{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T06:57:51Z","timestamp":1763535471047,"version":"3.37.3"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2017,11,1]],"date-time":"2017-11-01T00:00:00Z","timestamp":1509494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100004837","name":"Spanish Ministry of Science and Innovation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004837","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Incident Monitoring in Smart Communities","award":["TEC2014-54335-C4-2-R","S2013\/ICE-2715"],"award-info":[{"award-number":["TEC2014-54335-C4-2-R","S2013\/ICE-2715"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Biomed. Health Inform."],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/jbhi.2017.2655419","type":"journal-article","created":{"date-parts":[[2017,8,7]],"date-time":"2017-08-07T18:09:03Z","timestamp":1502129343000},"page":"1741-1749","source":"Crossref","is-referenced-by-count":35,"title":["Collaborative eHealth Meets Security: Privacy-Enhancing Patient Profile Management"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4361-4064","authenticated-orcid":false,"given":"Rosa","family":"Sanchez-Guerrero","sequence":"first","affiliation":[]},{"given":"Florina Almenarez","family":"Mendoza","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Diaz-Sanchez","sequence":"additional","affiliation":[]},{"given":"Patricia Arias","family":"Cabarcos","sequence":"additional","affiliation":[]},{"given":"Andres Marin","family":"Lopez","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.146"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.142"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1368310.1368362"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2013.2294932"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_4"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0272-7"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-61350-498-7.ch005"},{"article-title":"U-Prove technology overview","year":"2010","author":"stefan","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2011.6157409"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.2200\/S00485ED1V01Y201303SPT004"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_21"},{"article-title":"The application of hash chains and hash structures to\n cryptography","year":"2009","author":"page","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/78973.78977"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/s120506129"},{"year":"2005","key":"ref14","article-title":"Microsoft's vision for an identity metasystem"},{"article-title":"A decentralized anonymity-preserving\n reputation system with constant-time score retrieval","year":"2016","author":"bazin","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICMB.2008.31"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-010-9449-4"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2013.6590046"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-5629-2"},{"article-title":"Survey on privacy in mobile crowd sensing task management","year":"2014","author":"pournajaf","key":"ref28"},{"year":"2016","key":"ref4","article-title":"OpenEHR"},{"key":"ref27","first-page":"504","article-title":"Authenticated dictionary-based attribute sharing in federated identity management","author":"dongwan","year":"0","journal-title":"Proc 6th Int Conf Inf Technol New Gener"},{"year":"2016","key":"ref3","article-title":"Health level seven"},{"article-title":"A terminology for talking about privacy by data minimization: Anonymity, unlinkability,\n undetectability, unobservability, pseudonymity, and identity management","year":"2009","author":"pfitzmann","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0270-9"},{"year":"2016","key":"ref5","article-title":"IHE IT infrastructure (ITI) technical framework volume 1 integration profiles. Revision 12.0"},{"year":"2016","key":"ref8","article-title":"ISOEN-13606"},{"article-title":"EHR information model. Release 1.0.2","year":"2016","author":"chen","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-007-0017-1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1097\/01.mlr.0000119578.94846.f2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/AINAW.2007.376"},{"key":"ref20","first-page":"457","article-title":"Fuzzy identity-based encryption","author":"sahai","year":"2005","journal-title":"Advances in Cryptology &#x2013; EUROCRYPT 2005 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques Aarhus Denmark May 22-26 2005"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14257\/ijsh.2015.9.4.23"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.04.028"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453876"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2013.2294932"}],"container-title":["IEEE Journal of Biomedical and Health Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221020\/8097350\/08003467.pdf?arnumber=8003467","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T03:00:11Z","timestamp":1633921211000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8003467\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":39,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/jbhi.2017.2655419","relation":{},"ISSN":["2168-2194","2168-2208"],"issn-type":[{"type":"print","value":"2168-2194"},{"type":"electronic","value":"2168-2208"}],"subject":[],"published":{"date-parts":[[2017,11]]}}}