{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T23:45:04Z","timestamp":1750981504041,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/healthcom.2013.6720721","type":"proceedings-article","created":{"date-parts":[[2014,1,31]],"date-time":"2014-01-31T22:36:56Z","timestamp":1391207816000},"page":"465-470","source":"Crossref","is-referenced-by-count":4,"title":["What challenges have to be faced when using the cloud for e-health services?"],"prefix":"10.1109","author":[{"family":"Fei Liu","sequence":"first","affiliation":[]},{"given":"Eric","family":"Rijnboutt","sequence":"additional","affiliation":[]},{"given":"Dimitrios","family":"Routsis","sequence":"additional","affiliation":[]},{"given":"Nicolaas","family":"Venekamp","sequence":"additional","affiliation":[]},{"given":"Harry","family":"Fulgencio","sequence":"additional","affiliation":[]},{"given":"Mohsen","family":"Rezai","sequence":"additional","affiliation":[]},{"given":"Adriaan","family":"van der Helm","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Data modeling for healthcare systems integration: Use of the metamodel","volume":"96","author":"myers","year":"2012","journal-title":"Towards an Electronic Patient Record Conference"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(09)70071-5"},{"key":"17","article-title":"Security guidance for critical areas of focus in cloud computing","author":"archer","year":"2009","journal-title":"Cloud Security Alliance"},{"journal-title":"Security and Privacy Issues and Requirements for Healthcare Cloud Computing","year":"2012","author":"gavrilov","key":"18"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1001\/archinte.163.12.1409"},{"key":"33","first-page":"195","article-title":"Comparative evaluation of google health api vs microsoft healthvault api","author":"sunyaev","year":"2010","journal-title":"Proceedings of the Third International Conference on Health Informatics (HealthInf 2010)"},{"key":"15","first-page":"800","article-title":"Guidelines on security and privacy in public cloud computing","author":"jansen","year":"2011","journal-title":"NIST Special Publication"},{"journal-title":"Digital Divide Plagues Slow E-health Records Rollout","year":"2010","author":"mearian","key":"34"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.12.006"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.38398.500764.8F"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"14","first-page":"546","article-title":"Security issues in cloud computing: The potentials of homomorphic encryption","volume":"2","author":"atayero","year":"2011","journal-title":"Journal of Emerging Trends in Computing and Information Sciences"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pmed.1000387"},{"key":"11","first-page":"3","article-title":"Data management in the cloud: Limitations and opportunities","volume":"32","author":"abadi","year":"2009","journal-title":"IEEE Data Eng Bull"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1001\/jama.293.10.1223"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.5539\/nct.v1n1p2"},{"journal-title":"Security Challenges in Cloud Computing","year":"2009","author":"ertaul","key":"21"},{"journal-title":"Implications for Adopting Cloud Computing in e-Health","year":"2011","author":"bollineni","key":"20"},{"journal-title":"Cloud Computing Benefits Risks and Recommendations for Information Security","year":"2010","author":"catteddu","key":"22"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1377\/hlthaff.19.6.140"},{"key":"24","first-page":"98","article-title":"Spoc: Protecting patient privacy for e-health services in the cloud","author":"fan","year":"2012","journal-title":"eTELEMED 2012 the Fourth International Conference on EHealth Telemedicine and Social Medicine"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2010.62"},{"key":"26","first-page":"6","article-title":"Privacy fear factor arises. The public sees benefits to be had from healthcare it but concerns about misuse of data emerge in survey","volume":"35","author":"robeznieks","year":"2005","journal-title":"Modern Healthcare"},{"journal-title":"Cloud Computing for Health Care Organizations-A Practical Framework for Managing Risks","year":"2012","key":"27"},{"key":"28","first-page":"191","article-title":"Health insurance portability and accountability act of 1996","volume":"104","author":"act","year":"1996","journal-title":"Public Law"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/1735223.1735234"},{"key":"3","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1007\/s13174-010-0007-6","article-title":"Cloud computing: State-of-The-Art and research challenges","volume":"1","author":"zhang","year":"2010","journal-title":"Journal of Internet Services and Applications"},{"key":"2","first-page":"145","article-title":"The nist definition of cloud computing (draft)","volume":"800","author":"mell","year":"2011","journal-title":"NIST Special Publication"},{"key":"10","first-page":"7","article-title":"Mobile cloud computing: Implications and challenges","volume":"2","author":"prasad","year":"2012","journal-title":"Journal of Information Engineering and Applications"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2011.16"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1145\/1866914.1866918"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.5539\/nct.v1n2p12"},{"key":"6","doi-asserted-by":"crossref","first-page":"621","DOI":"10.3390\/fi4030621","article-title":"E-health cloud: Opportunities and challenges","volume":"4","author":"abukhousa","year":"2012","journal-title":"Future Internet"},{"key":"32","first-page":"2010","article-title":"Whats new about cloud computing security?","volume":"20","author":"chen","year":"2010","journal-title":"University of California Berkeley Report No UCB\/EECS-2010-5 January"},{"key":"5","article-title":"Defining cloud services and cloud computing","volume":"23","author":"gens","year":"2008","journal-title":"IDC EXchange"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-011-9317-x"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1496091.1496100"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-011-9661-x"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.1867"}],"event":{"name":"2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom 2013)","start":{"date-parts":[[2013,10,9]]},"location":"Lisbon, Portugal","end":{"date-parts":[[2013,10,12]]}},"container-title":["2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom 2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6713381\/6720623\/06720721.pdf?arnumber=6720721","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T07:04:07Z","timestamp":1498115047000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6720721\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/healthcom.2013.6720721","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}