on Clinical Trials on Medicinal Products for Human Use and Repealing Directive 2001\/20\/EC COM","year":"2012","key":"15"},{"journal-title":"Deliverable 2 2 Normative Issues Report FP7 ETICA Project","year":"0","key":"34"},{"journal-title":"Official Journal","year":"2011","key":"16"},{"key":"39","article-title":"Responsible research and innovation in ICT. The case of privacy","author":"peissl","year":"2011","journal-title":"Towards Responsible Research and Innovation in the Information and Communication Technologies and Security Technologies Fields"},{"journal-title":"Official Journal","year":"2001","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s00134-003-1963-0"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2008.03.008"},{"journal-title":"Proposal for A General Data Protection Regulation COM","year":"2012","key":"11"},{"key":"38","article-title":"Privacy perception in the ict era and beyond","author":"hautaptman","year":"2011","journal-title":"Towards Responsible Research and Innovation in the Information and Communication Technologies and Security Technologies Fields"},{"key":"12","first-page":"223","article-title":"Securing the e-health cloud","author":"lo?hr","year":"2010","journal-title":"Proceedings of the 1st ACM International Health Informatics Symposium"},{"journal-title":"Building Trust in E-Health Services","year":"0","author":"vedder","key":"21"},{"journal-title":"Official Journal","year":"1985","key":"20"},{"key":"43","article-title":"Precaution and privacy impact assessment as modes towards risk governance","author":"wright","year":"2011","journal-title":"Towards Responsible Research and Innovation in the Information and Communication Technologies and Security Technologies Fields"},{"key":"42","article-title":"Privacy by design ?.take the challenge","author":"cavoukian","year":"2009","journal-title":"Toronto Information and Privacy Commisioner of Ontario Canada"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2008.03.003"},{"journal-title":"The Social Control of Technology","year":"1981","author":"collingridge","key":"40"},{"year":"0","key":"45"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1109\/ISMICT.2012.6203030"},{"year":"0","key":"47"},{"year":"0","key":"46"},{"journal-title":"E-health Combining Health Telematics Telemedicine Biomedical Engineering and Bioinformatics to the Edge (Global Experts Summit Book)","year":"2008","author":"blobel","key":"22"},{"key":"23","article-title":"Patent issues in e-health, especially of north and south problems on telemedicine","author":"tomioka","year":"2009","journal-title":"Proceedings of IEEE Helathcom 2009"},{"journal-title":"Official Journal","year":"2000","key":"24"},{"journal-title":"Official Journal","year":"2009","key":"25"},{"journal-title":"Official Journal","year":"2007","key":"26"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511750496.008"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511750496.009"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511750496"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/S0168-8510(01)00189-0"},{"year":"0","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-90-6704-579-7_5"},{"key":"1","article-title":"Applying the software-to-data paradigm in next generation e-health hybrid clouds, itng2013","author":"thuemmler","year":"0","journal-title":"Proc Int Conf Inform Technol"},{"key":"30","first-page":"85","article-title":"The role of law in global e-health: A tool for development and equity in a digitally divided world","volume":"46","author":"blum","year":"2002","journal-title":"St Louis U L J"},{"key":"7","first-page":"51","author":"kuner","year":"2008","journal-title":"Europe Data Protection Law Corporate Compliance and Regulation"},{"journal-title":"Official Journal","year":"1995","key":"6"},{"journal-title":"EGE Opinion 26 2012 Ethics of Information and Communication Technologies","year":"0","key":"32"},{"key":"5","first-page":"193","article-title":"Privacy protection and identity management","author":"dumortier","year":"2004","journal-title":"Security and Privacy in Advanced Networking Technologies"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1377\/hlthaff.2009.0945"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511750496.007"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s10506-008-9067-3"},{"key":"8","first-page":"432","article-title":"Data protection","author":"walden","year":"2003","journal-title":"Computer Law"}],"event":{"name":"2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom 2013)","start":{"date-parts":[[2013,10,9]]},"location":"Lisbon, Portugal","end":{"date-parts":[[2013,10,12]]}},"container-title":["2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom 2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6713381\/6720623\/06720705.pdf?arnumber=6720705","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T19:36:19Z","timestamp":1490297779000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6720705\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/healthcom.2013.6720705","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}