{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T13:42:39Z","timestamp":1730295759229,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/segah.2014.7067093","type":"proceedings-article","created":{"date-parts":[[2015,3,28]],"date-time":"2015-03-28T22:53:38Z","timestamp":1427583218000},"page":"1-8","source":"Crossref","is-referenced-by-count":6,"title":["Envisioning secure and usable access control for patients"],"prefix":"10.1109","author":[{"given":"Ana","family":"Ferreira","sequence":"first","affiliation":[]},{"given":"Gabriele","family":"Lenzini","sequence":"additional","affiliation":[]},{"given":"C\u00e1tia","family":"Santos-Pereira","sequence":"additional","affiliation":[]},{"given":"Alexandre B.","family":"Augusto","sequence":"additional","affiliation":[]},{"given":"Manuel E.","family":"Correia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2010.5470649"},{"key":"ref32","article-title":"Transparency enhancihng tools (TETs): an overview","author":"janic","year":"2013","journal-title":"STAST workshop"},{"journal-title":"HL7 Security Technical Committee Role Based Access Control (RBAC) Healthcare Constraint Catalog ed HL7","year":"2010","key":"ref31"},{"key":"ref30","first-page":"249","article-title":"One way to patient empowerment - a proposal for an authorization model","author":"santos-pereira","year":"2012","journal-title":"Proceedings of the International Conference on Health Informatics"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M3169"},{"key":"ref11","first-page":"77","article-title":"Why facilitate patient access to medical records","volume":"127","author":"ferreira","year":"2007","journal-title":"Medical and Care Compunetics"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2007.09.001"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.322.7281.283"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2003.11.008"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2013.190"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30436-1_6"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M3169"},{"year":"0","key":"ref18"},{"key":"ref19","article-title":"Are personal health records safe? A review of free web-accessible personal health record privacy policies","volume":"14","author":"carrion","year":"2012","journal-title":"J Med Internet Res"},{"year":"2009","key":"ref28","article-title":"Health informatics - electronic health record communication - Part 4: Security"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03893-8_99"},{"journal-title":"vol QUIS 7 0","article-title":"Questionnaire for User Interaction Satisfaction-QUIS","year":"0","key":"ref27"},{"journal-title":"Lei Acessoaos Documentos da Administra&#x00E7;&#x00E3;o Artigos 5&#x00B0; e 7&#x00B0; Di&#x00E1;rio da Rep&#x00FA;blica","year":"2007","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s00296-012-2408-2"},{"journal-title":"HL7 Security Technical Committee Role Based Access Control (RBAC) Healthcare Permission Catalog in Release 2 ed HL 7","year":"2010","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1017\/S1047951110000363"},{"key":"ref8","first-page":"17","article-title":"Access to electronic health records in primary care - a survey of patients' view","volume":"10","author":"pyper","year":"2004","journal-title":"Med Sci Monit"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-12-87"},{"journal-title":"U S Department of Health & Human Services Health insurance portability and accountability act","year":"1996","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2008.03.014"},{"journal-title":"Recommendation No R (97) 5 of the Committee of Ministers to Member States on the Protection of Medical Data Council of Europe - Committee of Ministers","year":"1997","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2012.04.007"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2008.4639087"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2245276.2232007"},{"key":"ref24","first-page":"756","article-title":"Towards human-centric visual access control for clinical data management","volume":"180","author":"fahl","year":"2012"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/DEST.2011.5936606"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2011.5955222"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32395-9_5"}],"event":{"name":"2014 IEEE 3rd International Conference on Serious Games and Applications for Health (SeGAH)","start":{"date-parts":[[2014,5,14]]},"location":"Rio de Janeiro, Brazil","end":{"date-parts":[[2014,5,16]]}},"container-title":["2014 IEEE 3nd International Conference on Serious Games and Applications for Health (SeGAH)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7063805\/7067066\/07067093.pdf?arnumber=7067093","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T14:10:17Z","timestamp":1490364617000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7067093\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/segah.2014.7067093","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}