{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T10:33:54Z","timestamp":1673001234082},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2010,11,1]],"date-time":"2010-11-01T00:00:00Z","timestamp":1288569600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Technol. Biomed."],"published-print":{"date-parts":[[2010,11]]},"DOI":"10.1109\/titb.2010.2073478","type":"journal-article","created":{"date-parts":[[2010,9,29]],"date-time":"2010-09-29T15:44:53Z","timestamp":1285775093000},"page":"1327-1337","source":"Crossref","is-referenced-by-count":4,"title":["Data-centric privacy protocol for intensive care grids"],"prefix":"10.1109","volume":"14","author":[{"given":"Jesus","family":"Luna","sequence":"first","affiliation":[]},{"given":"Marios","family":"Dikaiakos","sequence":"additional","affiliation":[]},{"given":"Manolis","family":"Marazakis","sequence":"additional","affiliation":[]},{"given":"Theodoros","family":"Kyprianou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2006.69"},{"key":"ref38","article-title":"medicus project","author":"erberich","year":"2009"},{"key":"ref33","article-title":"Classic ap profile version 4.03","year":"0"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2003.1233711"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"197","DOI":"10.3233\/JCS-2007-15201","article-title":"a policy-based methodology for security evaluation: a security metric for public key infrastructures","volume":"15","author":"casola","year":"2007","journal-title":"J Comput Security"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/35.312846"},{"key":"ref37","author":"redolfi","year":"0"},{"key":"ref36","article-title":"mammogrid project","author":"frate","year":"2009"},{"key":"ref35","article-title":"Health-e-child project","year":"0"},{"key":"ref34","article-title":"Internet X.509 public key infrastructure&#x2014;Certificate and certificate revocation list (CRL) profile","author":"housley","year":"2002"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.17487\/rfc2196","article-title":"site security handbook","author":"fraser","year":"1997"},{"key":"ref11","article-title":"globus toolkit version 4 grid security infrastructure: a standards perspective","author":"welch","year":"2005"},{"key":"ref40","article-title":"SHARE: Technology and security roadmap","year":"0"},{"key":"ref12","year":"0"},{"key":"ref13","first-page":"13","article-title":"voms, an authorization system for virtual organizations","author":"alfieri","year":"2003","journal-title":"Proc First Eur Across Grids Conf"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S0965-2590(03)01116-2"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2007.906101"},{"key":"ref16","article-title":"Federal ministry of health: The electronic health card","year":"0"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/0933-3657(92)90052-Q"},{"key":"ref18","author":"sackett","year":"2000","journal-title":"Evidence-Based Medicine How to Practice and Teach EBM"},{"key":"ref19","author":"dawant","year":"2000","journal-title":"Biomedical Engineering Handbook"},{"key":"ref28","article-title":"Onion Networks","year":"0"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09457-1_17"},{"key":"ref27","article-title":"glite 3.0 user guide","author":"burke","year":"2006"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-78446-5_12"},{"key":"ref6","first-page":"1","article-title":"Providing security to the desktop data grid","author":"luna","year":"0","journal-title":"Proc IEEE IPDPS 2008"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.143"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2004.1286747"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.annepidem.2007.05.006"},{"key":"ref7","article-title":"U.S. Department of Health and Human Services: HIPAA Law","year":"0"},{"key":"ref2","first-page":"31","article-title":"eu parliament. directive 95\/46\/ec of the european parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data","year":"1995"},{"key":"ref1","first-page":"248","article-title":"icgrid: enabling intensive care medical research on the egee grid","author":"gjermundrod","year":"0","journal-title":"From Genes to Personalized HealthCare Grid Solutons for the Life Sciences Proceedings of HealthGrid 2007"},{"key":"ref9","article-title":"European Health Management Association Legally eHealth-Deliverable 2","year":"0"},{"key":"ref20","article-title":"glite: Lightweight middleware for grid computing","year":"0"},{"key":"ref45","year":"0"},{"key":"ref22","article-title":"EGEE: FiReMAN Catalog User Guide","year":"0"},{"key":"ref21","first-page":"1","article-title":"distributed metadata with the amga metadata catalog","author":"santos","year":"2006","journal-title":"Proc Workshop Next-Gener Distrib Data Manage HPDC-15"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/62044.62050"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379239"},{"key":"ref23","first-page":"15","article-title":"a framework for evaluating storage system security","author":"riedel","year":"2002","journal-title":"FAST"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-007-9088-2"},{"key":"ref26","article-title":"Amga: Users, groups and acls","year":"0"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1534912.1534914"},{"key":"ref25","first-page":"229","article-title":"secure computer systems: a mathematical model, volume ii","volume":"4","author":"bell","year":"1996","journal-title":"J Comput Security"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060291"}],"container-title":["IEEE Transactions on Information Technology in Biomedicine"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4233\/5610573\/05582285.pdf?arnumber=5582285","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T00:46:07Z","timestamp":1633913167000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5582285\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11]]},"references-count":45,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/titb.2010.2073478","relation":{},"ISSN":["1089-7771","1558-0032"],"issn-type":[{"value":"1089-7771","type":"print"},{"value":"1558-0032","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,11]]}}}