{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T20:41:51Z","timestamp":1767904911725,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,1]],"date-time":"2010-10-01T00:00:00Z","timestamp":1285891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1145\/1940941.1940961","type":"proceedings-article","created":{"date-parts":[[2011,2,8]],"date-time":"2011-02-08T13:21:09Z","timestamp":1297171269000},"page":"80-93","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["XML security in healthcare web systems"],"prefix":"10.1145","author":[{"given":"Wasim A.","family":"Al-Hamdani","sequence":"first","affiliation":[{"name":"Kentucky State University, East Main, KY"}]}],"member":"320","published-online":{"date-parts":[[2010,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Harold E. R. 2000. FileMaker XML technology overview. Available online from http:\/\/www.filemaker.com  Harold E. R. 2000. FileMaker XML technology overview. Available online from http:\/\/www.filemaker.com"},{"key":"e_1_3_2_1_2_1","unstructured":"Exforsys.com. 2009. XML advantages. Available online from http:\/\/www.exforsys.com\/tutorials\/xml\/xml-advantages.html  Exforsys.com. 2009. XML advantages. Available online from http:\/\/www.exforsys.com\/tutorials\/xml\/xml-advantages.html"},{"key":"e_1_3_2_1_3_1","unstructured":"Exforsys.com. 2009. XML disadvantages. Available online from http:\/\/www.exforsys.com\/tutorials\/xml\/xml-disadvantages.html  Exforsys.com. 2009. XML disadvantages. Available online from http:\/\/www.exforsys.com\/tutorials\/xml\/xml-disadvantages.html"},{"key":"e_1_3_2_1_4_1","unstructured":"W3schools.com. 2009. How can XML be used? Available online from http:\/\/w3sschools.com  W3schools.com. 2009. How can XML be used? Available online from http:\/\/w3sschools.com"},{"key":"e_1_3_2_1_5_1","unstructured":"Bourret R. 2009. XML and databases. Available online from http:\/\/www.rpbourret.com\/xml\/XMLAndDatabases.htm#isxmladatabase  Bourret R. 2009. XML and databases. Available online from http:\/\/www.rpbourret.com\/xml\/XMLAndDatabases.htm#isxmladatabase"},{"key":"e_1_3_2_1_6_1","unstructured":"Wikipedia.org. 2009. XML database. Available online from http:\/\/en.wikipedia.org\/wiki\/XML_database  Wikipedia.org. 2009. XML database. Available online from http:\/\/en.wikipedia.org\/wiki\/XML_database"},{"key":"e_1_3_2_1_7_1","unstructured":"Isgmlug.org. 2009. XML and databases. Available online from http:\/\/www.isgmlug.org\/database.html  Isgmlug.org. 2009. XML and databases. Available online from http:\/\/www.isgmlug.org\/database.html"},{"key":"e_1_3_2_1_8_1","unstructured":"Yu Y. 2005. Benchmarking of native XML database systems. Thesis Submitted in Fulfilment of the Master of Computer Science. University of Wollongong New South Wales Australia.  Yu Y. 2005. Benchmarking of native XML database systems. Thesis Submitted in Fulfilment of the Master of Computer Science. University of Wollongong New South Wales Australia."},{"key":"e_1_3_2_1_9_1","unstructured":"Microsoft. 2008. MSN Encarta. Available online from http:\/\/encarta.msn.com\/  Microsoft. 2008. MSN Encarta. Available online from http:\/\/encarta.msn.com\/"},{"key":"e_1_3_2_1_10_1","unstructured":"Nicola M. Kogan I. Raghu R. Gonzalez A. Schiefer B. &amp; Xie K. 2009. An XML database benchmark: Transaction processing over XML (TPoX) version 1.2. Available online from http:\/\/tpox.sourceforge.net\/  Nicola M. Kogan I. Raghu R. Gonzalez A. Schiefer B. &amp; Xie K. 2009. An XML database benchmark: Transaction processing over XML (TPoX) version 1.2. Available online from http:\/\/tpox.sourceforge.net\/"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the Third International Conference on Information Integration and Web-based Applications &amp; Services (IIWAS). Linz, Austria: the Austrian Computer Society.","author":"Nambiar U.","year":"2001"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/603867.603872"},{"key":"e_1_3_2_1_14_1","unstructured":"Chaudhri A. B. Rashid A. &amp; Zicari R. 2003. XML data management: Native XML and XML-enabled database systems. NJ: Addison-Wesley.   Chaudhri A. B. Rashid A. &amp; Zicari R. 2003. XML data management: Native XML and XML-enabled database systems. NJ: Addison-Wesley."},{"key":"e_1_3_2_1_15_1","unstructured":"Gray J. E. 1993. The benchmark handbook for database and transaction processing systems (2nd ed.). San Francisco: Morgan Kaufmann Publishers.  Gray J. E. 1993. The benchmark handbook for database and transaction processing systems (2nd ed.). San Francisco: Morgan Kaufmann Publishers."},{"key":"e_1_3_2_1_16_1","unstructured":"Oracle.com. 2002. Oracle9i Application Server Security Guide Release 2 (9.0.2) Part Number A90146--01. Available online from http:\/\/www.oracle.com.  Oracle.com. 2002. Oracle9i Application Server Security Guide Release 2 (9.0.2) Part Number A90146--01. Available online from http:\/\/www.oracle.com."},{"key":"e_1_3_2_1_17_1","unstructured":"Hale L. P. 2002. Oracle9i application server security guide release 2 (9.0.2). Available online from http:\/\/www.di.unipi.it\/~ghelli\/didattica\/bdl\/A97329_03\/core.902\/a90146\/title.htm  Hale L. P. 2002. Oracle9i application server security guide release 2 (9.0.2). Available online from http:\/\/www.di.unipi.it\/~ghelli\/didattica\/bdl\/A97329_03\/core.902\/a90146\/title.htm"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/967900.968065"},{"key":"e_1_3_2_1_19_1","volume-title":"MD 20852: Argosy Omnimedia Inc.","author":"Argoc","year":"2006"},{"key":"e_1_3_2_1_20_1","unstructured":"Wikipedia.org. 2009. Privacy. Available online from http:\/\/en.wikipedia.org\/wiki\/Privacy  Wikipedia.org. 2009. Privacy . Available online from http:\/\/en.wikipedia.org\/wiki\/Privacy"},{"key":"e_1_3_2_1_21_1","unstructured":"Sitepoint.com. 2009. Getting started with XML security. Available online from http:\/\/articles.sitepoint.com: http:\/\/articles.sitepoint.com  Sitepoint.com. 2009. Getting started with XML security. Available online from http:\/\/articles.sitepoint.com: http:\/\/articles.sitepoint.com"},{"key":"e_1_3_2_1_22_1","unstructured":"Dournaee B. 2002. XML security. NY: McGraw-Hill Osborne Media.   Dournaee B. 2002. XML security. NY: McGraw-Hill Osborne Media."},{"key":"e_1_3_2_1_24_1","unstructured":"Hirsch F. 2002. Getting started with XML security. Available online from http:\/\/www.sitepoint.com\/article\/getting-started-xml-security.  Hirsch F. 2002. Getting started with XML security. Available online from http:\/\/www.sitepoint.com\/article\/getting-started-xml-security."},{"key":"e_1_3_2_1_25_1","unstructured":"W3C.org. 2007. XML security use cases and requirements. Available online from http:\/\/www.w3.org  W3C.org. 2007. XML security use cases and requirements. Available online from http:\/\/www.w3.org"},{"key":"e_1_3_2_1_26_1","unstructured":"W3C.org. 2008. XML security specifications maintenance working group. Available online from http:\/\/www.w3.org\/  W3C.org. 2008. XML security specifications maintenance working group. Available online from http:\/\/www.w3.org\/"},{"key":"e_1_3_2_1_27_1","unstructured":"Grundy P. 2005. DataPower XML and healthcare services. Available online from http:\/\/healthnex.typepad.com  Grundy P. 2005. DataPower XML and healthcare services. Available online from http:\/\/healthnex.typepad.com"},{"key":"e_1_3_2_1_28_1","unstructured":"Simon E. Madsen P. &amp; Adams C. 2001. An introduction to XML digital signatures. Available online from http:\/\/www.xml.com\/pub\/a\/2001\/08\/08\/xmldsig.html.  Simon E. Madsen P. &amp; Adams C. 2001. An introduction to XML digital signatures. Available online from http:\/\/www.xml.com\/pub\/a\/2001\/08\/08\/xmldsig.html."},{"key":"e_1_3_2_1_29_1","unstructured":"W3C.org. 1999. XML signature requirements. Available online from  W3C.org. 1999. XML signature requirements. Available online from"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1103022.1103026"},{"key":"e_1_3_2_1_31_1","unstructured":"W3C.org. 2009. XML encryption requirements. Available online from http:\/\/www.w3.org\/2000\/11\/15-xml-encryption-req.html  W3C.org. 2009. XML encryption requirements. Available online from http:\/\/www.w3.org\/2000\/11\/15-xml-encryption-req.html"},{"key":"e_1_3_2_1_32_1","unstructured":"Geuer-Pollmann C. 2004. Confidentiality of XML documents by pool encryption. Universit\u00e4t Siegen Institut f\u00fcr Digitale Kommunikationssysteme.  Geuer-Pollmann C. 2004. Confidentiality of XML documents by pool encryption. Universit\u00e4t Siegen Institut f\u00fcr Digitale Kommunikationssysteme."},{"key":"e_1_3_2_1_33_1","unstructured":"W3schools.com. 2009. W3schools.com. Available online from http:\/\/www.w3schools.com\/xmL\/xml_tree.asp  W3schools.com. 2009. W3schools.com. Available online from http:\/\/www.w3schools.com\/xmL\/xml_tree.asp"},{"key":"e_1_3_2_1_34_1","volume-title":"Technical Report No. CIT\/15\/2002: XML security using XSLT","author":"Bartlett R."},{"key":"e_1_3_2_1_35_1","unstructured":"W3C.org. 2009. XML key management (XKMS 2.0) requirements. Available online from http:\/\/www.w3.org\/TR\/xkms2-req  W3C.org. 2009. XML key management (XKMS 2.0) requirements. Available online from http:\/\/www.w3.org\/TR\/xkms2-req"},{"key":"e_1_3_2_1_36_1","unstructured":"Service-architecture.com. 2009. Healthcare XML. Available online from http:\/\/www.service-architecture.com\/xml\/articles\/healthcare_xml.html  Service-architecture.com. 2009. Healthcare XML. Available online from http:\/\/www.service-architecture.com\/xml\/articles\/healthcare_xml.html"},{"key":"e_1_3_2_1_37_1","unstructured":"Dudeck J. 2000. XML Europe 2000 (general introduction). Available online from http:\/\/www.gca.org\/attend\/2000_conferences\/europe_2000\/schedule_friday.htm  Dudeck J. 2000. XML Europe 2000 (general introduction). Available online from http:\/\/www.gca.org\/attend\/2000_conferences\/europe_2000\/schedule_friday.htm"},{"key":"e_1_3_2_1_38_1","unstructured":"Nssn.org. (2009). XML standards. Available online from http:\/\/www.nssn.org\/search\/AdvancedSearch.aspx  Nssn.org. (2009). XML standards. Available online from http:\/\/www.nssn.org\/search\/AdvancedSearch.aspx"},{"key":"e_1_3_2_1_39_1","unstructured":"W3C.org. (2008). XML security working group. Available online from  W3C.org. (2008). XML security working group. Available online from"},{"key":"e_1_3_2_1_40_1","unstructured":"http:\/\/www.w3.org\/2008\/xmlsec\/Nsa.gov. 2005. Fact sheet NSA Suite B cryptography. Available online from http:\/\/www.nsa.gov\/ia\/industry\/crypto_suite_b.cfm  http:\/\/www.w3.org\/2008\/xmlsec\/Nsa.gov. 2005. Fact sheet NSA Suite B cryptography. Available online from http:\/\/www.nsa.gov\/ia\/industry\/crypto_suite_b.cfm"}],"event":{"name":"InfoSecCD '10: 2010 Information Security Curriculum Development Conference","location":"Kennesaw Georgia","acronym":"InfoSecCD '10","sponsor":["KSU - CISE KSU Center for InfoSec Education","ISSA The Metro Atlanta Information Systems Security Association","SIGMIS ACM Special Interest Group on Management Information Systems"]},"container-title":["2010 Information Security Curriculum Development Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1940941.1940961","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1940941.1940961","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:17:50Z","timestamp":1750249070000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1940941.1940961"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":38,"alternative-id":["10.1145\/1940941.1940961","10.1145\/1940941"],"URL":"https:\/\/doi.org\/10.1145\/1940941.1940961","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]},"assertion":[{"value":"2010-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}