{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:14:11Z","timestamp":1730279651714,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/iwcmc.2018.8450306","type":"proceedings-article","created":{"date-parts":[[2018,8,30]],"date-time":"2018-08-30T22:00:16Z","timestamp":1535666416000},"page":"394-399","source":"Crossref","is-referenced-by-count":3,"title":["Enhancing E-Healthcare Privacy Preservation Framework through L-Diversity"],"prefix":"10.1109","author":[{"given":"Adeel","family":"Shah","sequence":"first","affiliation":[]},{"given":"Haider","family":"Abbas","sequence":"additional","affiliation":[]},{"given":"Waseem","family":"Iqbal","sequence":"additional","affiliation":[]},{"given":"Rabia","family":"Latif","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","article-title":"Electronic health information systems for public health care in South Africa: a review of current operational systems","volume":"4","author":"wright","year":"2017","journal-title":"Journal of Health Informatics in Africa"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.06.004"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2006.09.015"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/HEALTH.2008.4600120"},{"key":"ref13","article-title":"Pseudonymization in medical research - the generic data protection concept of the TMF","volume":"1","author":"pommerening","year":"2005","journal-title":"GMS Medizinische Informatik Biometrie und Epidemiologie"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2008.366"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/HSI.2010.5514526"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2379776.2379779"},{"journal-title":"IBM Developer Works Federated identity management concepts","year":"0","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-13-75"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1866835.1866845"},{"journal-title":"Electronic healthcare record a way to empower the patient","year":"2003","author":"beun","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-006-9019-y"},{"journal-title":"Rationing critical care beds A systematic review","year":"2004","author":"kahnamoui","key":"ref3"},{"journal-title":"Privacy information technology and health care","year":"1997","author":"rindfleisch","key":"ref6"},{"year":"0","key":"ref29"},{"journal-title":"National survey of British public&#x2019;s views on use of identifiable medical data by the National Cancer Registry","year":"2003","key":"ref5"},{"journal-title":"Stan Tech L Rev 1 Fair Information Practices and the Architecture of Privacy","year":"2001","key":"ref8"},{"key":"ref7","first-page":"517","volume":"30","author":"english","year":"2004","journal-title":"Ethics briefings Journal of Medical Ethics"},{"journal-title":"ESPAC Enabling Security and Patient-centric Access Control for eHealth in cloud computing","year":"2011","author":"barua","key":"ref2"},{"key":"ref9","first-page":"199","article-title":"The five levels of electronic health records","volume":"13","author":"waegemann","year":"1996","journal-title":"MD Comput"},{"journal-title":"Biomedical Informatics Computer Applications in Health Care and Biomedicine","year":"2000","author":"shortliffe","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.016"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89208-3_232"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2015.01.012"},{"key":"ref24","first-page":"695","article-title":"Integrating Data Custodians in eHealth Grids - A Digest of Security and Privacy Aspects","volume":"p 93","author":"fingberg","year":"2006","journal-title":"Informatik 2006 - Informatik f&#x00FC;r Menschen Lecture Notes in Informatics (LNI)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1016\/j.jnca.2012.09.001","article-title":"A framework for preservation of cloud users&#x2019; data privacy using dynamic reconstruction of metadata","volume":"36","author":"waqar","year":"2013","journal-title":"Journal of Network and Computer Applications"},{"key":"ref25","article-title":"Tensions Between Anonymity and Thick Description When &#x201C;Studying Up","volume":"25","author":"bickford","year":"2014","journal-title":"Genetics Research Qualitative health research"}],"event":{"name":"2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC)","start":{"date-parts":[[2018,6,25]]},"location":"Limassol","end":{"date-parts":[[2018,6,29]]}},"container-title":["2018 14th International Wireless Communications &amp; Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8410977\/8450266\/08450306.pdf?arnumber=8450306","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T15:45:46Z","timestamp":1643211946000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8450306\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2018.8450306","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}