{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T15:14:59Z","timestamp":1726413299453},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"23","license":[{"start":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T00:00:00Z","timestamp":1695945600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T00:00:00Z","timestamp":1695945600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s00500-023-09265-8","type":"journal-article","created":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T17:01:51Z","timestamp":1696006911000},"page":"18165-18180","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Patient\u2019s data privacy and security in mHealth applications: a Charles proxy-based recommendation"],"prefix":"10.1007","volume":"27","author":[{"given":"Ahmed Raza","family":"Rajput","sequence":"first","affiliation":[]},{"given":"Isma","family":"Masood","sequence":"additional","affiliation":[]},{"given":"Almas","family":"Tabassam","sequence":"additional","affiliation":[]},{"given":"Muhammad Shamrooz","family":"Aslam","sequence":"additional","affiliation":[]},{"given":"Zhang","family":"ShaoYu","sequence":"additional","affiliation":[]},{"given":"Mehreen Aslam","family":"Rajput","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,29]]},"reference":[{"issue":"7","key":"9265_CR1","doi-asserted-by":"publisher","first-page":"2297","DOI":"10.1007\/s40815-021-01102-0","volume":"23","author":"A, M. S.","year":"2021","unstructured":"A, M. S. (2021) L 2\u2013L\u221e control for delayed singular markov switch system with nonlinear actuator faults. Int J Fuzzy Syst 23(7):2297\u20132308","journal-title":"Int J Fuzzy Syst"},{"issue":"Suppl 1","key":"9265_CR2","volume":"56","author":"H Abaza","year":"2017","unstructured":"Abaza H, Marschollek M (2017) mHealth application areas and technology combinations: a comparison of literature from high and low\/middle income countries. Methods Inf Med 56(Suppl 1):e105","journal-title":"Methods Inf Med"},{"key":"9265_CR33","doi-asserted-by":"crossref","unstructured":"Adibi S. ed. Mobile health: a technology road map. Vol. 5. Springer, 2015","DOI":"10.1007\/978-3-319-12817-7"},{"key":"9265_CR3","doi-asserted-by":"crossref","unstructured":"Ahmad T (2018) Mobile phones as a learning tool: a lecturer\u2019s viewpoint. Society and Business Review","DOI":"10.1108\/SBR-03-2018-0021"},{"key":"9265_CR4","doi-asserted-by":"crossref","unstructured":"Aliasgari M, Black M, Yadav N (2018) Security Vulnerabilities in Mobile Health Applications. In: 2018 IEEE conference on application, information and network security (AINS). IEEE","DOI":"10.1109\/AINS.2018.8631464"},{"key":"9265_CR5","doi-asserted-by":"crossref","unstructured":"Asaddok N, Ghazali M (2017) A Review on usability, security and privacy for mobile health applications. Int J Innovative Comput 7(1)","DOI":"10.1109\/ICRIIS.2017.8002472"},{"key":"9265_CR6","doi-asserted-by":"crossref","unstructured":"Aslam (2020) Co-design method for H\u221e control of quantized TS fuzzy system over the networked system. J Intell Fuzzy Syst 39(1): 771-788","DOI":"10.3233\/JIFS-191708"},{"issue":"7","key":"9265_CR7","doi-asserted-by":"publisher","first-page":"4029","DOI":"10.1007\/s00500-023-07923-5","volume":"27","author":"Y Boaqun","year":"2023","unstructured":"Boaqun Y, Kumar A, Ali M, Zhang J, Yao J (2023) Jerk-bounded trajectory planning for rotary flexible joint manipulator: an experimental approach. Soft Comput 27(7):4029\u20134039. https:\/\/doi.org\/10.1007\/s00500-023-07923-5","journal-title":"Soft Comput"},{"key":"9265_CR8","doi-asserted-by":"crossref","unstructured":"Braghin C, Cimato S, Della Libera A (2018) Are mHealth apps secure? A case study. In: 2018 IEEE 42nd annual computer software and applications conference (COMPSAC). Vol. 2. IEEE","DOI":"10.1109\/COMPSAC.2018.10253"},{"key":"9265_CR9","doi-asserted-by":"publisher","first-page":"2923","DOI":"10.1007\/s11071-018-4732-x","volume":"95","author":"Z Chen","year":"2019","unstructured":"Chen Z (2019) Observer-based dissipative output feedback control for network T-S fuzzy systems under time delays with mismatch premise. Nonlinear Dyn 95:2923\u20132941","journal-title":"Nonlinear Dyn"},{"key":"9265_CR10","unstructured":"Consulting, Vital Wave (2009) mHealth for development: the opportunity of mobile technology for healthcare in the developing world. Washington Dc and Berkshire, UK"},{"issue":"4","key":"9265_CR11","doi-asserted-by":"publisher","first-page":"1622","DOI":"10.1002\/rnc.4839","volume":"30","author":"X Dai","year":"2020","unstructured":"Dai X, Hou J, Li Q, Ullah R, Ni Z, Liu Y (2020) Reliable control design for composite-driven scheme based on delay networked T-S fuzzy system. Int J Robust Nonlinear Control 30(4):1622\u20131642","journal-title":"Int J Robust Nonlinear Control"},{"key":"9265_CR12","doi-asserted-by":"publisher","first-page":"17","DOI":"10.3390\/electronics6010017","volume":"6","author":"FL De Angelis","year":"2017","unstructured":"De Angelis FL, Di Marzo Serugendo G (2017) SmartContent\u2014self-protected context-aware active documents for mobile environments. Electronics 6:17. https:\/\/doi.org\/10.3390\/electronics6010017","journal-title":"Electronics"},{"key":"9265_CR13","doi-asserted-by":"crossref","unstructured":"Dehling T et al. (2015) Exploring the far side of mobile health: information security and privacy of mobile health apps on iOS and Android. JMIR mHealth and uHealth 3(1): e8.","DOI":"10.2196\/mhealth.3672"},{"key":"9265_CR16","doi-asserted-by":"crossref","unstructured":"Feldner A, Jung Y (2019) Security issues in mobile healthcare applications. In: Proceedings of the 21st International conference on information integration and web-based applications & services","DOI":"10.1145\/3366030.3366106"},{"key":"9265_CR17","unstructured":"Filkins BL et al. (2016) Privacy and security in the era of digital health: what should translational researchers know and do about it?. Am J Trans Res 8(3): 1560."},{"key":"9265_CR18","unstructured":"Germanakos P, Mourlas C, Samaras G (2005) A mobile agent approach for ubiquitous and personalized eHealth information systems. In: Proceedings of the Workshop on \u2018Personalization for e-Health\u2019of the 10th International Conference on User Modeling (UM\u201905)"},{"key":"9265_CR19","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.smhl.2018.01.003","volume":"12","author":"E Greene","year":"2019","unstructured":"Greene E, Proctor P, Kotz D (2019) Secure sharing of mHealth data streams through cryptographically-enforced access control. Smart Health 12:49\u201365","journal-title":"Smart Health"},{"key":"9265_CR20","doi-asserted-by":"publisher","unstructured":"Guo Y, Wu Y, Guo J (2017) Experimental validation of fuzzy PID control of flexible joint system in presence of uncertainties. In: 2017 36th Chinese Control Conference (CCC)\u00a0(pp. 4192\u20134197). IEEE. https:\/\/doi.org\/10.23919\/ChiCC.2017.8028015","DOI":"10.23919\/ChiCC.2017.8028015"},{"key":"9265_CR21","unstructured":"He D et al. (2014) Security concerns in Android mHealth apps. In: AMIA annual symposium proceedings. Vol. 2014. American Medical Informatics Association"},{"key":"9265_CR22","doi-asserted-by":"crossref","unstructured":"Hus\u00e1k M et al. (2016) HTTPS traffic analysis and client identification using passive SSL\/TLS fingerprinting. EURASIP Journal on Information Security 2016(1): 6.","DOI":"10.1186\/s13635-016-0030-7"},{"issue":"11","key":"9265_CR23","doi-asserted-by":"publisher","first-page":"1461","DOI":"10.1049\/cth2.12136","volume":"15","author":"Q Li","year":"2021","unstructured":"Li Q, Hou J (2021) Fault detection for asynchronous T-S fuzzy networked Markov jump systems with new event-triggered scheme. IET Control Theory Appl 15(11):1461\u20131473","journal-title":"IET Control Theory Appl"},{"key":"9265_CR15","doi-asserted-by":"crossref","unstructured":"Mabo T, Swar B, Aghili S (2018) A vulnerability study of mHealth chronic disease management (CDM) applications (apps). World Conference on Information Systems and Technologies. Springer, Cham","DOI":"10.1007\/978-3-319-77703-0_58"},{"key":"9265_CR24","doi-asserted-by":"crossref","unstructured":"Masood I et al. (2018) Towards smart healthcare: Patient data privacy and security in sensor-cloud infrastructure. Wirel Commun Mob Comput 2018","DOI":"10.1155\/2018\/2143897"},{"key":"9265_CR25","doi-asserted-by":"crossref","unstructured":"Mehta P et al. (2020) Reimbursement Patterns and User Experiences in Pediatric Allergy Home Telehealth. Annals of Allergy, Asthma & Immunology","DOI":"10.1016\/j.anai.2020.06.003"},{"key":"9265_CR26","doi-asserted-by":"publisher","first-page":"1196","DOI":"10.3390\/electronics9081196","volume":"9","author":"R Moreira","year":"2020","unstructured":"Moreira R, Teles A, Fialho R, Baluz R, Santos TC, Goulart-Filho R, Rocha L, Silva FJ, Gupta N, Bastos VH, Teixeira S (2020) Mobile applications for assessing human posture: a systematic literature review. Electronics 9:1196. https:\/\/doi.org\/10.3390\/electronics9081196","journal-title":"Electronics"},{"key":"9265_CR14","unstructured":"M\u00f6ller B, Duong T, Kotowicz K (2014) This POODLE bites: exploiting the SSL 3.0 fallback. Security Advisory"},{"key":"9265_CR27","doi-asserted-by":"crossref","unstructured":"Morera EP et al. (2016) Security recommendations for mHealth apps: elaboration of a Developer\u2019s guide. J Med Syst 40(6): 152.","DOI":"10.1007\/s10916-016-0513-6"},{"key":"9265_CR28","doi-asserted-by":"publisher","unstructured":"Muhammad AM, Yin B, Kunar A, Sheikh AM et al. (2020) Reduction of Multiplications in Convolutional Neural Networks. In: 2020 39th Chinese Control Conference (CCC) (pp 7406\u20137411). IEEE. https:\/\/doi.org\/10.23919\/CCC50068.2020.9188843.","DOI":"10.23919\/CCC50068.2020.9188843"},{"key":"9265_CR29","doi-asserted-by":"crossref","unstructured":"Mustafa U, Pflugel E, Philip N (2019) A novel privacy framework for secure m-health applications: The case of the GDPR. In: 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3). IEEE","DOI":"10.1109\/ICGS3.2019.8688019"},{"issue":"10","key":"9265_CR30","doi-asserted-by":"publisher","DOI":"10.2196\/mhealth.7791","volume":"5","author":"J M\u00fcthing","year":"2017","unstructured":"M\u00fcthing J, J\u00e4schke T, Friedrich CM (2017) Client-focused security assessment of mHealth apps and recommended practices to prevent or mitigate transport security issues. JMIR Mhealth Uhealth 5(10):e147","journal-title":"JMIR Mhealth Uhealth"},{"issue":"1","key":"9265_CR31","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.9818","volume":"21","author":"J M\u00fcthing","year":"2019","unstructured":"M\u00fcthing J, Br\u00fcngel R, Friedrich CM (2019) Server-focused security assessment of mobile health apps for popular mobile platforms. J Med Internet Res 21(1):e9818","journal-title":"J Med Internet Res"},{"key":"9265_CR32","doi-asserted-by":"publisher","first-page":"2935","DOI":"10.3390\/electronics10232935","volume":"10","author":"R Nuijten","year":"2021","unstructured":"Nuijten R, Van Gorp P, Khanshan A, Le Blanc P, Kemperman A, van den Berg P, Simons M (2021) Health promotion through monetary incentives: evaluating the impact of different reinforcement schedules on engagement levels with a mHealth app. Electronics 10:2935. https:\/\/doi.org\/10.3390\/electronics10232935","journal-title":"Electronics"},{"key":"9265_CR34","doi-asserted-by":"publisher","first-page":"1152","DOI":"10.1007\/s10489-020-01894-y","volume":"51","author":"AM Shaikh","year":"2021","unstructured":"Shaikh AM, Li Y et al (2021) Pruning filters with L1-norm and capped L1-norm for CNN compression. Appl Intell 51:1152\u20131160. https:\/\/doi.org\/10.1007\/s10489-020-01894-y","journal-title":"Appl Intell"},{"key":"9265_CR35","first-page":"363","volume":"235","author":"M Sharp","year":"2017","unstructured":"Sharp M, O\u2019Sullivan D (2017) Mobile medical apps and mHealth devices: a framework to build medical apps and mHealth devices in an ethical manner to promote safer use-a literature review. Stud Health Technol Inform 235:363\u2013367","journal-title":"Stud Health Technol Inform"},{"key":"9265_CR36","doi-asserted-by":"crossref","unstructured":"Sheffer Y, Holz R, Saint-Andre P (2015) Summarizing known attacks on transport layer security (TLS) and datagram TLS (DTLS). RFC 7457","DOI":"10.17487\/rfc7457"},{"key":"9265_CR37","doi-asserted-by":"crossref","unstructured":"Silva BMC et al. (2019) Towards a cooperative security system for mobile-health applications. Electron Commerce Res 19(3): 629\u2013654.","DOI":"10.1007\/s10660-018-9296-9"},{"issue":"10","key":"9265_CR38","doi-asserted-by":"publisher","first-page":"956","DOI":"10.1056\/NEJMra1806949","volume":"381","author":"I Sim","year":"2019","unstructured":"Sim I (2019) Mobile devices and health. N Engl J Med 381(10):956\u2013968","journal-title":"N Engl J Med"},{"key":"9265_CR39","doi-asserted-by":"crossref","unstructured":"Solanas A et al. (2017) Recent advances in healthcare software: toward context-aware and smart solutions. IEEE Software 34(6): 36\u201340.","DOI":"10.1109\/MS.2017.4121202"},{"key":"9265_CR40","doi-asserted-by":"crossref","unstructured":"Spensky C et al. (2016) Sok: Privacy on mobile devices\u2013it\u2019s complicated. In: Proceedings on privacy enhancing technologies 2016(3): 96\u2013116.","DOI":"10.1515\/popets-2016-0018"},{"key":"9265_CR41","doi-asserted-by":"crossref","unstructured":"Thamilarasu G, Lakin C (2017) A Security Framework for Mobile Health Applications. In: 2017 5th International conference on future internet of things and cloud workshops (FiCloudW). IEEE","DOI":"10.1109\/FiCloudW.2017.96"},{"key":"9265_CR42","doi-asserted-by":"publisher","first-page":"2208","DOI":"10.3390\/electronics9122208","volume":"9","author":"JD Trigo","year":"2020","unstructured":"Trigo JD, Rubio \u00d3J, Mart\u00ednez-Espronceda M, Alesanco \u00c1, Garc\u00eda J, Serrano-Arriezu L (2020) Building standardized and secure mobile health services based on social media. Electronics 9:2208. https:\/\/doi.org\/10.3390\/electronics9122208","journal-title":"Electronics"},{"key":"9265_CR43","doi-asserted-by":"publisher","first-page":"1135","DOI":"10.3390\/electronics9071135","volume":"9","author":"G Tripathi","year":"2020","unstructured":"Tripathi G, Abdul Ahad M, Paiva S (2020) SMS: a secure healthcare model for smart cities. Electronics 9:1135. https:\/\/doi.org\/10.3390\/electronics9071135","journal-title":"Electronics"},{"issue":"16","key":"9265_CR44","doi-asserted-by":"publisher","first-page":"2429","DOI":"10.1049\/iet-cta.2018.5469","volume":"14","author":"R Ullah","year":"2020","unstructured":"Ullah R, Dai X, Sheng A (2020) Event-triggered scheme for fault detection and isolation of non-linear system with time-varying delay. IET Control Theory Appl 14(16):2429\u20132438","journal-title":"IET Control Theory Appl"},{"key":"9265_CR45","unstructured":"Ventola CL (2014) Mobile devices and apps for health care professionals: uses and benefits. Pharmacy and Therapeutics 39(5): 356."},{"issue":"1","key":"9265_CR46","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s40860-017-0038-x","volume":"3","author":"N Vithanwattana","year":"2017","unstructured":"Vithanwattana N, Mapp G, George C (2017) Developing a comprehensive information security framework for mHealth: a detailed analysis. J Reliable Intell Environ 3(1):21\u201339","journal-title":"J Reliable Intell Environ"},{"key":"9265_CR47","doi-asserted-by":"crossref","unstructured":"Vithanwattana N, Mapp G, George C (2016) mHealth-Investigating an information security framework for mHealth data: Challenges and possible solutions. In: 2016 12th International Conference on Intelligent Environments (IE). IEEE","DOI":"10.1109\/IE.2016.59"},{"issue":"1","key":"9265_CR48","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MC.2015.12","volume":"48","author":"R Want","year":"2015","unstructured":"Want R, Schilit BN, Jenson S (2015) Enabling the internet of things. Computer 48(1):28\u201335","journal-title":"Computer"},{"key":"9265_CR49","doi-asserted-by":"publisher","first-page":"4987","DOI":"10.1007\/s00500-023-08026-x","volume":"27","author":"B Yin","year":"2023","unstructured":"Yin B, Aslam MS et al (2023) A practical study of active disturbance rejection control for rotary flexible joint robot manipulator. Soft Comput 27:4987\u20135001. https:\/\/doi.org\/10.1007\/s00500-023-08026-x","journal-title":"Soft Comput"},{"key":"9265_CR50","doi-asserted-by":"publisher","unstructured":"Yin B, Khan J, Wang L, Zhang J, Kumar A (2019) Real-time lane detection and tracking for advanced driver assistance systems. In: 2019 Chinese Control Conference (CCC) (pp 6772\u20136777). IEEE. https:\/\/doi.org\/10.23919\/ChiCC.2019.8866334.","DOI":"10.23919\/ChiCC.2019.8866334"},{"key":"9265_CR51","doi-asserted-by":"publisher","unstructured":"Zhai Q, Yin B et al. (2019) Second-order convolutional network for crowd counting. In: Proc. SPIE 11198, Fourth International Workshop on Pattern Recognition, 111980T; https:\/\/doi.org\/10.1117\/12.2540362.","DOI":"10.1117\/12.2540362"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-023-09265-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-023-09265-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-023-09265-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,13]],"date-time":"2023-10-13T17:15:41Z","timestamp":1697217341000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-023-09265-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,29]]},"references-count":51,"journal-issue":{"issue":"23","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["9265"],"URL":"https:\/\/doi.org\/10.1007\/s00500-023-09265-8","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2023,9,29]]},"assertion":[{"value":"12 September 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 September 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors have not disclosed any competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}