{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:55:27Z","timestamp":1730213727806,"version":"3.28.0"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,14]]},"DOI":"10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361458","type":"proceedings-article","created":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T19:38:38Z","timestamp":1703533118000},"page":"0784-0791","source":"Crossref","is-referenced-by-count":0,"title":["Cyber Vulnerabilities in Blockchain Electronic Health Records: An In-Depth Threat Analysis"],"prefix":"10.1109","author":[{"given":"Marija","family":"Brki\u0107","sequence":"first","affiliation":[{"name":"Vienna University of Economics and Business,Information Systems and Operations Management,Vienna,Austria"}]},{"given":"Horia-Stefan","family":"Dinu","sequence":"additional","affiliation":[{"name":"Vienna University of Economics and Business,Information Systems and Operations Management,Vienna,Austria"}]},{"given":"Alida","family":"Mirkovi\u0107","sequence":"additional","affiliation":[{"name":"Vienna University of Economics and Business,Information Systems and Operations Management,Vienna,Austria"}]},{"given":"Alma","family":"Sabirovi\u0107","sequence":"additional","affiliation":[{"name":"Vienna University of Economics and Business,Information Systems and Operations Management,Vienna,Austria"}]},{"given":"Sajjad","family":"Khan","sequence":"additional","affiliation":[{"name":"Vienna University of Economics and Business,Information Systems and Operations Management,Vienna,Austria"}]},{"given":"Davor","family":"Svetinovi\u0107","sequence":"additional","affiliation":[{"name":"Vienna University of Economics and Business,Information Systems and Operations Management,Vienna,Austria"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.puhe.2022.03.010"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S2589-7500(22)00154-6"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.semradonc.2019.05.010"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1177\/1071181319631275"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/wics.1549"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2022.10.144"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/1953723"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/network2020016"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102407"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3106384"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2946373"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3130552"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/s22020572"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/healthcare8020133"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.02.018"},{"journal-title":"Secure multi-party delegated authorisation for access and sharing of electronic health records","year":"2022","author":"Tan","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-1123-2"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2019.00020"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/s22114032"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.2196\/13585"},{"journal-title":"Medicalchain whitepaper 2.1","year":"2020","author":"Albeyatti","key":"ref21"},{"issue":"12","key":"ref22","first-page":"21","article-title":"Attack trees","volume":"24","author":"Schneier","year":"1999","journal-title":"Dr. Dobbs journal"},{"key":"ref23","first-page":"1i","article-title":"Human Factors in Electronic Health Records Cybersecurity Breach: An Exploratory Analysis","volume":"19","author":"Yeo","year":"2022","journal-title":"Perspect Health Inf Manag"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101966"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v10i1.pp455-466"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.01.009"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocx068"},{"key":"ref28","first-page":"3735","article-title":"Total eclipse of the heart - disrupting the InterPlanetary file system","volume-title":"st USENIX Security Symposium (USENIX Security 22). Boston, MA:USENIX Association","author":"Prunster","year":"2022"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.7759\/cureus.30168"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417247"},{"journal-title":"Coinbugs: Enumerating common blockchain implementation-level vulnerabilities","year":"2021","author":"Kircanski","key":"ref31"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3453176"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.35940\/ijitee.I7622.079920"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86890-1_4"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102865"},{"journal-title":"Compromising a medical mannequin","year":"2015","author":"Glisson","key":"ref36"},{"key":"ref37","first-page":"103699","article-title":"Towards situational aware cyber-physical systems: A security-enhancing use case of blockchain-based digital twins","volume-title":"Computers in Industry","volume":"141","author":"Suhail","year":"2022"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2022.3185764"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1002\/sys.21231"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1002\/sys.21252"}],"event":{"name":"2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","start":{"date-parts":[[2023,11,14]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2023,11,17]]}},"container-title":["2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10361260\/10360496\/10361458.pdf?arnumber=10361458","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T20:29:34Z","timestamp":1705091374000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10361458\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,14]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361458","relation":{},"subject":[],"published":{"date-parts":[[2023,11,14]]}}}