{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T17:15:05Z","timestamp":1712078105591},"reference-count":19,"publisher":"Elsevier BV","issue":"7","license":[{"start":{"date-parts":[[1999,1,1]],"date-time":"1999-01-01T00:00:00Z","timestamp":915148800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers & Security"],"published-print":{"date-parts":[[1999,1]]},"DOI":"10.1016\/s0167-4048(99)82041-0","type":"journal-article","created":{"date-parts":[[2002,7,28]],"date-time":"2002-07-28T16:40:59Z","timestamp":1027874459000},"page":"627-639","source":"Crossref","is-referenced-by-count":8,"title":["Trusted third party services for deploying secure telemedical applications over the WWW"],"prefix":"10.1016","volume":"18","author":[{"given":"Diomidis","family":"Spinellis","sequence":"first","affiliation":[]},{"given":"Stefanos","family":"Gritzalis","sequence":"additional","affiliation":[]},{"given":"John","family":"Iliadis","sequence":"additional","affiliation":[]},{"given":"Dimitris","family":"Gritzalis","sequence":"additional","affiliation":[]},{"given":"Sokratis","family":"Katsikas","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-4048(99)82041-0_BIB1","first-page":"33","article-title":"Addressing Threats and Security Issues in WWW Technology","author":"Gritzalis","year":"1997"},{"key":"10.1016\/S0167-4048(99)82041-0_BIB2","first-page":"123","article-title":"Addressing Threats in WWW Technology","author":"Meyer","year":"1996","journal-title":"Proc. of the 11th IEEE Computer Security Applications Conference"},{"key":"10.1016\/S0167-4048(99)82041-0_BIB3","author":"Cameron","year":"1997"},{"key":"10.1016\/S0167-4048(99)82041-0_BIB4","doi-asserted-by":"crossref","DOI":"10.17487\/rfc1866","article-title":"Hypertext Markup Language 2.0","author":"Berners-Lee","year":"1995"},{"key":"10.1016\/S0167-4048(99)82041-0_BIB5","author":"Garfinkel","year":"1997"},{"issue":"1","key":"10.1016\/S0167-4048(99)82041-0_BIB6","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/S1386-5056(98)00011-2","article-title":"Using TTP's for secure telemedical applications over the Web: The EUROMED-ETS approach","volume":"49","author":"Katsikas","year":"1998","journal-title":"International Journal of Medical Informatics"},{"key":"10.1016\/S0167-4048(99)82041-0_BIB7","article-title":"Recommendation R(97)5","year":"1997"},{"key":"10.1016\/S0167-4048(99)82041-0_BIB8","unstructured":"http:\/\/home.netscape.com\/newsref\/std\/SSL.html, April 1997."},{"key":"10.1016\/S0167-4048(99)82041-0_BIB9","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/SECPRI.1996.502668","article-title":"What do we mean by entity authentication?","author":"Gollmann","year":"1996","journal-title":"Proc. of the 1996 IEEE Symposium on Security and Privacy"},{"key":"10.1016\/S0167-4048(99)82041-0_BIB10","year":"1988"},{"key":"10.1016\/S0167-4048(99)82041-0_BIB11","doi-asserted-by":"crossref","DOI":"10.17487\/rfc1777","article-title":"Lightweight Directory Access Protocol","author":"Yeong","year":"1995"},{"key":"10.1016\/S0167-4048(99)82041-0_BIB12","author":"Garfinkel","year":"1996"},{"key":"10.1016\/S0167-4048(99)82041-0_BIB13","year":"1988"},{"key":"10.1016\/S0167-4048(99)82041-0_BIB14","article-title":"The String Representation of Standard Attribute Syntaxes","author":"Howes","year":"1995","journal-title":"RFC 1778"},{"key":"10.1016\/S0167-4048(99)82041-0_BIB15","unstructured":"http:\/\/Web.umich.edu\/~rsug\/ldap\/ldap.html, November 1997."},{"key":"10.1016\/S0167-4048(99)82041-0_BIB16","unstructured":"http:\/\/www.psy.uq.edu.au:8080\/~ftp\/Crypto, September 1997."},{"key":"10.1016\/S0167-4048(99)82041-0_BIB17","year":"1981","journal-title":"Convention for the Protection of individuals with regard to automatic processing of personal data"},{"key":"10.1016\/S0167-4048(99)82041-0_BIB18","year":"1996","journal-title":"On the Protection of Medical and Genetic Data"},{"key":"10.1016\/S0167-4048(99)82041-0_BIB19","unstructured":"European Commission, \u201cEnsuring Security and Trust in Electronic Communication: Towards a European Framework for Digital Signatures and Encryption\u201d, Com from the Commission to the European Parliament, the Council, the Economic and Social Committee, and the Committee of the Regions, COM (97) 503, Octo"}],"container-title":["Computers & Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404899820410?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404899820410?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,11]],"date-time":"2019-04-11T03:25:23Z","timestamp":1554953123000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404899820410"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,1]]},"references-count":19,"journal-issue":{"issue":"7","published-print":{"date-parts":[[1999,1]]}},"alternative-id":["S0167404899820410"],"URL":"https:\/\/doi.org\/10.1016\/s0167-4048(99)82041-0","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[1999,1]]}}}