{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T20:10:08Z","timestamp":1755893408892,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,19]],"date-time":"2024-06-19T00:00:00Z","timestamp":1718755200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,19]]},"DOI":"10.1145\/3714393.3726512","type":"proceedings-article","created":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T18:38:47Z","timestamp":1749062327000},"page":"119-130","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Proof of Compliance (PoC): A Consensus Mechanism to Verify the Compliance with Informed Consent Policy in Healthcare"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1700-7201","authenticated-orcid":false,"given":"Md","family":"Al Amin","sequence":"first","affiliation":[{"name":"Colorado State University, Fort Collins, Colorado, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-7778-5845","authenticated-orcid":false,"given":"Hemanth","family":"Tummala","sequence":"additional","affiliation":[{"name":"Colorado State University, Fort Collins, Colorado, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-5658-0950","authenticated-orcid":false,"given":"Rushabh","family":"Shah","sequence":"additional","affiliation":[{"name":"Colorado State University, Fort Collins, Colorado, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3612-7738","authenticated-orcid":false,"given":"Indrajit","family":"Ray","sequence":"additional","affiliation":[{"name":"Colorado State University, Fort Collins, Colorado, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5220\/0012090600003555"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5220\/0012767400003767"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerComWorkshops51409.2021.9430954"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3130515.3130518"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064033"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318041.3355467"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103539"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph19158947"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_12"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294279"},{"key":"e_1_3_2_1_11_1","volume-title":"International Journal of Healthcare Management","author":"Highfill Tina","year":"2019","unstructured":"Tina Highfill. 2019. Do hospitals with electronic health records have lower costs? A systematic review and meta-analysis. International Journal of Healthcare Management (2019)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1108\/IJQSS-12-2016-0081"},{"volume-title":"Trusted Compliance Enforcement Framework for Sharing Health Big Data. In 2021 IEEE International Conference on Big Data (Big Data). IEEE","author":"Elluri Lavanya","key":"e_1_3_2_1_13_1","unstructured":"Dae-young Kim, Lavanya Elluri, and Karuna P. Joshi. 2021. Trusted Compliance Enforcement Framework for Sharing Health Big Data. In 2021 IEEE International Conference on Big Data (Big Data). IEEE, Baltimore, MD, USA, 4715--4724."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616251"},{"key":"e_1_3_2_1_15_1","volume-title":"Clinical benefits of electronic health record use: national findings. Health services research","author":"King Jennifer","year":"2014","unstructured":"Jennifer King, Vaishali Patel, Eric W Jamoom, and Michael F Furukawa. 2014. Clinical benefits of electronic health record use: national findings. Health services research, Vol. 49, 1pt2 (2014), 392--404."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.accinf.2021.100523"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1136\/amiajnl-2012-000906"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.002"},{"key":"e_1_3_2_1_19_1","volume-title":"Healthcare data security technology: HIPAA compliance. Wireless communications and mobile computing","author":"Mbonihankuye Scholas","year":"2019","unstructured":"Scholas Mbonihankuye, Athanase Nkunzimana, and Ange Ndagijimana. 2019. Healthcare data security technology: HIPAA compliance. Wireless communications and mobile computing, Vol. 2019 (2019), 1--7."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.3390\/blockchains2030013"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.2967\/jnmt.119.227819"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1111\/ijau.12049"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3120690"},{"key":"e_1_3_2_1_24_1","first-page":"228","article-title":"An introduction to docker and analysis of its performance","volume":"17","author":"Rad Babak Bashari","year":"2017","unstructured":"Babak Bashari Rad, Harrison John Bhatti, and Mohammad Ahmadi. 2017. An introduction to docker and analysis of its performance. International Journal of Computer Science and Network Security (IJCSNS), Vol. 17, 3 (2017), 228.","journal-title":"International Journal of Computer Science and Network Security (IJCSNS)"},{"key":"e_1_3_2_1_25_1","volume-title":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC). IEEE, 655--658","author":"Vasantha Rani B","year":"2022","unstructured":"B Vasantha Rani and Parminder Singh. 2022. A survey on electronic health records (EHRS): Challenges and solutions. In 2022 6th International Conference on Computing Methodologies and Communication (ICCMC). IEEE, 655--658."},{"key":"e_1_3_2_1_26_1","unstructured":"Office for Civil Rights (OCR). 2008. HIPAA Enforcement. https:\/\/www.hhs.gov\/hipaa\/for-professionals\/compliance-enforcement\/index.html Last Modified: 2021-06--28T08:59:34-0400."},{"key":"e_1_3_2_1_27_1","first-page":"40","article-title":"Using electronic health records to improve quality and efficiency: the experiences of leading hospitals","volume":"17","author":"Silow-Carroll Sharon","year":"2012","unstructured":"Sharon Silow-Carroll, Jennifer N Edwards, and Diana Rodin. 2012. Using electronic health records to improve quality and efficiency: the experiences of leading hospitals. Issue Brief (Commonw Fund), Vol. 17, 1 (2012), 40.","journal-title":"Issue Brief (Commonw Fund)"},{"key":"e_1_3_2_1_28_1","volume-title":"Compliance Aware Cross-Organization Medical Record Sharing. IEEE Symposium on Integrated Network Management","author":"Stevovic Jovan","year":"2023","unstructured":"Jovan Stevovic, Fabio Casati, Bilal Farraj, Jun Li, Hamid R. Motahari-Nezhad, and Giampaolo Armellin. 2023. Compliance Aware Cross-Organization Medical Record Sharing. IEEE Symposium on Integrated Network Management (2023)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.32861\/bmer.81.1.11"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57959-7"}],"event":{"name":"CODASPY '25: Fifteenth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Pittsburgh PA USA","acronym":"CODASPY '25"},"container-title":["Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3714393.3726512","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3714393.3726512","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T19:56:28Z","timestamp":1755892588000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3714393.3726512"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,19]]},"references-count":30,"alternative-id":["10.1145\/3714393.3726512","10.1145\/3714393"],"URL":"https:\/\/doi.org\/10.1145\/3714393.3726512","relation":{},"subject":[],"published":{"date-parts":[[2024,6,19]]},"assertion":[{"value":"2025-06-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}