{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:39:13Z","timestamp":1774946353821,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,3,3]],"date-time":"2014-03-03T00:00:00Z","timestamp":1393804800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,3,3]]},"DOI":"10.1145\/2557547.2557576","type":"proceedings-article","created":{"date-parts":[[2014,2,25]],"date-time":"2014-02-25T13:21:11Z","timestamp":1393334471000},"page":"313-320","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Privacy-preserving audit for broker-based health information exchange"],"prefix":"10.1145","author":[{"given":"Se Eun","family":"Oh","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, USA"}]},{"given":"Ji Young","family":"Chun","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, USA"}]},{"given":"Limin","family":"Jia","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, USA"}]},{"given":"Deepak","family":"Garg","sequence":"additional","affiliation":[{"name":"Max Planck Institute for Software Systems, Kaiserslautern and Saarbr\u00fccken, Germany"}]},{"given":"Carl A.","family":"Gunter","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, USA"}]},{"given":"Anupam","family":"Datta","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,3,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Charm: A tool for rapid cryptographic prototyping. http:\/\/www.charm-crypto.com.  Charm: A tool for rapid cryptographic prototyping. http:\/\/www.charm-crypto.com."},{"key":"e_1_3_2_1_2_1","unstructured":"Illinois Prescription Monitoring Program. https:\/\/www.ilpmp.org\/.  Illinois Prescription Monitoring Program. https:\/\/www.ilpmp.org\/."},{"key":"e_1_3_2_1_3_1","volume-title":"4 Security Standards: Technical Safeguards","author":"Security Series HIPAA","year":"2007","unstructured":"HIPAA Security Series , 4 Security Standards: Technical Safeguards . Department of Health and Human Services USA , 2007 . HIPAA Security Series, 4 Security Standards: Technical Safeguards. Department of Health and Human Services USA, 2007."},{"key":"e_1_3_2_1_4_1","volume-title":"HIMSS and RSNA Integrating the Healthcare Enterprise","author":"Integrating","year":"2007","unstructured":"Integrating the healthcare enterprise volume 1 integration profiles. ACC , HIMSS and RSNA Integrating the Healthcare Enterprise , 2007 . Integrating the healthcare enterprise volume 1 integration profiles. ACC, HIMSS and RSNA Integrating the Healthcare Enterprise, 2007."},{"key":"e_1_3_2_1_5_1","volume-title":"HIMSS and RSNA Integrating the Healthcare Enterprise","author":"Infrastructure Technical Framework Supplement IHE IT","year":"2007","unstructured":"IHE IT Infrastructure Technical Framework Supplement 2007 --2008 Cross-Enterprise Document Sharing-b (XDS.b). ACC , HIMSS and RSNA Integrating the Healthcare Enterprise , 2008. IHE IT Infrastructure Technical Framework Supplement 2007--2008 Cross-Enterprise Document Sharing-b (XDS.b). ACC, HIMSS and RSNA Integrating the Healthcare Enterprise, 2008."},{"key":"e_1_3_2_1_6_1","volume-title":"Office of the National Coordinator for Health Information Technology","author":"Security Framework Requirements Privacy","year":"2012","unstructured":"Privacy and Security Framework Requirements and Guidance for the State Health Information Exchange Cooperative Agreement Program . Office of the National Coordinator for Health Information Technology , 2012 . Privacy and Security Framework Requirements and Guidance for the State Health Information Exchange Cooperative Agreement Program. Office of the National Coordinator for Health Information Technology, 2012."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1807707.1807718"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24622-0_5"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14295-6_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9078-6"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_26"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30191-2_41"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.14778\/2047485.2047486"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1136\/amiajnl-2012-001018"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046726"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10278-006-0927-7"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.72"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1136\/amiajnl-2011-000308"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"G. Marshall. Security Audit and Access Accountability Message XML Data Definitions for Healthcare Applications. (September) 2004.  G. Marshall. Security Audit and Access Accountability Message XML Data Definitions for Healthcare Applications. (September) 2004.","DOI":"10.17487\/rfc3881"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-005-6205-y"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/872752.873518"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/317087.317089"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.IR.7497","volume-title":"Security Architecture Design Process for Health Information Exchanges (HIEs)","author":"Scholl M.","year":"2010","unstructured":"M. Scholl , K. Stine , K. Lin , and D. Steinberg . Security Architecture Design Process for Health Information Exchanges (HIEs) . 2010 . M. Scholl, K. Stine, K. Lin, and D. Steinberg. Security Architecture Design Process for Health Information Exchanges (HIEs). 2010."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00468-1_13"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2004.01.029"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1136\/jamia.2010.003673"},{"key":"e_1_3_2_1_27_1","volume-title":"Proc. of NDSS","author":"Waters B. R.","year":"2004","unstructured":"B. R. Waters , D. Balfanz , G. Durfee , and D. K. Smetters . Building an encrypted and searchable audit log . In Proc. of NDSS , 2004 . B. R. Waters, D. Balfanz, G. Durfee, and D. K. Smetters. Building an encrypted and searchable audit log. In Proc. of NDSS, 2004."}],"event":{"name":"CODASPY'14: Fourth ACM Conference on Data and Application Security and Privacy","location":"San Antonio Texas USA","acronym":"CODASPY'14","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 4th ACM conference on Data and application security and privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557547.2557576","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2557547.2557576","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:09:50Z","timestamp":1750234190000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557547.2557576"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,3]]},"references-count":27,"alternative-id":["10.1145\/2557547.2557576","10.1145\/2557547"],"URL":"https:\/\/doi.org\/10.1145\/2557547.2557576","relation":{},"subject":[],"published":{"date-parts":[[2014,3,3]]},"assertion":[{"value":"2014-03-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}