{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T21:16:51Z","timestamp":1761513411516},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2014,7,1]],"date-time":"2014-07-01T00:00:00Z","timestamp":1404172800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/EU.html"}],"funder":[{"name":"project Cloud Thinking","award":["(CENTRO-07-ST24-FEDER-002031)"],"award-info":[{"award-number":["(CENTRO-07-ST24-FEDER-002031)"]}]},{"name":"QREN, \u00bfMais Centro\u00bf program"},{"name":"FCT","award":["SFRH\/BD\/68280\/2010"],"award-info":[{"award-number":["SFRH\/BD\/68280\/2010"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Biomed. Health Inform."],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/jbhi.2013.2292776","type":"journal-article","created":{"date-parts":[[2014,1,31]],"date-time":"2014-01-31T17:47:32Z","timestamp":1391190452000},"page":"1404-1412","source":"Crossref","is-referenced-by-count":17,"title":["XDS-I Outsourcing Proxy: Ensuring Confidentiality While Preserving Interoperability"],"prefix":"10.1109","volume":"18","author":[{"given":"Luis S.","family":"Ribeiro","sequence":"first","affiliation":[]},{"given":"Carlos","family":"Viana-Ferreira","sequence":"additional","affiliation":[]},{"given":"Jose Luis","family":"Oliveira","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Costa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"Introduction to Modern Information Retrieval. Facet","author":"chowdhury","year":"2010"},{"key":"ref32","volume":"513","author":"baeza-yates","year":"1999","journal-title":"Modern Information Retrieval"},{"key":"ref31","first-page":"1","author":"hathaway","year":"2003","journal-title":"National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information"},{"key":"ref30","author":"daemen","year":"2002","journal-title":"The Design of Rijndael AES?The Advanced Encryption Standard"},{"key":"ref34","author":"huang","year":"2010","journal-title":"PACS and Imaging Informatics Basic Principles and Applications"},{"key":"ref10","first-page":"1","article-title":"Digital imaging and communications in medicine (DICOM) part 18: Web access to DICOM persistent objects (WADO)","author":"association","year":"2004"},{"key":"ref11","year":"0"},{"key":"ref12","first-page":"1","article-title":"ebXML registry information model version 3.0","author":"fuger","year":"2005","journal-title":"OASIS"},{"key":"ref13","year":"0"},{"key":"ref14","year":"0"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-85729-336-7"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.282"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.97"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-07324-7"},{"key":"ref28","first-page":"224","article-title":"Order-preserving symmetric encryption","author":"boldyreva","year":"2009","journal-title":"Proc 28th Annu Int Conf Adv Cryptol Theory Appl Cryptographic Techn"},{"key":"ref4","author":"costa","year":"2009","journal-title":"Indexing and retrieving DICOM data in disperse and unstructured archives"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s11548-011-0625-x"},{"key":"ref3","author":"parkhill","year":"1966","journal-title":"The Challenge of the Computer Utility"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10278-008-9125-0"},{"key":"ref29","author":"gardner","year":"1972","journal-title":"Codes Ciphers and Secret Writing"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2012.05.013"},{"key":"ref8","first-page":"1","author":"association","year":"2007","journal-title":"Digital Imaging and Communications in Medicine (DICOM) Part 4 Service Class Specifications"},{"key":"ref7","author":"huang","year":"2010","journal-title":"PACS and Imaging Informatics Basic Principles and Applications"},{"key":"ref2","first-page":"89","author":"ribeiro","year":"2011","journal-title":"Current Trends in Archiving and Transmission of Medical Images in Medical Imaging"},{"key":"ref9","author":"oosterwijk","year":"0","journal-title":"DICOM basic version 32005 OTech Inc"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejrad.2009.10.016"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180417"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046680"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848445"},{"key":"ref24","first-page":"502","author":"pinkas","year":"2010","journal-title":"Proc 30th Annu Conf Adv Cryptology"},{"key":"ref23","first-page":"197","article-title":"Oblivious RAM with o((logn)<formula formulatype=\"inline\"><tex Notation=\"TeX\"> $^{3})$<\/tex><\/formula> worst-case cost","author":"shi","year":"2011","journal-title":"Proc 17th Int Conf Theory Appl Cryptol Inf Security"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"ref25","first-page":"1","article-title":"Remote Oblivious Storage: Making Oblivious RAM Practical","author":"boneh","year":"2011","journal-title":"Massachusetts Institute of Technology"}],"container-title":["IEEE Journal of Biomedical and Health Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221020\/6846381\/06675793.pdf?arnumber=6675793","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:16:54Z","timestamp":1642004214000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6675793\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":34,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/jbhi.2013.2292776","relation":{},"ISSN":["2168-2194","2168-2208"],"issn-type":[{"value":"2168-2194","type":"print"},{"value":"2168-2208","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,7]]}}}