{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T23:37:57Z","timestamp":1726097877368},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030589851"},{"type":"electronic","value":"9783030589868"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58986-8_2","type":"book-chapter","created":{"date-parts":[[2020,9,13]],"date-time":"2020-09-13T12:02:13Z","timestamp":1599998533000},"page":"17-31","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Cloud Computing Framework for e-Health Security Requirements and Security Policy Rules Case Study: A European Cloud-Based Health System"],"prefix":"10.1007","author":[{"given":"Dimitra","family":"Georgiou","sequence":"first","affiliation":[]},{"given":"Costas","family":"Lambrinoudakis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,14]]},"reference":[{"key":"2_CR1","unstructured":"Goodwin, L., Courtney, K., Kirby, K.D., Iannacchione, M.A., Manley, T.: A pilot study: patients\u2019 perceptions about the privacy of their medical records. J. Nurs. Inf. 6(3), 1\u201321 (2002)"},{"issue":"11","key":"2_CR2","doi-asserted-by":"publisher","first-page":"1539","DOI":"10.1176\/appi.ps.54.11.1539","volume":"54","author":"H Flynn","year":"2003","unstructured":"Flynn, H., Marcus, S., Kerber, K., Alessi, N.: Patients\u2019 concerns about and perceptions of electronic psychiatric records. Psychiat. Serv. 54(11), 1539\u20131541 (2003)","journal-title":"Psychiat. Serv."},{"key":"2_CR3","unstructured":"Silber, D.: (2003). http:\/\/www.openclinical.org\/e-Health. Accessed 9 Nov 2018"},{"key":"2_CR4","doi-asserted-by":"publisher","unstructured":"Han, S., Skinner, G., Potdar, V., Chang, E.: A framework of authentication and authorization for e-health services 105\u2013106 (2006). https:\/\/doi.org\/10.1145\/1180367.1180387","DOI":"10.1145\/1180367.1180387"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Oh, H., Rizo, C., Enkin, M., Jadad, A.: What is eHealth (3): a systematic review of published definitions. J. Med. Internet Res. 7(1), e1 (2005)","DOI":"10.2196\/jmir.7.1.e1"},{"key":"2_CR6","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1258\/13576330260440871","volume":"8","author":"RE Scott","year":"2002","unstructured":"Scott, R.E., Chowdhury, M.F.U., Varghese, S.: Telehealth policy: looking for global complementarity. Telemed. Telecare 8, 55\u201357 (2002)","journal-title":"Telemed. Telecare"},{"key":"2_CR7","unstructured":"Gematik - gesellschaft fur telematikanwendungen der gesundheitskarte: http:\/\/www.gematik.de. Accessed 27 Nov 2017"},{"key":"2_CR8","first-page":"37","volume":"12","author":"C Chatman","year":"2010","unstructured":"Chatman, C.: How cloud computing is changing the face of health care information technology. J. Health Care Compliance 12, 37\u201370 (2010)","journal-title":"J. Health Care Compliance"},{"key":"2_CR9","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1186\/gm172","volume":"2","author":"JT Dudley","year":"2010","unstructured":"Dudley, J.T., Pouliot, Y., Chen, R., et al.: Translational bioinformatics in the Cloud: an affordable alternative. Genome Med. 2, 51 (2010)","journal-title":"Genome Med."},{"issue":"2","key":"2_CR10","doi-asserted-by":"publisher","first-page":"146","DOI":"10.2345\/0899-8205-45.2.146","volume":"45","author":"J Kabachinski","year":"2011","unstructured":"Kabachinski, J.: What\u2019s the forecast for Cloud Computing in healthcare? Biomed. Instrum. Technol. 45(2), 146\u2013150 (2011). https:\/\/doi.org\/10.2345\/0899-8205-45.2.146","journal-title":"Biomed. Instrum. Technol."},{"key":"2_CR11","unstructured":"Meingast, M., Roosta, T., Sastry, S.: Security and privacy issues with health care information technology. In: Conference Proceedings, vol. 1, pp. 5453\u20135458 (2006). IEEE Eng Med Biol Soc"},{"key":"2_CR12","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1145\/2043174.2043198","volume":"54","author":"V Shmatikov","year":"2011","unstructured":"Shmatikov, V.: Anonymity is not privacy: technical perspective. J. Commun. ACM 54, 132 (2011)","journal-title":"J. Commun. ACM"},{"key":"2_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1007\/978-3-642-23765-2_14","volume-title":"Human-Computer Interaction \u2013 INTERACT 2011","author":"B Reynolds","year":"2011","unstructured":"Reynolds, B., Venkatanathan, J., Gon\u00e7alves, J., Kostakos, V.: Sharing ephemeral information in online social networks: privacy perceptions and behaviours. In: Campos, P., Graham, N., Jorge, J., Nunes, N., Palanque, P., Winckler, M. (eds.) INTERACT 2011. LNCS, vol. 6948, pp. 204\u2013215. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23765-2_14"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-23082-0_1","volume-title":"Foundations of Security Analysis and Design VI","author":"S De Capitani di Vimercati","year":"2011","unstructured":"De Capitani di Vimercati, S., Foresti, S., Livraga, G., Samarati, P.: Protecting privacy in data release. In: Aldini, A., Gorrieri, R. (eds.) FOSAD 2011. LNCS, vol. 6858, pp. 1\u201334. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23082-0_1"},{"key":"2_CR15","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-319-27164-4_4","volume-title":"E-Democracy \u2013 Citizen Rights in the World of the New Computing Paradigms","author":"D Georgiou","year":"2015","unstructured":"Georgiou, D., Lambrinoudakis, C.: Cloud computing security requirements and a methodology for their auditing. In: Katsikas, S.K., Sideridis, A.B. (eds.) e-Democracy 2015. CCIS, vol. 570, pp. 51\u201361. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-27164-4_4"},{"issue":"3\/4","key":"2_CR16","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1504\/IJEG.2017.088217","volume":"9","author":"D Georgiou","year":"2017","unstructured":"Georgiou, D., Lambrinoudakis, C.: Security policy rules and required procedures for two crucial cloud computing threats. Int. J. Electron. Govern. 9(3\/4), 385\u2013403 (2017)","journal-title":"Int. J. Electron. Govern."},{"key":"2_CR17","unstructured":"Georgiou, D., Lambrinoudakis, C.: A security policy for cloud providers the software-as-a-service model. In: Conference: ICIMP 2014: The Ninth International Conference on Internet Monitoring and Protection (2014)"},{"key":"2_CR18","unstructured":"Final European progress report. E-health strategies. www.ehealth-stragies.eu\/report\/report.html. Accessed 10 Nov 2018"},{"key":"2_CR19","unstructured":"European Commission SWD (2012) 413 final (2018)"},{"key":"2_CR20","unstructured":"Communication from the Commission to the Council the European Parliament, the European Economic and Social Committee and the Committee of the Regions, COM(2004) 356: e-Health\u2014making health care better for European citizens: an action plan for a European e-Health Area {SEC(2004) 539}. European Commission, Brussels (2004)"},{"key":"2_CR21","unstructured":"European Commission SWD (2012) 414 final. \u039fn the applicability of the existing EU legal framework to telemedicine services (2018). https:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=SWD:2012:0414:FIN:EN:PDF. Accessed 24 Nov 2018"},{"key":"2_CR22","unstructured":"Action77: Foster EU-wide standards, interoperability testing and certification of e Health: digital Agenda for Europe. http:\/\/ec.europa.eu\/digital-agenda\/en\/pillar-vii-ict-enabled-benefits-eu-society\/action-77-foster-eu-wide-standards-interoperability. Accessed 28 Aug 2018"},{"key":"2_CR23","unstructured":"EU activities in the field of e Health interoperability and standardization: an overview. European Commission (2013, press release)"},{"key":"2_CR24","unstructured":"Europe\u2019s Information Society eHealth portal. http:\/\/europa.eu.int\/information_society\/activities\/health. Accessed 30 Sept 2019"},{"key":"2_CR25","unstructured":"European Commission. eHealth Action Plan 2012\u20132020 - Innovative healthcare for the 21st century (2019). http:\/\/ec.europa.eu\/health\/ehealth\/docs\/com_2012_736_en.pdf. Accessed 12 Dec 2019"},{"key":"2_CR26","unstructured":"European Parliament, Council of the European Union. Decision on adopting a programme of Community action on health monitoring within the framework of action in the field of public health (1997\u20132001) (1400\/97\/EC). Off J EurCommunities, vol. 40, pp. 1\u201310 (1997)"},{"key":"2_CR27","unstructured":"European Parliament, Council of the European Union. Decision on adopting a programme of Community action in the field of public health (2003\u20132008) (1786\/2002\/EC). Off J Eur Union, vol. 45, pp. 1\u201311 (2002)"},{"key":"2_CR28","unstructured":"European Parliament, Council of the European Union. Decision on establishing a second programme of Community action in the field of health (2008\u201313) (1350\/2007\/EC). Off J Eur Union, vol. 50, pp. 3\u201313 (2007)"},{"key":"2_CR29","unstructured":"eHealth Industries Innovation. What is e Health? e Health Industries Innovation (ehi2) Centre, http:\/\/www.ehi2.swan.ac.uk\/en\/what-is-ehealth.htm. Accessed 3 Apr 2014"},{"key":"2_CR30","unstructured":"European Commission. eHealth Action Plan 2012\u20132020 - Innovative healthcare for the 21st century (2012). http:\/\/ec.europa.eu\/health\/ehealth\/docs\/com_2012_736_en.pdf. Accessed 12 Dec 2018"},{"key":"2_CR31","doi-asserted-by":"crossref","unstructured":"Khazaei, H., Misic, J., Misic, V.: Performance analysis of cloud computing centers using M\/G\/m\/m+r. queuing systems IEEE Trans Parallel Distrib. Syst. 23, 5 (2012)","DOI":"10.1109\/TPDS.2011.199"},{"key":"2_CR32","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s00354-008-0081-5","volume":"28","author":"L Wang","year":"2010","unstructured":"Wang, L., von Laszewski, G., Younge, A., et al.: Cloud computing: a perspective study. New Gener. Comput. 28, 137\u2013146 (2010)","journal-title":"New Gener. Comput."},{"key":"2_CR33","volume-title":"Queueing Systems: Theory","author":"L Kleinrock","year":"1975","unstructured":"Kleinrock, L.: Queueing Systems: Theory, vol. 1. Wiley-Interscience, Hoboken (1975)"},{"key":"2_CR34","doi-asserted-by":"crossref","unstructured":"Mao, M., Li, J., Humphrey, M.: Cloud auto-scaling with deadline and budget constraints. In: 2010 11th IEEE\/ACM International Conference on Grid Computing (GRID), pp. 41\u201348 (2010)","DOI":"10.1109\/GRID.2010.5697966"},{"issue":"5","key":"2_CR35","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1145\/1165389.945462","volume":"37","author":"P Barham","year":"2003","unstructured":"Barham, P., Dragovic, B., Fraser, K., et al.: Xen and the art of virtualization. SIGOPS Oper. Syst. Rev. 37(5), 164\u2013177 (2003)","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"2_CR36","unstructured":"WMWare White paper http:\/\/www.vmware.com\/pdf\/virtualization.pdf. Accessed 25 Dec 2017"},{"key":"2_CR37","unstructured":"The Open Stack Project: Open Stack \u2018The open source cloud operating system\u2019. http:\/\/www.openstack.org\/software\/. Accessed 30 Nov 2017"},{"key":"2_CR38","unstructured":"Grance, M.P.: The NIST definition of cloud computing Gaithersburg: NIST Special Publication 800-145, 20899-8930 (2011)"},{"key":"2_CR39","unstructured":"Georgiou, D.: PhD Thesis Security Policies for Cloud Computing (2018)"},{"key":"2_CR40","unstructured":"Cloud Security Alliance, Top threats to Cloud Computing v1.0. https:\/\/cloudsecurityalliance.org\/topthreats\/csathreats.v1.0.pdf. Accessed 15 Nov 2019"},{"key":"2_CR41","unstructured":"Heiser, J., Nicolett, M.: Assessing the Security Risks of Cloud Computing, white paper, Gartner Group, ID Number: G00157782 (2008). Accessed 10 Dec 2018"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58986-8_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T14:47:11Z","timestamp":1619275631000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58986-8_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030589851","9783030589868"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58986-8_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"14 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"TrustBus","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Trust and Privacy in Digital Business","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bratislava","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovakia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"trustbus2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.dexa.org\/trustbus2020","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}