{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:42:29Z","timestamp":1729622549768,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/cisti.2015.7170356","type":"proceedings-article","created":{"date-parts":[[2015,7,30]],"date-time":"2015-07-30T17:21:22Z","timestamp":1438276882000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Authorization services of the eVida platform"],"prefix":"10.1109","author":[{"given":"Filipe","family":"Augusto","sequence":"first","affiliation":[]},{"given":"Joao","family":"Quintas","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Cardoso","sequence":"additional","affiliation":[]},{"given":"Miguel","family":"Grade","sequence":"additional","affiliation":[]},{"given":"Yosvanny","family":"Llerena","sequence":"additional","affiliation":[]},{"given":"Alexandra","family":"Queiros","sequence":"additional","affiliation":[]},{"given":"Nelson Pacheco","family":"Rocha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.2340\/16501977-0905"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10209-013-0328-x"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3928\/00989134-20091204-02"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2013.03.007"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2012.2234129"},{"key":"ref15","first-page":"77","article-title":"Cybertherapy: Advantages, Limitations, and Ethical Issues","author":"botella","year":"2009","journal-title":"PsychNology Journal"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1080\/03069880902957015"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-3990-4.ch006"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.2196\/resprot.2899"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.3377"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.2196\/medinform.3699"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05948-8_35"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2011.10.004"},{"key":"ref5","first-page":"348","article-title":"TICE-Healthy: A dynamic extensible personal health record","author":"catr\u00e9","year":"2013","journal-title":"HEALTHINF 2013-Proceedings of the International Conference on Health Informatics"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MEMB.2003.1213628"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1109\/TITB.2004.835337","article-title":"Guest editorial introduction to the special section on pervasive healthcare","volume":"8","year":"2004","journal-title":"IEEE Transactions on Information Technology in Biomedicine"},{"key":"ref2","first-page":"403","article-title":"AAL information based services and care integration","author":"queir\u00f3s","year":"2013","journal-title":"HEALTHINF 2013-Proceedings of the International Conference on Health Informatics"},{"key":"ref1","first-page":"52","article-title":"Co-production of health enabled by next generation Personal Health Systems","author":"boye","year":"2012","journal-title":"Proceedings of the 9th International Conference on Wearable Micro and Nano Technologies for Personalized Health"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.socscimed.2005.08.044"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1147\/sj.441.0081"},{"key":"ref22","article-title":"openEHR Archetypes: Putting the Clinician Back in the Driver's Seat","author":"schloeffel","year":"2003","journal-title":"Proceedings of the Health Informatics Conference"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2003.09.003"},{"key":"ref23","first-page":"2916","article-title":"SeAAS - A Reference Architecture for Security Services in SOA","volume":"15","author":"hafner","year":"2009","journal-title":"Journal of Universal Computer Science"}],"event":{"name":"2015 10th Iberian Conference on Information Systems and Technologies (CISTI)","start":{"date-parts":[[2015,6,17]]},"location":"Aveiro, Portugal","end":{"date-parts":[[2015,6,20]]}},"container-title":["2015 10th Iberian Conference on Information Systems and Technologies (CISTI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7152443\/7170350\/07170356.pdf?arnumber=7170356","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T12:43:52Z","timestamp":1498221832000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7170356\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/cisti.2015.7170356","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}