{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T07:13:00Z","timestamp":1771485180248,"version":"3.50.1"},"reference-count":77,"publisher":"Frontiers Media SA","license":[{"start":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T00:00:00Z","timestamp":1771459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100020552","name":"Ministry of Higher Education, Research and Innovation","doi-asserted-by":"publisher","award":["MoHERI\/BFP\/ASU\/2023"],"award-info":[{"award-number":["MoHERI\/BFP\/ASU\/2023"]}],"id":[{"id":"10.13039\/100020552","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["frontiersin.org"],"crossmark-restriction":true},"short-container-title":["Front. Comput. Sci."],"abstract":"<jats:p>The AI-based eGuide platform for healthcare centers in Oman represents a cornerstone of the Sultanate's critical national health infrastructure, underpinning both patient care and national resilience. This paper develops a comprehensive cybersecurity and governance framework to secure the eGuide system against an increasingly complex threat landscape characterized by phishing campaigns, ransomware incidents, and data leakage risks. Building upon global best practices, the study advances a transition from legacy perimeter security models toward a Zero Trust Architecture, ensuring continuous authentication, dynamic authorization, and micro segmentation of services. The framework is reinforced by the adoption of ISO\/IEC 27000 aligned governance, demonstrable compliance with Oman's Personal Data Protection Law (PDPL), the General Data Protection Regulation (GDPR), and the Health Insurance Portability and Accountability Act (HIPAA). Further contribution is the integration of mathematically verified security primitives, including multi-factor authentication, hybrid RBAC cum ABAC access models, and blockchain-enabled audit trails, providing rigorous assurances of privacy, integrity, and accountability. The methodology also incorporates continuous evaluation cycles and penetration testing strategies, enabling proactive detection and mitigation of vulnerabilities. By embedding resilience through architectural scalability, high-availability patterns, and disaster recovery mechanisms, this research positions the eGuide platform as a secure, reliable, and future-ready foundation for Oman's digital health ecosystem.<\/jats:p>","DOI":"10.3389\/fcomp.2026.1719783","type":"journal-article","created":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T06:42:54Z","timestamp":1771483374000},"update-policy":"https:\/\/doi.org\/10.3389\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["From cybersecurity to digital health: an AI-based eGuide framework for Oman's healthcare centers"],"prefix":"10.3389","volume":"8","author":[{"given":"Akbar","family":"Khanan","sequence":"first","affiliation":[{"name":"College of Business Administration, MIS, A'sharqiyah University","place":["Ibra, Oman"]}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yasir Abdelgadir","family":"Mohamed","sequence":"additional","affiliation":[{"name":"College of Business Administration, MIS, A'sharqiyah University","place":["Ibra, Oman"]}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mohamed","family":"Bashir","sequence":"additional","affiliation":[{"name":"College of Business Administration, MIS, A'sharqiyah University","place":["Ibra, Oman"]}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dil Nawaz","family":"Hakro","sequence":"additional","affiliation":[{"name":"Department of Computing and Electronics Engineering, Middle East College","place":["Muscat, Oman"]},{"name":"Department of Software Engineering, University of Sindh","place":["Jamshoro, Pakistan"]}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Danish","family":"Garg","sequence":"additional","affiliation":[{"name":"Department of Computing and Electronics Engineering, Middle East College","place":["Muscat, Oman"]}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1965","published-online":{"date-parts":[[2026,2,19]]},"reference":[{"key":"B1","first-page":"76","volume":"21","author":"Abisoye","year":"2001"},{"key":"B2","doi-asserted-by":"publisher","first-page":"100106","DOI":"10.1016\/j.csa.2025.100106","volume":"3","author":"Ahmadi","year":"2025","journal-title":"Architecture"},{"key":"B3","doi-asserted-by":"publisher","first-page":"101127","DOI":"10.1016\/j.jemep.2025.101127","article-title":"Blockchain and homomorphic encryption for genomic and health data sharing: an ethical perspective","volume":"33","author":"Ahmed","year":"2025","journal-title":"Ethics Med. Public Health"},{"key":"B4","doi-asserted-by":"publisher","first-page":"110649","DOI":"10.1016\/j.compeleceng.2025.110649","article-title":"Next-generation quantum security: the impact of quantum computing on cybersecurity-threats, mitigations, and solutions","volume":"128","author":"Ali","year":"2025","journal-title":"Comp. Electric. Eng. J"},{"key":"B5","first-page":"36","author":"Alshammari","year":"2025","journal-title":"Building a Unified Legislative Framework for the Development and Registration for the Emerging Technologies in the GCC"},{"key":"B6","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.aej.2025.01.051","article-title":"A privacy-preserving and energy efficient authentication protocol for the cloud-based e-healthcare system","volume":"118","author":"Alzahrani","year":"2025","journal-title":"Alexand. Eng. J"},{"key":"B7","doi-asserted-by":"publisher","first-page":"112470","DOI":"10.1016\/j.jss.2025.112470","article-title":"AI-driven decision-making in healthcare information systems: A comprehensive review","volume":"226","author":"Amiri","year":"2025","journal-title":"J. Syst. Softw"},{"key":"B8","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1504\/IJIEM.2010.035624","article-title":"Information security and privacy in healthcare: current state of research","volume":"6","author":"Appari","year":"2010","journal-title":"Int. J. Internet Enterpr. Manage."},{"key":"B9","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/OBD.2016.11","article-title":"\u201cMedrec: using blockchain for medical data access and permission management,\u201d","volume-title":"2016 2nd International Conference on Open and Big Data (OBD)","author":"Azaria","year":"2016"},{"key":"B10","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/S1386-5056(01)00147-2","article-title":"A systematic approach for analysis and design of secure health information systems","volume":"62","author":"Blobel","year":"2025","journal-title":"Int. J. Med. Inform"},{"key":"B11","doi-asserted-by":"publisher","first-page":"110570","DOI":"10.1016\/j.compeleceng.2025.110570","article-title":"Exploring multicepstral features in a new classical machine learning-based framework for replay attack detection","volume":"127","author":"Contreras","year":"2025","journal-title":"Comp. Electric. Eng"},{"key":"B12","doi-asserted-by":"publisher","DOI":"10.1016\/j.crwh.2018.e00060","article-title":"How the writers of case reports need to consider and address consent and the general data protection regulation (GDPR)","author":"Cornock","year":"2018","journal-title":"Case Rep. Womens Health"},{"key":"B13","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1108\/TQM-09-2020-0202","article-title":"The ISO\/IEC 27001 information security management standard: literature review and theory-based research agenda","volume":"33","author":"Culot","year":"2021","journal-title":"The TQM J"},{"key":"B14","doi-asserted-by":"publisher","first-page":"109465","DOI":"10.1016\/j.compeleceng.2024.109465","article-title":"A configurable anonymisation approach for network flow data: Balancing utility and privacy, computers and electrical engineering. Part B","volume":"118","author":"Daly Manocchio","year":"2024","journal-title":"Comp. Electric. Eng"},{"key":"B15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/6510249","article-title":"Health information system role-based access control current security trends and challenges","volume":"2018","author":"De Carvalho Junior","year":"2018","journal-title":"J. Healthc. Eng"},{"key":"B16","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1108\/ICS-01-2020-0004","article-title":"From ISO\/IEC27001:2013 and ISO\/IEC27002:2013 to gdpr compliance controls","volume":"28","author":"Diamantopoulou","year":"2020","journal-title":"Inform. Comp. Secur"},{"key":"B17","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2024.102470","article-title":"Search engine optimization poisoning: a cybersecurity threat analysis and mitigation strategies for small and medium-sized enterprises","author":"Duc","year":"2024","journal-title":"Tech. Soc"},{"key":"B18","author":"Elghani Meliani","year":"2025","journal-title":"Resiliency Focused Proactive Lifecycle Management for Stateful Microservices in Multi-Cluster Containerized Environments, Computer Communications"},{"key":"B19","doi-asserted-by":"publisher","first-page":"101492","DOI":"10.1016\/j.ssaho.2025.101492","article-title":"Navigating the privacy landscape of healthcare-driven AI in the Middle East: case studies from oman, qatar, and Saudi Arabia","volume":"11","author":"El-Khoury","year":"2025","journal-title":"Soc. Sci. Humant. Open"},{"key":"B20","first-page":"315","author":"Fiedler","year":"2017","journal-title":"Challenges of New Technology"},{"key":"B21","doi-asserted-by":"publisher","first-page":"102436","DOI":"10.1016\/j.mnl.2025.05.002","volume":"23","author":"Fleming","year":"2025"},{"key":"B22","doi-asserted-by":"publisher","first-page":"105507","DOI":"10.1016\/j.ijmedinf.2024.105507","article-title":"Hl7 fast healthcare interoperability resources (HL7 FHIR) in digital healthcare ecosystems for chronic disease management: scoping review","volume":"189","author":"Gazzarata","year":"2024","journal-title":"Int. J. Med. Inform"},{"key":"B23","doi-asserted-by":"publisher","first-page":"e57821","DOI":"10.2196\/57821","article-title":"Establishing a digital health care ecosystem in a health sciences university in south africa: Protocol for a mixed methods study","volume":"14","author":"Govender","year":"2025","journal-title":"JMIR Res. Protoc"},{"key":"B24","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1016\/j.aej.2024.12.109","article-title":"Blockchain-enhanced smart contracts for formal verification of IoT access control mechanisms","volume":"118","author":"Guo","year":"2025","journal-title":"Alexand. Eng. J"},{"key":"B25","first-page":"39","author":"Gupta","year":"2025","journal-title":"Cybersecurity Risks and Threats in Healthcare, chapter Chapter 1"},{"key":"B26","doi-asserted-by":"publisher","first-page":"103702","DOI":"10.1016\/j.im.2022.103702","article-title":"Value alignment's role in mitigating resistance to it use: the case of physicians'resistance to electronic health record systems","volume":"59","author":"Heath","year":"2022","journal-title":"Inform. Managem"},{"key":"B27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-65883-3_8","article-title":"\u201cValue-based compliance: integrating integrity and compliance management,\u201d","author":"Herold","year":"2023","journal-title":"Value-Oriented Leadership in Theory and Practice"},{"key":"B28","doi-asserted-by":"publisher","first-page":"714318","DOI":"10.3389\/fnins.2021.714318","article-title":"Fuzzy system based medical image processing for brain disease prediction","volume":"15","author":"Hu","year":"2021","journal-title":"Front. Neurosci"},{"key":"B29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.6028\/NIST.SP.800-162","article-title":"Guide to attribute based access control (ABAC) definition and considerations","volume":"800","author":"Hu","year":"2014","journal-title":"NIST Spec. Publ."},{"key":"B30","doi-asserted-by":"publisher","first-page":"111694","DOI":"10.1016\/j.comnet.2025.111694","article-title":"Traceable and revocable large universe multi-authority attribute-based access control with resisting key abuse","volume":"272","author":"Huang","year":"2025","journal-title":"Comp. Netw"},{"key":"B31","doi-asserted-by":"publisher","first-page":"101589","DOI":"10.1016\/j.rineng.2023.101589","article-title":"Internet of things for smart manufacturing based on advanced encryption standard (aes) algorithm with chaotic system","volume":"20","author":"Huo","year":"2023","journal-title":"Results Eng"},{"key":"B32","author":"Hussain","year":"2025","journal-title":"Management Education Contextualization in Oman: A Multistakeholder Exploration of the Challenges and Changes Needed"},{"key":"B33","doi-asserted-by":"publisher","first-page":"106983","DOI":"10.1016\/j.buildenv.2020.106983","article-title":"A formal methods-based rule verification framework for end-user programming in campus building automation systems","volume":"181","author":"Ibrhim","year":"2020","journal-title":"Build. Environ"},{"key":"B34","doi-asserted-by":"publisher","first-page":"108809","DOI":"10.1016\/j.chb.2025.108809","article-title":"Malicious insider threats in cybersecurity: a fraud triangle and machiavellian perspective","volume":"174","author":"Idensohn","year":"2026","journal-title":"Comp. Human Behav"},{"key":"B35","unstructured":"ISO\/IE\n              C.\n            \n          \n          \n          2022"},{"key":"B36","doi-asserted-by":"publisher","first-page":"103778","DOI":"10.1016\/j.cose.2024.103778","article-title":"M-Rl: A mobility and impersonation-aware ids for ddos udp flooding attacks in IoT-fog networks","volume":"140","author":"Javanmardi","year":"2024","journal-title":"Comp. Secur"},{"key":"B37","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1186\/s13638-025-02431-6","article-title":"Securing fog computing in healthcare with a zero trust approach and blockchain","volume":"2025","author":"Kaur","year":"2025","journal-title":"EURASIPJ. Wirel. Commun. Netw"},{"key":"B38","first-page":"1","author":"Kindervag","year":"2010","journal-title":"Build Security Into Your Network's DNA: The Zero Trust Network Architecture"},{"key":"B39","doi-asserted-by":"publisher","first-page":"102976","DOI":"10.1016\/j.telpol.2025.102976","article-title":"Transforming cybersecurity with agentic ai to combat emerging cyber threats","volume":"49","author":"Kshetri","year":"2025","journal-title":"Telecommun. Policy"},{"key":"B40","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.zemedi.2018.11.002","article-title":"An overview of deep learning in medical imaging focusing on MRI","volume":"29","author":"Lundervold","year":"2019","journal-title":"Z. Medizinische Physik"},{"key":"B41","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1108\/JFEP-01-2024-0013","article-title":"Examining the asymmetric influence of tax revenue policy in an oil-dependent economy: evidence from Oman","volume":"17","author":"Maashani","year":"2025","journal-title":"J. Financ. Econ. Policy"},{"key":"B42","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1016\/j.csi.2005.01.006","article-title":"A structured operational semantic modelling of the dolev-yao threat environment and its composition with cryptographic protocols","volume":"27","author":"Mao","year":"2005","journal-title":"Comp. Stand. Interfaces"},{"key":"B43","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1016\/j.aej.2023.07.059","article-title":"A tempest vulnerability prediction method for cyber security practitioners","volume":"78","author":"Martin","year":"2023","journal-title":"Alexand. Eng. J"},{"key":"B44","doi-asserted-by":"publisher","first-page":"3274","DOI":"10.1016\/j.ifacol.2022.10.131","article-title":"Adopting formal methods on requirements verification and validation for cyber-physical systems: a systematic literature review","volume":"55","author":"Masmoudi","year":"2022","journal-title":"IFAC-PapersOnLine"},{"key":"B45","doi-asserted-by":"publisher","first-page":"1093","DOI":"10.3390\/info16121093","article-title":"The feasibility and acceptability of AI-based eguide for healthcare centers in Oman","volume":"16","author":"Mohamed","year":"2025","journal-title":"Information"},{"key":"B46","doi-asserted-by":"publisher","first-page":"101584","DOI":"10.1016\/j.sftr.2025.101584","article-title":"A survey on health spending and comprehensive eguide for healthcare: challenges, implementation and future directions","volume":"11","author":"Mohamed","year":"2026","journal-title":"Sustain. Futures"},{"key":"B47","doi-asserted-by":"publisher","first-page":"115591","DOI":"10.1016\/j.enbuild.2025.115591","article-title":"Data-driven probabilistic approach to assess electrical plug loads in healthcare facilities","volume":"336","author":"Mousavi","year":"2025","journal-title":"Energy Build"},{"key":"B48","unstructured":"Gaithersburg, MD\n          NIST\n          Cybersecurity Framework V1.1 Core (Excel)\n          \n          2018"},{"key":"B49","year":"2025","journal-title":"National Resilience Strategy: A Vision for a More Resilient Nation"},{"key":"B50","doi-asserted-by":"publisher","first-page":"100156","DOI":"10.1016\/j.bcra.2023.100156","article-title":"Hyperledger fabric platform for healthcare trust relations-proof-of-concept","volume":"4","author":"Nedakovic","year":"2023","journal-title":"Blockchain: Res. Appl"},{"key":"B51","doi-asserted-by":"publisher","first-page":"101299","DOI":"10.1016\/j.csl.2021.101299","article-title":"Towards a unified assessment framework of speech pseudonymisation","volume":"72","author":"No\u00e9","year":"2022","journal-title":"Comp. Speech Lang"},{"key":"B52","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1016\/j.icte.2023.02.007","article-title":"Digitization of healthcare sector: a study on privacy and security concerns","volume":"9","author":"Paul","year":"2023","journal-title":"ICT Express"},{"key":"B53","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.procs.2024.06.157","article-title":"Cyber resilience and healthcare information systems, a systematic review","volume":"239","author":"Pav\u00e3o","year":"2024","journal-title":"Procedia Comput. Sci"},{"key":"B54","doi-asserted-by":"publisher","first-page":"127252","DOI":"10.1016\/j.eswa.2025.127252","article-title":"A community-aware graph neural network applied to geographical location-based representation learning and clustering within gis","volume":"277","author":"Pham","year":"2025","journal-title":"Expert Syst. Appl"},{"key":"B55","doi-asserted-by":"publisher","first-page":"111551","DOI":"10.1016\/j.comnet.2025.111551","article-title":"Threat impact analysis of man-in-the-middle attacks on delay-based geolocation on the internet","volume":"271","author":"Pincu","year":"2025","journal-title":"Comp. Netw"},{"key":"B56","doi-asserted-by":"publisher","first-page":"103744","DOI":"10.1016\/j.compind.2022.103744","article-title":"Information security and value creation: The performance implications of ISO\/IEC 27001","volume":"142","author":"Podrecca","year":"2022","journal-title":"Comp. Industry"},{"key":"B57","first-page":"45","article-title":"The impact of ransomware on healthcare","volume":"35","year":"2021","journal-title":"J. Healthcare Inform. Manage."},{"key":"B58","author":"Portal","year":"2025","journal-title":"Dataset."},{"key":"B59","doi-asserted-by":"publisher","first-page":"3330","DOI":"10.55248\/gengpi.6.0125.0514","volume":"6","author":"Qudus","year":"2025"},{"key":"B60","doi-asserted-by":"publisher","first-page":"100554","DOI":"10.1016\/j.joclim.2025.100554","article-title":"Leveraging digitization to decarbonize healthcare - medication prescribing information as an exemplar","volume":"26","author":"Rahman","year":"2025","journal-title":"J. Climate Change Health"},{"key":"B61","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1016\/j.ncl.2023.03.007","article-title":"Protecting privacy: health insurance portability and accountability act of 1996, twenty-first century cures act, and social media","volume":"41","author":"Rose","year":"2023","journal-title":"Neurol. Clin"},{"key":"B62","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1016\/j.comcom.2023.11.010","volume":"213","author":"Rubio","year":"2024"},{"key":"B63","doi-asserted-by":"publisher","first-page":"769","DOI":"10.32604\/cmc.2025.066753","article-title":"Future-proofing cia triad with authentication for healthcare: integrating hybrid architecture of ML & DL with IDPS for robust iomt security","volume":"85","author":"Saad Awadh Alanazi","year":"2025","journal-title":"Comp. Mater. Continua"},{"key":"B64","doi-asserted-by":"publisher","first-page":"324","DOI":"10.3390\/computers14080324","article-title":"Cybersecurity threats in Saudi healthcare: exploring email communication practices to enhance cybersecurity among healthcare employees in Saudi Arabia","volume":"14","author":"Shadadi","year":"2025","journal-title":"Computers"},{"key":"B65","doi-asserted-by":"publisher","first-page":"101469","DOI":"10.1016\/j.is.2019.101469","article-title":"Design principles for the general data protection regulation (GDPR): a formal concept analysis and its evaluation","volume":"91","author":"Tamburri","year":"2020","journal-title":"Inform. Syst"},{"key":"B66","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1016\/j.jradnu.2025.03.008","article-title":"Evaluation of the compliance rate of patient handover task among nurses at the clinical departments of city children's hospital and associated factors","volume":"44","author":"Thi","year":"2025","journal-title":"J. Radiol. Nurs."},{"key":"B67","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.clsr.2017.05.015","article-title":"EU General Data Protection Regulation: changes and implications for personal data collecting companies","volume":"34","author":"Tikkinen-Piri","year":"2018","journal-title":"Comput. Law Secur. Rev."},{"key":"B68","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1038\/s41591-018-0300-7","article-title":"High-performance medicine: the convergence of human and artificial intelligence","volume":"25","author":"Topol","year":"2019","journal-title":"Nat. Med."},{"key":"B69","doi-asserted-by":"publisher","first-page":"103402","DOI":"10.1016\/j.sysarc.2025.103402","article-title":"A systematic review of multi-factor authentication in digital payment systems: NIST standards alignment and industry implementation analysis","volume":"162","author":"Tran-Truong","year":"2025","journal-title":"J. Syst. Architect"},{"key":"B70","doi-asserted-by":"publisher","first-page":"e34407","DOI":"10.1016\/j.heliyon.2024.e34407","article-title":"Blockchain-enabled ehr access auditing: Enhancing healthcare data security","volume":"10","author":"Ullah","year":"2024","journal-title":"Heliyon"},{"key":"B71","author":"Vaddiparthy","year":"2025","journal-title":"Real-Time AI Code Security Auditing: Automated Vulnerability Detection and Remediation Through Meta-Experimental Analysis."},{"key":"B72","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2025.131537","article-title":"Efficient medical image encryption and attack detection using hyperchaotic fibonacci polynomial convolutional neural network in iot healthcare networks","author":"Veerasekharreddy","year":"2025","journal-title":"Neurocomputing"},{"key":"B73","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/bs.adcom.2024.06.006","article-title":"Chapter four - security, privacy, and trust management of iot and machine learning-based smart healthcare systems","volume":"137","author":"Venkata","year":"2025","journal-title":"Adv. Comp"},{"key":"B74","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1108\/ICS-04-2017-0025","article-title":"Cybersecurity and information security-what goes where?","volume":"26","author":"Von Solms","year":"2018","journal-title":"Inform. Comput. Secur."},{"key":"B75","doi-asserted-by":"publisher","first-page":"e63544","DOI":"10.2196\/63544","article-title":"Medical science data value evaluation model: mixed methods study","volume":"13","author":"Wang","year":"2025","journal-title":"JMIR Med. Inform"},{"key":"B76","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/s10916-016-0574-6","article-title":"Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control","volume":"40","author":"Yue","year":"2016","journal-title":"J. Med. Syst"},{"key":"B77","doi-asserted-by":"publisher","first-page":"17","DOI":"10.7759\/cureus.85446","article-title":"Evolving zero trust architectures for ai-driven cyber threats in healthcare and other high-risk data environments: a systematic review","volume":"6","author":"Zakhmi","year":"2025","journal-title":"Cureus"}],"container-title":["Frontiers in Computer Science"],"original-title":[],"link":[{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/fcomp.2026.1719783\/full","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T06:42:57Z","timestamp":1771483377000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/fcomp.2026.1719783\/full"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,19]]},"references-count":77,"alternative-id":["10.3389\/fcomp.2026.1719783"],"URL":"https:\/\/doi.org\/10.3389\/fcomp.2026.1719783","relation":{},"ISSN":["2624-9898"],"issn-type":[{"value":"2624-9898","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,19]]},"article-number":"1719783"}}