{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:25:39Z","timestamp":1725553539804},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,4]]},"DOI":"10.1109\/icdim.2007.369331","type":"proceedings-article","created":{"date-parts":[[2007,6,7]],"date-time":"2007-06-07T21:09:42Z","timestamp":1181250582000},"page":"63-68","source":"Crossref","is-referenced-by-count":3,"title":["Controlled EHR access in secured health information system"],"prefix":"10.1109","author":[{"given":"Saleh","family":"Al-zharani","sequence":"first","affiliation":[]},{"given":"S.","family":"Sarasvady","sequence":"additional","affiliation":[]},{"given":"Harish","family":"Chandra","sequence":"additional","affiliation":[]},{"given":"Pit.","family":"Pichappan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35259-6_31"},{"journal-title":"Cryptography and Network Security Principles and Practice","year":"1999","author":"stallings","key":"ref3"},{"journal-title":"Medical Engineering & Physics","article-title":"A remote data access architecture for home-monitoring health-care applications","year":"2006","author":"lin","key":"ref10"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2003.12.011"},{"journal-title":"Proceedings of the IMIA Conference on Common Security Solutions for Communicating Patient Data","article-title":"Patient Data and the Internet: Security Issues","year":"1997","author":"blobel","key":"ref5"},{"journal-title":"Proc DARPA Information Survivability Conference and Exposition","article-title":"Automated Trust Negotiation","year":"2000","author":"winsborough","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2003.1279579"},{"journal-title":"Security Engineering A Guide to Building Dependable Distributed Systems","year":"2001","author":"anderson","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2002.1067734"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2004.06.002"}],"event":{"name":"2006 1st International Conference on Digital Information Management","start":{"date-parts":[[2006,12,6]]},"end":{"date-parts":[[2006,12,6]]}},"container-title":["2006 1st International Conference on Digital Information Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4221856\/4221857\/04221868.pdf?arnumber=4221868","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T21:51:56Z","timestamp":1489614716000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4221868\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,4]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/icdim.2007.369331","relation":{},"subject":[],"published":{"date-parts":[[2007,4]]}}}