{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T16:09:56Z","timestamp":1725984596850},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319937960"},{"type":"electronic","value":"9783319937977"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-93797-7_15","type":"book-chapter","created":{"date-parts":[[2018,7,20]],"date-time":"2018-07-20T12:54:11Z","timestamp":1532091251000},"page":"134-143","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Privacy Preserving and Resilient Cloudified IoT Architecture to Support eHealth Systems"],"prefix":"10.1007","author":[{"given":"Jarkko","family":"Paavola","sequence":"first","affiliation":[]},{"given":"Jani","family":"Ekqvist","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,17]]},"reference":[{"key":"15_CR1","unstructured":"Industrial Internet Consortium. http:\/\/www.iiconsortium.org\/"},{"key":"15_CR2","unstructured":"Microsoft. https:\/\/www.microsoft.com\/en-us\/internet-of-things\/healthcare"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Botta, A., de Donato, W., Persico, V., Pescap\u00e9, A.: On the integration of cloud computing and Internet of Things. In: 2014 International Conference on Future Internet of Things and Cloud (FiCloud), pp. 23\u201330. IEEE Press, New York (2014)","DOI":"10.1109\/FiCloud.2014.14"},{"key":"15_CR4","unstructured":"General Data Protection Regulation (EU) 2016\/679. http:\/\/eur-lex.europa.eu\/legal-content\/en\/TXT\/?uri=CELEX%3A32016R0679"},{"key":"15_CR5","unstructured":"Ida, I.B., Jemai, A., Loukil, A.: A survey on security of IoT in the context of eHealth and clouds. In: 11th International Design & Test Symposium (IDT), pp. 25\u201330. IEEE Press, New York (2016)"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Supriya, S., Padaki, S.: Data security and privacy challenges in adopting solutions for IOT. In: 2016 IEEE International Conference on Internet of Things (iThings), pp. 410\u2013415. IEEE Press, New York (2016)","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.97"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Sawand, A., Djahel, S., Zhang, Z., Na\u00eft-Abdesselam, F.: Multidisciplinary approaches to achieving efficient and trustworthy eHealth monitoring systems. In: IEEE\/CIC ICCC 2014 Symposium on Privacy and Security in Communications, pp. 187\u2013192. IEEE Press, New York (2014)","DOI":"10.1109\/ICCChina.2014.7008269"},{"key":"15_CR8","unstructured":"Henkil\u00f6tietolaki 523\/1999. http:\/\/www.finlex.fi\/fi\/laki\/ajantasa\/1999\/19990523"},{"key":"15_CR9","unstructured":"Valtioneuvoston asetus v\u00e4est\u00f6tietoj\u00e4rjestelm\u00e4st\u00e4 25.2.2010\/128. http:\/\/www.finlex.fi\/fi\/laki\/ajantasa\/2010\/20100128"},{"key":"15_CR10","unstructured":"PCI Data Security Standard Information Supplement: PCI DSS Tokenization Guidelines. https:\/\/www.pcisecuritystandards.org\/documents\/Tokenization_Guidelines_Info_Supplement.pdf"},{"key":"15_CR11","unstructured":"ISO\/IEC PRF 20922. https:\/\/www.iso.org\/standard\/69466.html"},{"key":"15_CR12","unstructured":"Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing. https:\/\/downloads.cloudsecurityalliance.org\/assets\/research\/security-guidance\/csaguide.v3.0.pdf"},{"key":"15_CR13","unstructured":"ENISA: Recommended cryptographic measures \u2013 securing personal data. https:\/\/www.enisa.europa.eu\/publications\/recommended-cryptographic-measures-securing-personal-data"},{"key":"15_CR14","unstructured":"NIST: Special Publication 800-175B: Guideline for Using Cryptographic Standards in Federal Government: Cryptographic Mechanisms. https:\/\/www.nist.gov\/publications\/guideline-using-cryptographic-standards-federal-government-cryptographic-mechanisms"},{"key":"15_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-319-19962-7_3","volume-title":"Information Security and Privacy","author":"B Tao","year":"2015","unstructured":"Tao, B., Wu, H.: Improving the biclique cryptanalysis of AES. In: Foo, E., Stebila, D. (eds.) ACISP 2015. LNCS, vol. 9144, pp. 39\u201356. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-19962-7_3"},{"key":"15_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-642-34047-5_15","volume-title":"Fast Software Encryption","author":"D Khovratovich","year":"2012","unstructured":"Khovratovich, D., Rechberger, C., Savelieva, A.: Bicliques for preimages: attacks on Skein-512 and the SHA-2 family. In: Canteaut, A. (ed.) FSE 2012. LNCS, vol. 7549, pp. 244\u2013263. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34047-5_15"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Interoperability, Safety and Security in IoT"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-93797-7_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,20]],"date-time":"2019-10-20T23:09:32Z","timestamp":1571612972000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-93797-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319937960","9783319937977"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-93797-7_15","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}