{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:23:04Z","timestamp":1730319784515,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,4,23]],"date-time":"2018-04-23T00:00:00Z","timestamp":1524441600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["653884"],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,4,23]]},"DOI":"10.1145\/3195258.3195259","type":"proceedings-article","created":{"date-parts":[[2018,4,2]],"date-time":"2018-04-02T08:12:32Z","timestamp":1522656752000},"page":"1-6","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Securing Electronic Health Records in the Cloud"],"prefix":"10.1145","author":[{"given":"David R.","family":"Matos","sequence":"first","affiliation":[{"name":"INESC-ID, Instituto Superior T\u00e9cnico, Universidade de Lisboa, Portugal"}]},{"given":"Miguel L.","family":"Pardal","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto Superior T\u00e9cnico, Universidade de Lisboa, Portugal"}]},{"given":"Pedro","family":"Ad\u00e3o","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto Superior T\u00e9cnico, Universidade de Lisboa, Portugal and Instituto de Telecomunica\u00e7\u00f5es, Lisboa, Portugal"}]},{"given":"Ant\u00f3nio Rito","family":"Silva","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto Superior T\u00e9cnico, Universidade de Lisboa, Portugal"}]},{"given":"Miguel","family":"Correia","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto Superior T\u00e9cnico, Universidade de Lisboa, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2018,4,23]]},"reference":[{"volume-title":"d.}. Projecto Pegasus","key":"e_1_3_2_1_1_1","unstructured":"{n. d.}. Projecto Pegasus . http:\/\/www.cartaodecidadao.pt. ({n. d.}). Accessed: 2016-01-30. {n. d.}. Projecto Pegasus. http:\/\/www.cartaodecidadao.pt. ({n. d.}). Accessed: 2016-01-30."},{"key":"e_1_3_2_1_2_1","first-page":"12","article-title":"A survey of the state of cloud computing in healthcare","volume":"1","author":"Ahuja Sanjay P","year":"2012","unstructured":"Sanjay P Ahuja , Sindhu Mani , and Jesus Zambrano . 2012 . A survey of the state of cloud computing in healthcare . Network and Communication Technologies 1 , 2 (2012), 12 . Sanjay P Ahuja, Sindhu Mani, and Jesus Zambrano. 2012. A survey of the state of cloud computing in healthcare. Network and Communication Technologies 1, 2 (2012), 12.","journal-title":"Network and Communication Technologies"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535929"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.43"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357010.1352610"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1947337.1947361"},{"key":"e_1_3_2_1_7_1","volume-title":"Multilevel Data Management Security","author":"Studies Board Air Force","year":"1983","unstructured":"Air Force Studies Board . 1983. Committee on Multilevel Data Management Security , Multilevel Data Management Security . National Academy Press 1 ( 1983 ), 983. Air Force Studies Board. 1983. Committee on Multilevel Data Management Security, Multilevel Data Management Security. National Academy Press 1 (1983), 983."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2006.56"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294280"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/360051.360056"},{"key":"e_1_3_2_1_11_1","volume-title":"HL7 EHR System Functional Model Draft Standard for Trial Use. Health Level 7","author":"Dickinson Gary","year":"2004","unstructured":"Gary Dickinson , Linda Fischetti , and Sam Heard . 2004. HL7 EHR System Functional Model Draft Standard for Trial Use. Health Level 7 ( 2004 ). Gary Dickinson, Linda Fischetti, and Sam Heard. 2004. HL7 EHR System Functional Model Draft Standard for Trial Use. Health Level 7 (2004)."},{"volume-title":"Fundamentals of Computer Security Technology","author":"Amoroso E.","key":"e_1_3_2_1_12_1","unstructured":"E. Amoroso . 1994. Fundamentals of Computer Security Technology . Prentice Hall . E.Amoroso. 1994. Fundamentals of Computer Security Technology. Prentice Hall."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of 11th annual computer security application conference. 241--48","author":"Ferraiolo David","year":"1995","unstructured":"David Ferraiolo , Janet Cugini , and D Richard Kuhn . 1995 . Role-based access control (RBAC): Features and motivations . In Proceedings of 11th annual computer security application conference. 241--48 . David Ferraiolo, Janet Cugini, and D Richard Kuhn. 1995. Role-based access control (RBAC): Features and motivations. In Proceedings of 11th annual computer security application conference. 241--48."},{"key":"e_1_3_2_1_14_1","volume-title":"Windows access control demystified. Princeton university","author":"Govindavajhala Sudhakar","year":"2006","unstructured":"Sudhakar Govindavajhala and Andrew W Appel . 2006. Windows access control demystified. Princeton university ( 2006 ). Sudhakar Govindavajhala and Andrew W Appel. 2006. Windows access control demystified. Princeton university (2006)."},{"key":"e_1_3_2_1_15_1","volume-title":"USENIX Annual Technical Conference, FREENIX Track. 259--272","author":"Gr\u00fcnbacher Andreas","year":"2003","unstructured":"Andreas Gr\u00fcnbacher . 2003 . POSIX Access Control Lists on Linux .. In USENIX Annual Technical Conference, FREENIX Track. 259--272 . Andreas Gr\u00fcnbacher. 2003. POSIX Access Control Lists on Linux.. In USENIX Annual Technical Conference, FREENIX Track. 259--272."},{"volume-title":"Proceedings of the IEEE 37th International Conference on Distributed Computing Systems. 23--33","author":"Halalai R.","key":"e_1_3_2_1_16_1","unstructured":"R. Halalai , P. Felber , A. M. Kermarrec , and F. Ta\u00c3\u0155ani . 2017. Agar: A Caching System for Erasure-Coded Data . In Proceedings of the IEEE 37th International Conference on Distributed Computing Systems. 23--33 . R. Halalai, P. Felber, A. M. Kermarrec, and F. Ta\u00c3\u0155ani. 2017. Agar: A Caching System for Erasure-Coded Data. In Proceedings of the IEEE 37th International Conference on Distributed Computing Systems. 23--33."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294269"},{"volume-title":"USENIX Annual Technical Conference.","author":"Hunt P.","key":"e_1_3_2_1_18_1","unstructured":"P. Hunt , M. Konar , F. P. Junqueira , and B. Reed . 2010. ZooKeeper: wait-free coordination for Internet-scale systems . In USENIX Annual Technical Conference. P. Hunt, M. Konar, F. P. Junqueira, and B. Reed. 2010. ZooKeeper: wait-free coordination for Internet-scale systems. In USENIX Annual Technical Conference."},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 13th International Cryptology Conference -- CRYPTO\u00e2\u0102Ź93","author":"Krawczyk H.","year":"1993","unstructured":"H. Krawczyk . 1993 . Secret sharing made short . Proceedings of the 13th International Cryptology Conference -- CRYPTO\u00e2\u0102Ź93 (1993), 136--146. H. Krawczyk. 1993. Secret sharing made short. Proceedings of the 13th International Cryptology Conference -- CRYPTO\u00e2\u0102Ź93 (1993), 136--146."},{"volume-title":"Advances in Cryptology\u00e2\u0102\u0164CRYPTO\u00e2\u0102Ź93","author":"Krawczyk Hugo","key":"e_1_3_2_1_20_1","unstructured":"Hugo Krawczyk . 1993. Secret sharing made short . In Advances in Cryptology\u00e2\u0102\u0164CRYPTO\u00e2\u0102Ź93 . Springer , 136--146. Hugo Krawczyk. 1993. Secret sharing made short. In Advances in Cryptology\u00e2\u0102\u0164CRYPTO\u00e2\u0102Ź93. Springer, 136--146."},{"volume-title":"Security and Privacy in Communication Networks","author":"Li Ming","key":"e_1_3_2_1_21_1","unstructured":"Ming Li , Shucheng Yu , Kui Ren , and Wenjing Lou . 2010. Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings . In Security and Privacy in Communication Networks . Springer , 89--106. Ming Li, Shucheng Yu, Kui Ren, and Wenjing Lou. 2010. Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings. In Security and Privacy in Communication Networks. Springer, 89--106."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882992.1883024"},{"volume-title":"Hacking the human: social engineering techniques and security countermeasures","author":"Mann Mr Ian","key":"e_1_3_2_1_23_1","unstructured":"Mr Ian Mann . 2012. Hacking the human: social engineering techniques and security countermeasures . Gower Publishing, Ltd. Mr Ian Mann. 2012. Hacking the human: social engineering techniques and security countermeasures. Gower Publishing, Ltd."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1055558.1055591"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/366173.366208"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2010.53"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/275487.275508"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.312842"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Thomas Schabetsberger Elske Ammenwerth Stefan Andreatta Gordon Gratl Reinhold Haux Georg Lechleitner Klaus Schindelwig Christian Stark Raimund Vogl Immanuel Wilhelmy etal 2006. From a paper-based transmission of discharge summaries to electronic communication in health care regions. International journal of medical informatics 75 3 (2006) 209--215. Thomas Schabetsberger Elske Ammenwerth Stefan Andreatta Gordon Gratl Reinhold Haux Georg Lechleitner Klaus Schindelwig Christian Stark Raimund Vogl Immanuel Wilhelmy et al. 2006. From a paper-based transmission of discharge summaries to electronic communication in health care regions. International journal of medical informatics 75 3 (2006) 209--215.","DOI":"10.1016\/j.ijmedinf.2005.07.018"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/646764.703956"},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the AMIA Annual Fall Symposium. American Medical Informatics Association, 51","author":"Sweeney Latanya","year":"1997","unstructured":"Latanya Sweeney . 1997 . Guaranteeing anonymity when sharing medical data, the Datafly System .. In Proceedings of the AMIA Annual Fall Symposium. American Medical Informatics Association, 51 . Latanya Sweeney. 1997. Guaranteeing anonymity when sharing medical data, the Datafly System.. In Proceedings of the AMIA Annual Fall Symposium. American Medical Informatics Association, 51."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"e_1_3_2_1_33_1","first-page":"391","article-title":"Die elektronische Gesundheitskarte","volume":"28","author":"Weichert Thilo","year":"2004","unstructured":"Thilo Weichert . 2004 . Die elektronische Gesundheitskarte . Datenschutz und Datensicherheit 28 , 7 (2004), 391 -- 403 . Thilo Weichert. 2004. Die elektronische Gesundheitskarte. Datenschutz und Datensicherheit 28, 7 (2004), 391--403.","journal-title":"Datenschutz und Datensicherheit"},{"key":"e_1_3_2_1_34_1","unstructured":"Ira S Winkler and Brian Dealy. 1995. Information Security Technology? Don't Rely on It. A Case Study in Social Engineering.. In USENIX Security. Ira S Winkler and Brian Dealy. 1995. Information Security Technology? Don't Rely on It. A Case Study in Social Engineering.. In USENIX Security."}],"event":{"name":"EuroSys '18: Thirteenth EuroSys Conference 2018","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Porto Portugal","acronym":"EuroSys '18"},"container-title":["Proceedings of the 1st Workshop on Privacy by Design in Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3195258.3195259","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T22:07:48Z","timestamp":1673474868000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3195258.3195259"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,23]]},"references-count":34,"alternative-id":["10.1145\/3195258.3195259","10.1145\/3195258"],"URL":"https:\/\/doi.org\/10.1145\/3195258.3195259","relation":{},"subject":[],"published":{"date-parts":[[2018,4,23]]},"assertion":[{"value":"2018-04-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}