{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T18:36:54Z","timestamp":1764873414207},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/healthcom.2015.7454484","type":"proceedings-article","created":{"date-parts":[[2016,5,4]],"date-time":"2016-05-04T20:10:33Z","timestamp":1462392633000},"page":"120-125","source":"Crossref","is-referenced-by-count":14,"title":["On the use of CryptDB for securing Electronic Health data in the cloud: A performance study"],"prefix":"10.1109","author":[{"given":"Faisal","family":"Shahzad","sequence":"first","affiliation":[]},{"given":"Waheed","family":"Iqbal","sequence":"additional","affiliation":[]},{"given":"Fawaz S.","family":"Bokhari","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Ministry Of Justice Canada","article-title":"Personal Information Protection and Electronic Documents Act","year":"2014","key":"ref10"},{"key":"ref11","first-page":"464","author":"miller","year":"2010","journal-title":"Security Information and Event Management (SIEM) Implementation"},{"key":"ref12","article-title":"Understanding IPS and IDS: Using IPS and IDS together for Defense in Depth","author":"holland","year":"2004","journal-title":"SANS Institute"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"journal-title":"OpenEMR","article-title":"OpenEMR Project","year":"0","key":"ref14"},{"journal-title":"Amazon","article-title":"AWS Cloud Computing Services","year":"0","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2014.06.002"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511721656"},{"key":"ref18","first-page":"160","article-title":"ON DATA BANKS AND PRIVACY HOMOMORPHISMS","author":"rivest","year":"1978","journal-title":"Foundations of Secure Computation"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"journal-title":"Department of Health","article-title":"HITECH Act Excerpt","year":"2009","key":"ref4"},{"year":"2013","key":"ref3","article-title":"HIPAA Administrative Simplification; Regulation Text"},{"year":"1998","key":"ref6","article-title":"Data Protection Act"},{"year":"2003","key":"ref5","article-title":"Identity Theft Red Flags and Address Discrepancies Under the Fair and Accurate Credit Transactions. Act of 2003-16 CFR Part 681"},{"journal-title":"UK Government","article-title":"Freedom Of Information (FOI) Act","year":"2000","key":"ref8"},{"year":"0","key":"ref7","article-title":"IGT Requirement 206 ACUTE v12"},{"journal-title":"FairWarning","article-title":"Security and Privacy of Electronic Medical Records","year":"2015","key":"ref2"},{"journal-title":"European Commission","article-title":"Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation)","year":"2012","key":"ref9"},{"key":"ref1","article-title":"Above the Clouds: A Berkeley View of Cloud Computing","author":"armbrust","year":"2009","journal-title":"UC Berkeley Reliable Adaptive Distributed Systems Laboratory"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"journal-title":"Intel Corporation","article-title":"Encrypt Healthcare Data with Performance Using Intel&#x00AE; Xeon&#x00AE; Processors","year":"2012","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1186\/gm239"},{"journal-title":"VMware","article-title":"VMWare Workstation: Multiple Operating Systems","year":"0","key":"ref24"},{"journal-title":"MIT","article-title":"CryptDB","year":"0","key":"ref23"},{"journal-title":"Apache","article-title":"jMeter","year":"0","key":"ref25"}],"event":{"name":"2015 17th International Conference on E-health Networking, Application & Services (HealthCom)","start":{"date-parts":[[2015,10,14]]},"location":"Boston, MA, USA","end":{"date-parts":[[2015,10,17]]}},"container-title":["2015 17th International Conference on E-health Networking, Application &amp; Services (HealthCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7449553\/7454459\/07454484.pdf?arnumber=7454484","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,9]],"date-time":"2021-06-09T21:23:46Z","timestamp":1623273826000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7454484\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/healthcom.2015.7454484","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}