{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:09Z","timestamp":1750221249710,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,27]],"date-time":"2018-08-27T00:00:00Z","timestamp":1535328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,27]]},"DOI":"10.1145\/3230833.3230865","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T12:29:48Z","timestamp":1534163388000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Protecting Patients' Data"],"prefix":"10.1145","author":[{"given":"Mark","family":"Daniels","sequence":"first","affiliation":[{"name":"University of South Carolina, Columbia, SC, USA"}]},{"given":"John","family":"Rose","sequence":"additional","affiliation":[{"name":"University of South Carolina, Columbia, SC, USA"}]},{"given":"Csilla","family":"Farkas","sequence":"additional","affiliation":[{"name":"University of South Carolina, Columbia, SC, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.895801"},{"key":"e_1_3_2_1_2_1","volume-title":"CYBERNETICS AND SYSTEMS 2004 - AT2AI-4: FROM AGENT THEORY TO AGENT IMPLEMENTATION 2004.","author":"Calmet Jacques","year":"2004","unstructured":"Jacques Calmet and Anusch Daemi . 2004 . From Entropy to Ontology . In CYBERNETICS AND SYSTEMS 2004 - AT2AI-4: FROM AGENT THEORY TO AGENT IMPLEMENTATION 2004. Jacques Calmet and Anusch Daemi. 2004. From Entropy to Ontology. In CYBERNETICS AND SYSTEMS 2004 - AT2AI-4: FROM AGENT THEORY TO AGENT IMPLEMENTATION 2004."},{"key":"e_1_3_2_1_3_1","volume-title":"Mitchell","author":"Chan Ellick M.","year":"2013","unstructured":"Ellick M. Chan , Peifung E. Lam , and John C . Mitchell . 2013 . Understanding the Challenges with Medical Data Segmentation for Privacy. In Presented as part of the 2013 USENIX Workshop on Health Information Technologies. USENIX, Washington, D.C. https:\/\/www.usenix.org\/conference\/healthtech13\/workshop-program\/presentation\/Chan Ellick M. Chan, Peifung E. Lam, and John C. Mitchell. 2013. Understanding the Challenges with Medical Data Segmentation for Privacy. In Presented as part of the 2013 USENIX Workshop on Health Information Technologies. USENIX, Washington, D.C. https:\/\/www.usenix.org\/conference\/healthtech13\/workshop-program\/presentation\/Chan"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/BHI.2018.8333426"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2014.348"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772864"},{"volume-title":"Summary of the HIPAA Privacy Rule","author":"Civil Office","key":"e_1_3_2_1_7_1","unstructured":"Office for Civil Rights (OCR). 2013. Summary of the HIPAA Privacy Rule . U.S. Department of Health and Human Services . https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/laws-regulations\/index.html Office for Civil Rights (OCR). 2013. Summary of the HIPAA Privacy Rule. U.S. Department of Health and Human Services. https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/laws-regulations\/index.html"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/968559.968567"},{"volume-title":"Ontology-Based Obfuscation and Anonymisation for Privacy","author":"Iwaya Leonardo H.","key":"e_1_3_2_1_9_1","unstructured":"Leonardo H. Iwaya , Fausto Giunchiglia , Leonardo A. Martucci , Alethia Hume , Simone Fischer-H\u00fcbner , and Ronald Chenu-Abente . 2016. Ontology-Based Obfuscation and Anonymisation for Privacy . Springer International Publishing , Cham , 343--358. Leonardo H. Iwaya, Fausto Giunchiglia, Leonardo A. Martucci, Alethia Hume, Simone Fischer-H\u00fcbner, and Ronald Chenu-Abente. 2016. Ontology-Based Obfuscation and Anonymisation for Privacy. Springer International Publishing, Cham, 343--358."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133058.1133076"},{"key":"e_1_3_2_1_11_1","first-page":"57","article-title":"Ontology-Based Authorization Model for XML Data in Distributed Systems. IGI Global, Hershey, PA, USA","volume":"3","author":"Jain Amit","year":"2010","unstructured":"Amit Jain and Csilla Farkas . 2010 . Ontology-Based Authorization Model for XML Data in Distributed Systems. IGI Global, Hershey, PA, USA , Chapter 3 , 57 -- 82 . Amit Jain and Csilla Farkas. 2010. Ontology-Based Authorization Model for XML Data in Distributed Systems. IGI Global, Hershey, PA, USA, Chapter 3, 57--82.","journal-title":"Chapter"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11606-016-3741-z"}],"event":{"name":"ARES 2018: International Conference on Availability, Reliability and Security","sponsor":["Universit\u00e4t Hamburg Universit\u00e4t Hamburg"],"location":"Hamburg Germany","acronym":"ARES 2018"},"container-title":["Proceedings of the 13th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3230865","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230833.3230865","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:50Z","timestamp":1750212470000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3230865"}},"subtitle":["An Efficient Method for Health Data Privacy"],"short-title":[],"issued":{"date-parts":[[2018,8,27]]},"references-count":12,"alternative-id":["10.1145\/3230833.3230865","10.1145\/3230833"],"URL":"https:\/\/doi.org\/10.1145\/3230833.3230865","relation":{},"subject":[],"published":{"date-parts":[[2018,8,27]]},"assertion":[{"value":"2018-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}