{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T16:04:28Z","timestamp":1724774668250},"reference-count":43,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,5,5]],"date-time":"2024-05-05T00:00:00Z","timestamp":1714867200000},"content-version":"am","delay-in-days":612,"URL":"http:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001807","name":"State of Sao Paulo Research Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001807","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002322","name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Future Generation Computer Systems"],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1016\/j.future.2022.04.017","type":"journal-article","created":{"date-parts":[[2022,4,22]],"date-time":"2022-04-22T01:09:14Z","timestamp":1650589754000},"page":"348-360","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":16,"special_numbering":"C","title":["A blockchain-based protocol for tracking user access to shared medical imaging"],"prefix":"10.1016","volume":"134","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-8563-8051","authenticated-orcid":false,"given":"Erikson J.","family":"de Aguiar","sequence":"first","affiliation":[]},{"given":"Alyson J.","family":"dos Santos","sequence":"additional","affiliation":[]},{"given":"Rodolfo I.","family":"Meneguette","sequence":"additional","affiliation":[]},{"given":"Robson E.","family":"De Grande","sequence":"additional","affiliation":[]},{"given":"J\u00f3","family":"Ueyama","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.future.2022.04.017_b1","doi-asserted-by":"crossref","first-page":"133","DOI":"10.3390\/healthcare8020133","article-title":"Healthcare data breaches: Insights and implications","volume":"8","author":"Seh","year":"2020","journal-title":"Healthcare"},{"key":"10.1016\/j.future.2022.04.017_b2","doi-asserted-by":"crossref","first-page":"164908","DOI":"10.1109\/ACCESS.2019.2950872","article-title":"Privacy-preserving solutions for blockchain: Review and challenges","volume":"7","author":"Bernal Bernabe","year":"2019","journal-title":"IEEE Access"},{"issue":"8","key":"10.1016\/j.future.2022.04.017_b3","doi-asserted-by":"crossref","first-page":"815","DOI":"10.1016\/j.healthpol.2018.05.002","article-title":"Personal health records, global policy and regulation review","volume":"122","author":"Flaumenhaft","year":"2018","journal-title":"Health Policy"},{"issue":"3","key":"10.1016\/j.future.2022.04.017_b4","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1007\/s10278-018-0073-z","article-title":"DICOMweb: Background and application of the web standard for medical imaging","volume":"31","author":"Genereaux","year":"2018","journal-title":"J. Digit. Imaging"},{"key":"10.1016\/j.future.2022.04.017_b5","doi-asserted-by":"crossref","first-page":"147782","DOI":"10.1109\/ACCESS.2019.2946373","article-title":"Using blockchain for electronic health records","volume":"7","author":"Shahnaz","year":"2019","journal-title":"IEEE Access"},{"issue":"3","key":"10.1016\/j.future.2022.04.017_b6","doi-asserted-by":"crossref","first-page":"726","DOI":"10.1007\/s10278-019-00310-3","article-title":"Blockchain technology: Principles and applications in medical imaging","volume":"33","author":"McBee","year":"2020","journal-title":"J. Digit. Imaging"},{"issue":"3","key":"10.1016\/j.future.2022.04.017_b7","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1007\/s10729-019-09490-4","article-title":"A privacy protection method for health care big data management based on risk access control","volume":"23","author":"Shi","year":"2019","journal-title":"Health Care Manage. Sci."},{"key":"10.1016\/j.future.2022.04.017_b8","doi-asserted-by":"crossref","first-page":"149935","DOI":"10.1109\/ACCESS.2019.2947613","article-title":"Lightweight blockchain for healthcare","volume":"7","author":"Ismail","year":"2019","journal-title":"IEEE Access"},{"issue":"2","key":"10.1016\/j.future.2022.04.017_b9","first-page":"27","article-title":"A survey of blockchain-based strategies for healthcare","volume":"53","author":"De\u00a0Aguiar","year":"2020","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.future.2022.04.017_b10","doi-asserted-by":"crossref","first-page":"61656","DOI":"10.1109\/ACCESS.2019.2916503","article-title":"A review of secure and privacy-preserving medical data sharing","volume":"7","author":"Jin","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.future.2022.04.017_b11","article-title":"A framework for secure and decentralized sharing of medical imaging data via blockchain consensus","volume":"25","author":"Patel","year":"2018","journal-title":"Health Inform. J."},{"issue":"1","key":"10.1016\/j.future.2022.04.017_b12","doi-asserted-by":"crossref","DOI":"10.1186\/1472-6963-14-370","article-title":"Implementing electronic health records in hospitals: a systematic literature review","volume":"14","author":"Boonstra","year":"2014","journal-title":"BMC Health Serv. Res."},{"key":"10.1016\/j.future.2022.04.017_b13","series-title":"The EU General Data Protection Regulation (GDPR): A Practical Guide","author":"Voigt","year":"2017"},{"issue":"8","key":"10.1016\/j.future.2022.04.017_b14","doi-asserted-by":"crossref","first-page":"10599","DOI":"10.1007\/s11042-015-3127-y","article-title":"Information hiding in medical images: A robust medical image watermarking system for E-healthcare","volume":"76","author":"Parah","year":"2017","journal-title":"Multimedia Tools Appl."},{"issue":"12","key":"10.1016\/j.future.2022.04.017_b15","doi-asserted-by":"crossref","first-page":"16433","DOI":"10.1007\/s11042-018-7029-7","article-title":"ROI-based reversible watermarking scheme for ensuring the integrity and authenticity of DICOM MR images","volume":"78","author":"Qasim","year":"2019","journal-title":"Multimedia Tools Appl."},{"key":"10.1016\/j.future.2022.04.017_b16","doi-asserted-by":"crossref","unstructured":"A. ur\u00a0Rahman, K. Sultan, N. Aldhafferi, A. Alqahtani, M. Mahmud, Reversible and fragile watermarking for medical images, 2018 (2018) 1\u20137. http:\/\/dx.doi.org\/10.1155\/2018\/3461382.","DOI":"10.1155\/2018\/3461382"},{"issue":"1","key":"10.1016\/j.future.2022.04.017_b17","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1007\/s10278-019-00243-x","article-title":"Towards an information infrastructure for medical image sharing","volume":"33","author":"Motta","year":"2020","journal-title":"J. Digit. Imaging"},{"issue":"5","key":"10.1016\/j.future.2022.04.017_b18","doi-asserted-by":"crossref","first-page":"955","DOI":"10.1109\/JSTSP.2020.3002391","article-title":"Robust detection of image operator chain with two-stream convolutional neural network","volume":"14","author":"Liao","year":"2020","journal-title":"IEEE J. Sel. Top. Sign. Proces."},{"key":"10.1016\/j.future.2022.04.017_b19","article-title":"Adaptive payload distribution in multiple images steganography based on image texture features","author":"Liao","year":"2020","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"3","key":"10.1016\/j.future.2022.04.017_b20","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1109\/TCSVT.2019.2896270","article-title":"A new payload partition strategy in color image steganography","volume":"30","author":"Liao","year":"2020","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.future.2022.04.017_b21","doi-asserted-by":"crossref","first-page":"21196","DOI":"10.1109\/ACCESS.2020.2969881","article-title":"A systematic review of blockchain in healthcare: Frameworks, prototypes, and implementations","volume":"8","author":"Chukwu","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.future.2022.04.017_b22","series-title":"Proceedings of the Thirteenth EuroSys Conference","first-page":"15","article-title":"Hyperledger fabric: A distributed operating system for permissioned blockchains","author":"Androulaki","year":"2018"},{"key":"10.1016\/j.future.2022.04.017_b23","series-title":"2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings","first-page":"1","article-title":"BPDS: A blockchain based privacy-preserving data sharing for electronic medical records","author":"Liu","year":"2018"},{"key":"10.1016\/j.future.2022.04.017_b24","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2020.106587","article-title":"An incentive mechanism for data sharing based on blockchain with smart contracts","volume":"83","author":"Xuan","year":"2020","journal-title":"Comput. Electr. Eng."},{"key":"10.1016\/j.future.2022.04.017_b25","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1016\/j.future.2018.12.044","article-title":"Privacy-friendly platform for healthcare data in cloud based on blockchain environment","volume":"95","author":"Al-Omar","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"issue":"6","key":"10.1016\/j.future.2022.04.017_b26","doi-asserted-by":"crossref","first-page":"1207","DOI":"10.3390\/app9061207","article-title":"MedChain: Efficient healthcare data sharing via blockchain","volume":"9","author":"Shen","year":"2019","journal-title":"Appl. Sci."},{"issue":"3","key":"10.1016\/j.future.2022.04.017_b27","doi-asserted-by":"crossref","first-page":"781","DOI":"10.1148\/radiol.2019190613","article-title":"A roadmap for foundational research on artificial intelligence in medical imaging: From the 2018 NIH\/RSNA\/ACR\/the academy workshop","volume":"291","author":"Langlotz","year":"2019","journal-title":"Radiology"},{"key":"10.1016\/j.future.2022.04.017_b28","series-title":"Companion of the World Wide Web Conference","first-page":"819","article-title":"After Brazil\u2019s general data protection law: Authorization in decentralized web applications","author":"Silva","year":"2019"},{"key":"10.1016\/j.future.2022.04.017_b29","series-title":"Advances in Computing and Network Communications","first-page":"643","article-title":"Multiple hashing using SHA-256 and MD5","author":"Reddy","year":"2021"},{"key":"10.1016\/j.future.2022.04.017_b30","article-title":"A blockchain based approach for the definition of auditable access control systems","volume":"84","author":"Maesa","year":"2019","journal-title":"Comput. Secur."},{"issue":"12","key":"10.1016\/j.future.2022.04.017_b31","doi-asserted-by":"crossref","first-page":"9895","DOI":"10.1007\/s13369-020-04950-4","article-title":"Blockchain for COVID-19: Review, opportunities, and a trusted tracking system","volume":"45","author":"Marbouh","year":"2020","journal-title":"Arab. J. Sci. Eng."},{"key":"10.1016\/j.future.2022.04.017_b32","first-page":"1","article-title":"A survey on the security of blockchain systems","volume":"107","author":"Li","year":"2017","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.future.2022.04.017_b33","doi-asserted-by":"crossref","first-page":"53019","DOI":"10.1109\/ACCESS.2018.2870644","article-title":"Decentralized applications: The blockchain-empowered software system","volume":"6","author":"Cai","year":"2018","journal-title":"IEEE Access"},{"key":"10.1016\/j.future.2022.04.017_b34","series-title":"The Cancer Imaging Archive","article-title":"Radiology data from the clinical proteomic tumor analysis consortium cutaneous melanoma [cptac-cm] collection [data set]","year":"2018"},{"issue":"6","key":"10.1016\/j.future.2022.04.017_b35","doi-asserted-by":"crossref","first-page":"1045","DOI":"10.1007\/s10278-013-9622-7","article-title":"The Cancer Imaging Archive (TCIA): maintaining and operating a public information repository","volume":"26","author":"Clark","year":"2013","journal-title":"J. Digit. Imaging"},{"key":"10.1016\/j.future.2022.04.017_b36","series-title":"Cybersecurity and Applied Mathematics","first-page":"1","author":"Metcalf","year":"2016"},{"key":"10.1016\/j.future.2022.04.017_b37","series-title":"Theoretical and Experimental Methods for Defending Against DDOS Attacks","first-page":"33","article-title":"Chapter 3 - Problem solving, investigating ideas, and solutions","author":"Soltanian","year":"2016"},{"key":"10.1016\/j.future.2022.04.017_b38","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.tcs.2016.02.023","article-title":"A provably secure non-iterative hash function resisting birthday attack","volume":"654","author":"Su","year":"2016","journal-title":"Theoret. Comput. Sci."},{"issue":"3","key":"10.1016\/j.future.2022.04.017_b39","doi-asserted-by":"crossref","DOI":"10.1145\/3168389","article-title":"Technical privacy metrics: A systematic survey","volume":"51","author":"Wagner","year":"2018","journal-title":"ACM Comput. Surv."},{"issue":"4","key":"10.1016\/j.future.2022.04.017_b40","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1371\/journal.pone.0214518","article-title":"DAD-match; security technique to prevent denial of service attack on duplicate address detection process in IPv6 link-local network","volume":"14","author":"Al-Ani","year":"2019","journal-title":"PLOS ONE"},{"issue":"6975","key":"10.1016\/j.future.2022.04.017_b41","doi-asserted-by":"crossref","DOI":"10.1136\/bmj.310.6975.298","article-title":"Statistics notes: The normal distribution","volume":"310","author":"Altman","year":"1995","journal-title":"BMJ"},{"key":"10.1016\/j.future.2022.04.017_b42","series-title":"Advances in Computers","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1016\/bs.adcom.2020.08.020","article-title":"Attacks on blockchain","author":"Aggarwal","year":"2021"},{"issue":"1","key":"10.1016\/j.future.2022.04.017_b43","doi-asserted-by":"crossref","DOI":"10.1136\/bmjhci-2020-100166","article-title":"Digital health and care in pandemic times: impact of COVID-19","volume":"27","author":"Peek","year":"2020","journal-title":"BMJ Health Care Inform."}],"container-title":["Future Generation Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X22001406?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X22001406?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T15:29:51Z","timestamp":1711985391000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167739X22001406"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9]]},"references-count":43,"alternative-id":["S0167739X22001406"],"URL":"https:\/\/doi.org\/10.1016\/j.future.2022.04.017","relation":{},"ISSN":["0167-739X"],"issn-type":[{"value":"0167-739X","type":"print"}],"subject":[],"published":{"date-parts":[[2022,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A blockchain-based protocol for tracking user access to shared medical imaging","name":"articletitle","label":"Article Title"},{"value":"Future Generation Computer Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.future.2022.04.017","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}