{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:45:49Z","timestamp":1729673149351,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/wowmom.2010.5534982","type":"proceedings-article","created":{"date-parts":[[2010,8,9]],"date-time":"2010-08-09T22:19:00Z","timestamp":1281392340000},"page":"1-6","source":"Crossref","is-referenced-by-count":5,"title":["SAMSON: Secure access for medical smart cards over networks"],"prefix":"10.1109","author":[{"given":"Guy C.","family":"Hembroff","sequence":"first","affiliation":[]},{"given":"Sead","family":"Muftic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2006","key":"ref10","article-title":"User Authentication and Authorization"},{"year":"0","key":"ref11"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/3-540-36467-6_6","article-title":"Platform. For Enterprise Privacy Practices: Privacy-enable Management of Customer Data, In: 2nd Workshop on Privacy Enhancing Technologies (PET2002)","volume":"2482","author":"karoth","year":"2003","journal-title":"Lecture Notes in Computer Science"},{"article-title":"NIST: Biometric Data Specification for Personal Identity Verification","year":"2006","author":"wilson","key":"ref13"},{"year":"2007","key":"ref14","article-title":"Standard Practice for Content and Structure of the Electronic Health Record"},{"year":"2003","key":"ref15","article-title":"Summary of the HIP AA Privacy Rule"},{"year":"1996","key":"ref16","article-title":"Mental Health Code - Act 258 of 1974"},{"year":"2004","key":"ref17","article-title":"The Confidentiality of Alcohol and Drug Abuse Patient Records Regulation and the HIP AA Privacy Rule: Implications for Alcohol and Sustance Abuse Programs"},{"year":"2007","key":"ref18","article-title":"An, Assessment of Privacy and Security Policies and Business Practices"},{"year":"2006","key":"ref19","article-title":"Personal Identify Verification (PIV) of Federal Employees and Contractors"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1023\/A:1005549330655"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2004.824731"},{"key":"ref6","article-title":"Secure Health Information Exchange over Local Domains (SHIELD)","author":"hembroff","year":"2009","journal-title":"Proceedings of the IEEE Pervasive Health Computing conference"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1066677.1066756"},{"year":"1994","key":"ref8","article-title":"Health Information Privacy Code"},{"journal-title":"Recommendation R","article-title":"On the Protection of Medical Data","year":"1997","key":"ref7"},{"journal-title":"National Standards to Protect the Privacy of Personal Health Information Office for civil Rights","year":"2001","key":"ref2"},{"year":"1999","key":"ref9","article-title":"Standard Guide for the Amendments to Health Information"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1021\/pr0499693"},{"year":"2008","key":"ref20","article-title":"Interfaces for Personal Identity Verification-Part 1: End-Point PIV Card Application, Namespace, Data Model and Representation"},{"year":"0","key":"ref22"},{"journal-title":"Web Services Security v1 0&#x2013;1 1 (WS-Security 2004) [OASIS 200401] [specification]","year":"0","key":"ref21"},{"year":"0","key":"ref24"},{"year":"0","key":"ref23"},{"year":"0","key":"ref25"}],"event":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","start":{"date-parts":[[2010,6,14]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2010,6,17]]}},"container-title":["2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5513765\/5534887\/05534982.pdf?arnumber=5534982","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T12:20:02Z","timestamp":1497874802000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5534982\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/wowmom.2010.5534982","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}