{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:54:23Z","timestamp":1730224463958,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/healthcom.2015.7454498","type":"proceedings-article","created":{"date-parts":[[2016,5,4]],"date-time":"2016-05-04T20:10:33Z","timestamp":1462392633000},"page":"200-204","source":"Crossref","is-referenced-by-count":4,"title":["Managing and sharing health data through Information Accountability protocols"],"prefix":"10.1109","author":[{"given":"Daniel","family":"Grunwell","sequence":"first","affiliation":[]},{"given":"Paulo","family":"Batista","sequence":"additional","affiliation":[]},{"given":"Sergio","family":"Campos","sequence":"additional","affiliation":[]},{"given":"Tony","family":"Sahama","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Privacy Act 1988 Clth","year":"0","key":"ref10"},{"journal-title":"Health Identifiers Act 2010 Clth","year":"0","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2527031.2527043"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1504\/IJIEM.2010.035624"},{"journal-title":"Privacy Rights Clearinghouse","article-title":"Chronology of Data Breaches","year":"0","key":"ref14"},{"key":"ref15","first-page":"3","article-title":"Improving usefulness of ehealth systems through information accountability","volume":"2","author":"grunwell","year":"2013","journal-title":"E-Health Technical Committee Newsletter"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1349026.1349043"},{"key":"ref17","article-title":"Provenance-based auditing of private data use","author":"aldeco-p\u00e9rez","year":"2008","journal-title":"International Academic Research Conference Visions of Computer Science BCS"},{"key":"ref18","first-page":"33","article-title":"The security and privacy of usage policies and provenance logs in an information accountability framework","author":"grunwell","year":"2015","journal-title":"Australasian Workshop on Health Informatics and Knowledge Management"},{"key":"ref19","first-page":"65","article-title":"Hospital patient database management system: A case study of general hospital north-bank makurdi-nigeria","volume":"2","author":"asabe","year":"2013","journal-title":"COMPUSOFT"},{"journal-title":"Department of Health","article-title":"Personally Controlled Electronic Health Record Review Report","year":"2014","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11606-014-3053-0"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883989"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2011.51"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1590\/S0004-282X2011000500021"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12418-6_5"},{"key":"ref2","volume":"69","author":"boyd","year":"2003","journal-title":"Accountability McMurry Inc"},{"key":"ref1","article-title":"Security and privacy in ehealth: is it possible? a sociotechnical analysis","author":"sahama","year":"2013","journal-title":"International Conference on e-Health Networking Application and Services"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2073276.2073282"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1186\/2193-1801-3-268"}],"event":{"name":"2015 17th International Conference on E-health Networking, Application & Services (HealthCom)","start":{"date-parts":[[2015,10,14]]},"location":"Boston, MA, USA","end":{"date-parts":[[2015,10,17]]}},"container-title":["2015 17th International Conference on E-health Networking, Application &amp; Services (HealthCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7449553\/7454459\/07454498.pdf?arnumber=7454498","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T20:59:27Z","timestamp":1489784367000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7454498\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/healthcom.2015.7454498","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}