{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T01:10:28Z","timestamp":1725671428766},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642292613"},{"type":"electronic","value":"9783642292620"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29262-0_14","type":"book-chapter","created":{"date-parts":[[2012,3,27]],"date-time":"2012-03-27T13:27:19Z","timestamp":1332854839000},"page":"97-104","source":"Crossref","is-referenced-by-count":3,"title":["The Process of Policy Authoring of Patient-Controlled Privacy Preferences"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Trojer","sequence":"first","affiliation":[]},{"given":"Basel","family":"Katt","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Schabetsberger","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Mair","sequence":"additional","affiliation":[]},{"given":"Ruth","family":"Breu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"European Commision. Directive 95\/46\/EC, Data Protection Directive (1995)"},{"key":"14_CR2","unstructured":"IBM Austria. Feasibility Study for implementing the electronic health record (ELGA) in the Austrian health system (2006)"},{"key":"14_CR3","unstructured":"IHE. IT Infrastructure (ITI) Technical Framework. Integration Profiles, vol. 1"},{"key":"14_CR4","unstructured":"IHE. IT Infrastructure Access Control (White Paper) (2009)"},{"key":"14_CR5","unstructured":"IHE. IT Infrastructure (ITI) Technical Framework, Supplement, Healthcare provider directory (HPD) (2010)"},{"key":"14_CR6","unstructured":"ISO. ISO\/IEC 10181-3:1996 Information technology \u2013 Open Systems Interconnection \u2013 Security frameworks for open systems: Access control framework (1996)"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Karat, C., Karat, J., Brodie, C., Feng, J.: Evaluating interfaces for privacy policy rule authoring. In: CHI 2006. ACM (2006)","DOI":"10.1145\/1124772.1124787"},{"key":"14_CR8","series-title":"LNCSIT","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-642-00413-1_18","volume-title":"Electronic Healthcare","author":"B. Katt","year":"2009","unstructured":"Katt, B., Breu, R., Hafner, M., Schabetsberger, T., Mair, R., Wozak, F.: Privacy and Access Control for IHE-Based Systems. In: Weerasinghe, D. (ed.) eHealth 2008. LNCSIT, vol.\u00a01, pp. 145\u2013153. Springer, Heidelberg (2009)"},{"key":"14_CR9","unstructured":"Kotschy, W.: STRING ELGA Datenschutzrechtliche Analyse (German, Electronic health record \u2013 Data privacy aspects). Austrian Federal Ministry of Health (2005)"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"LeMay, M., Fatemieh, O., Gunter, C.A.: PolicyMorph: Interactive Policy Transformations for a Logical Attribute-Based Access Control Framework. In: SACMAT 2007. ACM (2007)","DOI":"10.1145\/1266840.1266874"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Moffett, J.D., Sloman, M.S.: Policy conflict analysis in distributed system management (1993)","DOI":"10.1109\/49.257932"},{"key":"14_CR12","unstructured":"OASIS. eXtensible Access Control Markup Language (XACML) v2.0 (2005)"},{"key":"14_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-540-74800-7_11","volume-title":"Human-Computer Interaction \u2013 INTERACT 2007","author":"R.W. Reeder","year":"2007","unstructured":"Reeder, R.W., Karat, C.-M., Karat, J., Brodie, C.: Usability Challenges in Security and Privacy Policy-Authoring Interfaces. In: Baranauskas, C., Abascal, J., Barbosa, S.D.J. (eds.) INTERACT 2007. LNCS, vol.\u00a04663, pp. 141\u2013155. Springer, Heidelberg (2007)"},{"key":"14_CR14","series-title":"LNICT","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-23635-8_1","volume-title":"Electronic Healthcare","author":"T. Trojer","year":"2011","unstructured":"Trojer, T., Katt, B., Wozak, F., Schabetsberger, T.: An Authoring Framework for Security Policies: A Use-Case within the Healthcare Domain. In: Szomszor, M., Kostkova, P. (eds.) e-Health 2010. LNICT, vol.\u00a069, pp. 1\u20139. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Electronic Healthcare"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29262-0_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T02:13:56Z","timestamp":1556504036000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29262-0_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642292613","9783642292620"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29262-0_14","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2012]]}}}