{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:31:43Z","timestamp":1773156703996,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T00:00:00Z","timestamp":1700438400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ARPA-H","award":["SP4701-23-C-0089"],"award-info":[{"award-number":["SP4701-23-C-0089"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,20]]},"DOI":"10.1145\/3689942.3694743","type":"proceedings-article","created":{"date-parts":[[2024,11,22]],"date-time":"2024-11-22T00:21:45Z","timestamp":1732234905000},"page":"53-60","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A Study of Interoperability in Electronic Health Record Software"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-5083-4729","authenticated-orcid":false,"given":"Prashant","family":"Anantharaman","sequence":"first","affiliation":[{"name":"Narf Industries, San Diego, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-2874-7803","authenticated-orcid":false,"given":"Rebecca \".bx\"","family":"Shapiro","sequence":"additional","affiliation":[{"name":"Narf Industries, San Diego, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2673-5820","authenticated-orcid":false,"given":"Vishnupriya","family":"Varadharaju","sequence":"additional","affiliation":[{"name":"Narf Industries, San Diego, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-3698-2650","authenticated-orcid":false,"given":"Michael E.","family":"Locasto","sequence":"additional","affiliation":[{"name":"Narf Industries, San Diego, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--85428--7_7"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocz220"},{"key":"e_1_3_2_1_3_1","volume-title":"Fuzzing: a solution chosen by the FDA to investigate detection of software vulnerabilities. Biomedical instrumentation & technology","author":"Baker Steven D","year":"2014","unstructured":"Steven D Baker. 2014. Fuzzing: a solution chosen by the FDA to investigate detection of software vulnerabilities. Biomedical instrumentation & technology, Vol. 48, s1 (2014), 42--47."},{"key":"e_1_3_2_1_4_1","unstructured":"Noah Barsky. 2024. UnitedHealth Paid Hackers $22 Million Fixes Will Soon Cost Billions. https:\/\/www.forbes.com\/sites\/noahbarsky\/2024\/04\/30\/unitedhealths-16-billion-tally-grossly-understates-cyberattack-cost\/."},{"key":"e_1_3_2_1_5_1","volume-title":"Interoperability: what is it, how can we make it work for clinicians, and how should we measure it in the future? Health services research","author":"Bates David W","year":"2018","unstructured":"David W Bates and Lipika Samal. 2018. Interoperability: what is it, how can we make it work for clinicians, and how should we measure it in the future? Health services research, Vol. 53, 5 (2018), 3270."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2016.12.005"},{"key":"e_1_3_2_1_7_1","unstructured":"Patti Brooks. 2010. Standards and interoperability in healthcare information systems: Current status problems and research issues. (2010) 8 pages."},{"key":"e_1_3_2_1_8_1","unstructured":"Sep Dehpour. 2024. DeepDiff: Deep Difference and search of any Python object\/data. https:\/\/github.com\/seperman\/deepdiff."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocaa238"},{"key":"e_1_3_2_1_10_1","volume-title":"Evelyn JS Hovenga, and Sam Heard","author":"Garde Sebastian","year":"2007","unstructured":"Sebastian Garde, Petra Knaup, Evelyn JS Hovenga, and Sam Heard. 2007. Towards semantic interoperability for electronic health records. Methods of information in medicine, Vol. 46, 03 (2007), 332--343."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocaa092"},{"key":"e_1_3_2_1_12_1","unstructured":"IBM. 2023. Cost of a Data Breach Report. https:\/\/www.ibm.com\/reports\/data-breach."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2007.08.011"},{"key":"e_1_3_2_1_14_1","volume-title":"The HTTP Garden: Discovering Parsing Vulnerabilities in HTTP\/1.1 Implementations by Differential Fuzzing of Request Streams. arXiv preprint arXiv:2405.17737","author":"Kallus Ben","year":"2024","unstructured":"Ben Kallus, Prashant Anantharaman, Michael Locasto, and Sean W Smith. 2024. The HTTP Garden: Discovering Parsing Vulnerabilities in HTTP\/1.1 Implementations by Differential Fuzzing of Request Streams. arXiv preprint arXiv:2405.17737 (2024)."},{"key":"e_1_3_2_1_15_1","volume-title":"Patient and caregiver perceptions of electronic health records interoperability in the NHS and its impact on care quality: A focus group study. medRxiv","author":"Li Edmond","year":"2031","unstructured":"Edmond Li, Olivia Lounsbury, Jonathan Clarke, Hutan Ashrafian, Ara Darzi, and Ana Luisa Neves. 2024. Patient and caregiver perceptions of electronic health records interoperability in the NHS and its impact on care quality: A focus group study. medRxiv, Vol. 01.30, 24302031 (2024), 2024--01."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0--12--819314--3.00002--1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocv189"},{"key":"e_1_3_2_1_18_1","volume-title":"LLC (2016-02--25)","author":"Matherly John","year":"2015","unstructured":"John Matherly. 2015. Complete guide to shodan. Shodan, LLC (2016-02--25), Vol. 1 (2015)."},{"key":"e_1_3_2_1_19_1","unstructured":"Siguza. 2020. Psychic Paper. https:\/\/blog.siguza.net\/psychicpaper\/."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocx079"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-41114-5_38"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocab110"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocab009"}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 Workshop on Cybersecurity in Healthcare"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3689942.3694743","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3689942.3694743","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T02:29:13Z","timestamp":1755916153000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3689942.3694743"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,20]]},"references-count":23,"alternative-id":["10.1145\/3689942.3694743","10.1145\/3689942"],"URL":"https:\/\/doi.org\/10.1145\/3689942.3694743","relation":{},"subject":[],"published":{"date-parts":[[2023,11,20]]},"assertion":[{"value":"2024-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}