{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T10:50:15Z","timestamp":1776077415496,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,11,11]],"date-time":"2010-11-11T00:00:00Z","timestamp":1289433600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,11,11]]},"DOI":"10.1145\/1882992.1883024","type":"proceedings-article","created":{"date-parts":[[2010,11,12]],"date-time":"2010-11-12T14:38:38Z","timestamp":1289572718000},"page":"220-229","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":148,"title":["Securing the e-health cloud"],"prefix":"10.1145","author":[{"given":"Hans","family":"L\u00f6hr","sequence":"first","affiliation":[{"name":"Ruhr-University Bochum, Bochum, Germany"}]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[{"name":"Ruhr-University Bochum, Bochum, Germany"}]},{"given":"Marcel","family":"Winandy","sequence":"additional","affiliation":[{"name":"Ruhr-University Bochum, Bochum, Germany"}]}],"member":"320","published-online":{"date-parts":[[2010,11,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945462"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1341312.1341321"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1734234.1734242"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14597-1_10"},{"key":"e_1_3_2_1_6_1","volume-title":"Trusted Virtual Domains: Color your network. Datenschutz und Datensicherheit (DuD), 5","author":"Catuogno L.","year":"2010","unstructured":"L. Catuogno , H. L\u00f6hr , M. Manulis , A.-R. Sadeghi , C. St\u00fcble , and M. Winandy . Trusted Virtual Domains: Color your network. Datenschutz und Datensicherheit (DuD), 5 , 2010 . L. Catuogno, H. L\u00f6hr, M. Manulis, A.-R. Sadeghi, C. St\u00fcble, and M. Winandy. Trusted Virtual Domains: Color your network. Datenschutz und Datensicherheit (DuD), 5, 2010."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855698.1855710"},{"key":"e_1_3_2_1_8_1","volume-title":"Version 3.1","author":"Project Sponsoring Organisations Common Criteria","year":"2009","unstructured":"Common Criteria Project Sponsoring Organisations . Common Criteria for Information Technology Security Evaluation , Version 3.1 , July 2009 . http:\/\/www.commoncriteriaportal.org\/thecc.html. Common Criteria Project Sponsoring Organisations. Common Criteria for Information Technology Security Evaluation, Version 3.1, July 2009. http:\/\/www.commoncriteriaportal.org\/thecc.html."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314354.1314363"},{"key":"e_1_3_2_1_10_1","unstructured":"Gematik. Einf\u00fchrung der Gesundheitskarte - Gesamtarchitektur Version 1.7.0. http:\/\/www.gematik.de\/upload\/GA_ZentraleDienste_5171.zip August 2009.  Gematik. Einf\u00fchrung der Gesundheitskarte - Gesamtarchitektur Version 1.7.0. http:\/\/www.gematik.de\/upload\/GA_ZentraleDienste_5171.zip August 2009."},{"key":"e_1_3_2_1_11_1","unstructured":"Gematik. Einf\u00fchrung der Gesundheitskarte - Netzwerkspezifikation Version 2.0.0. http:\/\/www.gematik.de\/upload\/GA_ZentraleDienste_5171.zip August 2009.  Gematik. Einf\u00fchrung der Gesundheitskarte - Netzwerkspezifikation Version 2.0.0. http:\/\/www.gematik.de\/upload\/GA_ZentraleDienste_5171.zip August 2009."},{"key":"e_1_3_2_1_12_1","unstructured":"Gematik - Gesellschaft f\u00fcr Telematikanwendungen derGesundheitskarte. http:\/\/www.gematik.de.  Gematik - Gesellschaft f\u00fcr Telematikanwendungen derGesundheitskarte. http:\/\/www.gematik.de."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 1st IEEE Workshop on Hot Topics in System Dependability (HotDep'05)","author":"Griffin J. L.","year":"2005","unstructured":"J. L. Griffin , T. Jaeger , R. Perez , R. Sailer , L. van Doorn , and R. C\u00e1ceres . Trusted Virtual Domains: Toward secure distributed services . In Proceedings of the 1st IEEE Workshop on Hot Topics in System Dependability (HotDep'05) , June 2005 . J. L. Griffin, T. Jaeger, R. Perez, R. Sailer, L. van Doorn, and R. C\u00e1ceres. Trusted Virtual Domains: Toward secure distributed services. In Proceedings of the 1st IEEE Workshop on Hot Topics in System Dependability (HotDep'05), June 2005."},{"key":"e_1_3_2_1_14_1","unstructured":"Health Level Seven International (HL7). http:\/\/www.hl7.org.  Health Level Seven International (HL7). http:\/\/www.hl7.org."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2010.48"},{"key":"e_1_3_2_1_16_1","unstructured":"International Organization for Standardization (ISO). Technical Committee 215 Health Informatics. http:\/\/www.iso.org\/iso\/iso_technical_committee?commid=54960.  International Organization for Standardization (ISO). Technical Committee 215 Health Informatics. http:\/\/www.iso.org\/iso\/iso_technical_committee?commid=54960."},{"key":"e_1_3_2_1_17_1","unstructured":"Kassen\u00e4rztliche Bundesvereinigung. KV-SafeNet homepage. http:\/\/www.kbv.de\/12705.html.  Kassen\u00e4rztliche Bundesvereinigung. KV-SafeNet homepage. http:\/\/www.kbv.de\/12705.html."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/224056.224075"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00587-9_4"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00843-6_34"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2010.110"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2010.53"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2005.07.018"},{"key":"e_1_3_2_1_24_1","unstructured":"D. Sofsian. An introduction to medicalbilling. http:\/\/www.e-healtharticles.com\/Detailed\/1449.html April 2006.  D. Sofsian. An introduction to medicalbilling. http:\/\/www.e-healtharticles.com\/Detailed\/1449.html April 2006."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5220\/0001854000190026"},{"key":"e_1_3_2_1_26_1","first-page":"187","volume-title":"HEALTHINF 2010 - Proceedings of the 3rd International Conference on Health Informatics","author":"Sunyaev A.","year":"2010","unstructured":"A. Sunyaev , J. M. Leimeister , and H. Krcmar . Open security issues in german healthcare telematics . In HEALTHINF 2010 - Proceedings of the 3rd International Conference on Health Informatics , pages 187 -- 194 . INSTICC, 2010 . A. Sunyaev, J. M. Leimeister, and H. Krcmar. Open security issues in german healthcare telematics. In HEALTHINF 2010 - Proceedings of the 3rd International Conference on Health Informatics, pages 187--194. INSTICC, 2010."},{"issue":"2","key":"e_1_3_2_1_27_1","first-page":"103","article-title":"TPM Main Specification","volume":"1","author":"Trusted Computing Group","year":"2007","unstructured":"Trusted Computing Group . TPM Main Specification , Version 1 . 2 rev. 103 , July 2007 . https:\/\/www.trustedcomputinggroup.org. Trusted Computing Group. TPM Main Specification, Version 1.2 rev. 103, July 2007. https:\/\/www.trustedcomputinggroup.org.","journal-title":"Version"}],"event":{"name":"IHI '10: ACM International Health Informatics Symposium","location":"Arlington Virginia USA","acronym":"IHI '10","sponsor":["SIGHIT ACM Special Interest Group on Health Informatics"]},"container-title":["Proceedings of the 1st ACM International Health Informatics Symposium"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1882992.1883024","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1882992.1883024","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:11Z","timestamp":1750243931000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1882992.1883024"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11,11]]},"references-count":26,"alternative-id":["10.1145\/1882992.1883024","10.1145\/1882992"],"URL":"https:\/\/doi.org\/10.1145\/1882992.1883024","relation":{},"subject":[],"published":{"date-parts":[[2010,11,11]]},"assertion":[{"value":"2010-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}