{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,12]],"date-time":"2024-07-12T11:51:13Z","timestamp":1720785073570},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[1998,1,1]],"date-time":"1998-01-01T00:00:00Z","timestamp":883612800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Technol. Biomed."],"published-print":{"date-parts":[[1998]]},"DOI":"10.1109\/4233.735778","type":"journal-article","created":{"date-parts":[[2002,8,24]],"date-time":"2002-08-24T19:45:59Z","timestamp":1030218359000},"page":"139-145","source":"Crossref","is-referenced-by-count":20,"title":["A workflow-based approach to virtual patient record security"],"prefix":"10.1109","volume":"2","author":[{"given":"F.","family":"Malamateniou","sequence":"first","affiliation":[]},{"given":"G.","family":"Vassilacopoulos","sequence":"additional","affiliation":[]},{"given":"P.","family":"Tsanakas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/0169-023X(94)90020-5"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/69.485637"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/166635.166652"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(91)90139-5"},{"key":"ref37","author":"berg","year":"1997","journal-title":"Advanced Techniques for Java Developers"},{"key":"ref36","first-page":"626","article-title":"validation of the workflow analysis technique trigger modeling'","author":"joosten","year":"1996","journal-title":"Proc 2nd Amer Conf Inf Syst"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1016\/0167-4048(94)90048-5","article-title":"design for dynamic user-role-based security","volume":"13","author":"mohammed","year":"1994","journal-title":"Computers & Security"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3109\/14639239608995011"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/BF01277643"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1287\/inte.24.5.141"},{"key":"ref12","first-page":"214","author":"biskup","year":"1991","journal-title":"Medical database security data protection and confidentiality in health informatics"},{"key":"ref13","first-page":"1582","article-title":"design environment for a hospital information system: meeting the data security challenge","author":"eichinger","year":"0","journal-title":"Proc MEDINFO 92"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/0020-7101(95)01154-4"},{"key":"ref15","first-page":"1561","article-title":"enforcement of data protection privacy and security in medical informatics","author":"bengtsson","year":"0","journal-title":"Proc MEDINFO 92"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1055\/s-0038-1634952","article-title":"medical database security policies","volume":"32","author":"pangalos","year":"1993","journal-title":"Methods Inf Med"},{"key":"ref17","first-page":"493","article-title":"issues of security and network security in health care information systems","author":"patel","year":"0","journal-title":"Proc MIE 94"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/69.485638"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(96)89322-9"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/96602.96604"},{"key":"ref4","author":"kazmer","year":"0","journal-title":"The creation of a virtual electronic medical record"},{"key":"ref27","author":"kim","year":"1995","journal-title":"Modern Database Systems The Object Model Interoperability and Beyond"},{"key":"ref3","author":"forslund","year":"0","journal-title":"The virtual patient record A key to distributed healthcare and telemedicine"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/0720-048X(96)00777-2"},{"key":"ref29","first-page":"1","article-title":"authorization and access control in iro-db","author":"emayr","year":"1996","journal-title":"Proc 12th IEEE Conf Data Eng"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1136\/jamia.1996.96310633"},{"key":"ref8","author":"sechrest","year":"0","journal-title":"Designing the healthcare Intranet"},{"key":"ref7","first-page":"31","article-title":"the intranet' concept applied for convenient access to pacs image data and computerized medical record","author":"ratib","year":"1996","journal-title":"Proc 14th Int EuroPACS Meeting"},{"key":"ref2","first-page":"111","article-title":"an international collaboratory based on virtual patient records","volume":"40","author":"forslund","year":"1997","journal-title":"Commun ACM"},{"key":"ref9","author":"yee","year":"0","journal-title":"Intranet for streamlining health care management"},{"key":"ref1","author":"dick","year":"1997","journal-title":"The Computer-Based Patient Record An Essential Technology for Healthcare"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1136\/jamia.1996.96236282"},{"key":"ref22","author":"kahan","year":"0","journal-title":"A distributed authorization model for WWW"},{"key":"ref21","first-page":"121","article-title":"authorization in distributed systems: a new approach","volume":"10","author":"woo","year":"1994","journal-title":"J Comput Security"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1097\/00004010-199001510-00007"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ADL.1996.502521"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/61733.61735"},{"key":"ref25","author":"e bock","year":"1995","journal-title":"Designing Groupware A Guidebook for Designers Implementors and Users"}],"container-title":["IEEE Transactions on Information Technology in Biomedicine"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4233\/15835\/00735778.pdf?arnumber=735778","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:09:35Z","timestamp":1638216575000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/735778\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"references-count":37,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/4233.735778","relation":{},"ISSN":["1089-7771"],"issn-type":[{"value":"1089-7771","type":"print"}],"subject":[],"published":{"date-parts":[[1998]]}}}