{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:38:49Z","timestamp":1729676329086,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1109\/wmnc.2012.6416152","type":"proceedings-article","created":{"date-parts":[[2013,1,30]],"date-time":"2013-01-30T22:50:38Z","timestamp":1359586238000},"page":"30-37","source":"Crossref","is-referenced-by-count":0,"title":["A model for dimensioning a secure event-driven health care system"],"prefix":"10.1109","author":[{"given":"Rosa","family":"Sanchez-Guerrero","sequence":"first","affiliation":[]},{"given":"Fiorina","family":"Almenarez","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Diaz-Sanchez","sequence":"additional","affiliation":[]},{"given":"Patricia","family":"Arias","sequence":"additional","affiliation":[]},{"given":"Andres","family":"Marin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.5034\/inquiryjrnl_39.4.400"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1007\/s10729-008-9077-4"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1097\/00000542-200405000-00032"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1155\/2009\/167216"},{"key":"16","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1007\/978-3-642-04474-8_23","article-title":"Risks of the cardspace protocol","volume":"5735","author":"gajek","year":"2009","journal-title":"ser Lecture notes in Computer and Information Science"},{"year":"2005","author":"cameron","journal-title":"The Laws of identity","key":"13"},{"year":"2005","author":"frederick hirsch","journal-title":"Security and Privacy Considerations for the Oasis Security Assertion Markup Language (Saml) v2 0 Oasis Standard","key":"14"},{"year":"2006","author":"merrels","journal-title":"Sxip Identity Dix Digital Identity Exchange Protocol Internet Draft","key":"11"},{"year":"2006","author":"ruddy","journal-title":"Higgins Trust Framework Digital Id World","key":"12"},{"key":"21","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/978-0-387-33636-7_10","article-title":"Queueing analysis in healthcare","volume":"91","author":"green","year":"2006","journal-title":"Patient Flow Reducing Delay in Healthcare Delivery Ser International Series in Operations Research & Management Science"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1111\/j.1553-2712.2008.00083.x"},{"year":"2007","author":"dieter fiems","journal-title":"Waiting Times of Scheduled Patients in the Presence of Emergency Requests","key":"22"},{"key":"23","first-page":"387","article-title":"Stability condition for sip retransmission mechanism: Analysis and performance evaluation","author":"yang hong","year":"2010","journal-title":"Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS)"},{"key":"24","first-page":"387394","article-title":"Controlling overload in networks of sip servers","author":"hilt","year":"2008","journal-title":"IEEE International conference on Network Protocols (ICNP)"},{"key":"25","first-page":"387394","article-title":"Novel overload controls for sip networks","author":"noel","year":"2009","journal-title":"Teletraffic Congress 2009 ITC 21 2009 21st International"},{"key":"26","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1590\/s1679-45082010rb1567","article-title":"Markov models in health care","volume":"8","author":"sato","year":"2010","journal-title":"Einstein Sao Paulo"},{"doi-asserted-by":"publisher","key":"27","DOI":"10.1002\/9781118625651"},{"key":"28","first-page":"1","article-title":"Efficient sip-specific event notification","author":"zhao","year":"2006","journal-title":"Networking International Conference on Systems and International Conference on Mobile Communications and Learning Technologies 2006 ICN\/ICONS\/MCL 2006 International Conference on"},{"year":"2012","key":"29"},{"year":"2007","author":"fomundam","journal-title":"A Survey of Queuing Theory Applications in Healthcare Isr Technical Report 2007-24","key":"3"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1097\/01.mlr.0000119578.94846.f2"},{"year":"2012","author":"recordon","journal-title":"Openid Provider Authentication Policy Extension 1 0","key":"10"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1016\/0007-6813(67)90019-5"},{"year":"2012","key":"30"},{"year":"2012","key":"7"},{"year":"2005","author":"hirsch","journal-title":"Security and Privacy Considerations for the Oasis Security Assertion Markup Language (Saml) v2 0","key":"6"},{"key":"5","first-page":"6446","volume":"5727","author":"roach","year":"0","journal-title":"Session Initiation Protocol (SIP)-Specific Event Notification 5367"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.3390\/s120506129"},{"year":"2012","key":"9"},{"year":"2010","author":"brown","journal-title":"U-prove Technology Overview","key":"8"}],"event":{"name":"2012 5th Joint IFIP Wireless and Mobile Networking Conference (WMNC)","start":{"date-parts":[[2012,9,19]]},"location":"Bratislava, Slovakia","end":{"date-parts":[[2012,9,21]]}},"container-title":["2012 5th Joint IFIP Wireless and Mobile Networking Conference (WMNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6410227\/6416136\/06416152.pdf?arnumber=6416152","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T06:42:10Z","timestamp":1498027330000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6416152\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/wmnc.2012.6416152","relation":{},"subject":[],"published":{"date-parts":[[2012,9]]}}}