{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T01:24:50Z","timestamp":1773797090651,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,1,28]],"date-time":"2012-01-28T00:00:00Z","timestamp":1327708800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,1,28]]},"DOI":"10.1145\/2110363.2110427","type":"proceedings-article","created":{"date-parts":[[2012,1,31]],"date-time":"2012-01-31T14:49:33Z","timestamp":1328021373000},"page":"573-582","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["An analytical solution for consent management in patient privacy preservation"],"prefix":"10.1145","author":[{"given":"Qihua","family":"Wang","sequence":"first","affiliation":[{"name":"IBM Almaden Research Center, San Jose, CA, USA"}]},{"given":"Hongxia","family":"Jin","sequence":"additional","affiliation":[{"name":"IBM Almaden Research Center, San Jose, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,1,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1287369.1287383"},{"key":"e_1_3_2_1_2_1","volume-title":"Computers and Security","author":"Ardagna C. A.","year":"2010","unstructured":"C. A. Ardagna , S. Capitani Di Vimercati, S. Foresti, T. Grandison, S. Jajodia, and P. Samarati. Access control for smarter healthcare using policy spaces . In Computers and Security , 2010 . C. A. Ardagna, S. Capitani Di Vimercati, S. Foresti, T. Grandison, S. Jajodia, and P. Samarati. Access control for smarter healthcare using policy spaces. In Computers and Security, 2010."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70567-3_20"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2007.26"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/EST.2010.21"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.21"},{"key":"e_1_3_2_1_7_1","unstructured":"Google Health. http:\/\/www.google.com\/health\/.  Google Health. http:\/\/www.google.com\/health\/."},{"key":"e_1_3_2_1_8_1","volume-title":"Horizontal Integration: Broader Access Models for Realizing Information Dominance","author":"Office Jason Program","year":"2004","unstructured":"Jason Program Office . Horizontal Integration: Broader Access Models for Realizing Information Dominance . The MITRE Corporation , Dec. 2004 . Jason Program Office. Horizontal Integration: Broader Access Models for Realizing Information Dominance. The MITRE Corporation, Dec. 2004."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03748-1_8"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1316689.1316701"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755719"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2008.22"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2009.8"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_17_1","unstructured":"The Health Insurance Portability and Accountability Act (HIPAA). http:\/\/http:\/\/www.hhs.gov\/ocr\/privacy\/.  The Health Insurance Portability and Accountability Act (HIPAA). http:\/\/http:\/\/www.hhs.gov\/ocr\/privacy\/."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966969"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/HISB.2011.22"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 28th International Conference on Very Large Databases (VLDB)","author":"Wang Q.","year":"2007","unstructured":"Q. Wang , T. Yu , N. Li , J. Lobo , E. Bertino , K. Irwin , and J.-W. Byun . On the correctness criteria of fine-grained access control in relational databases . In Proceedings of the 28th International Conference on Very Large Databases (VLDB) , Sept. 2007 . Q. Wang, T. Yu, N. Li, J. Lobo, E. Bertino, K. Irwin, and J.-W. Byun. On the correctness criteria of fine-grained access control in relational databases. In Proceedings of the 28th International Conference on Very Large Databases (VLDB), Sept. 2007."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247556"}],"event":{"name":"IHI '12: ACM International Health Informatics Symposium","location":"Miami Florida USA","acronym":"IHI '12","sponsor":["SIGHIT ACM Special Interest Group on Health Informatics"]},"container-title":["Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2110363.2110427","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2110363.2110427","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:18Z","timestamp":1750241178000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2110363.2110427"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1,28]]},"references-count":21,"alternative-id":["10.1145\/2110363.2110427","10.1145\/2110363"],"URL":"https:\/\/doi.org\/10.1145\/2110363.2110427","relation":{},"subject":[],"published":{"date-parts":[[2012,1,28]]},"assertion":[{"value":"2012-01-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}