iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1007/978-3-030-72465-8_12
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T05:54:50Z","timestamp":1726120490614},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030724641"},{"type":"electronic","value":"9783030724658"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-72465-8_12","type":"book-chapter","created":{"date-parts":[[2021,3,31]],"date-time":"2021-03-31T12:03:02Z","timestamp":1617192182000},"page":"206-225","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy Respecting Data Sharing and Communication in mHealth: A Case Study"],"prefix":"10.1007","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-5398-3694","authenticated-orcid":false,"given":"Michael","family":"Pleger","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7864-5437","authenticated-orcid":false,"given":"Ina","family":"Schiering","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,1]]},"reference":[{"key":"12_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/978-3-319-39381-0_9","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"M Aljohani","year":"2016","unstructured":"Aljohani, M., Hawkey, K., Blustein, J.: Proposed privacy patterns for privacy preserving healthcare systems in accord with Nova Scotia\u2019s personal health information act. In: Tryfonas, T. (ed.) HAS 2016. LNCS, vol. 9750, pp. 91\u2013102. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-39381-0_9"},{"key":"12_CR2","doi-asserted-by":"publisher","unstructured":"Colesky, M., Hoepman, J.H., Hillen, C.: A critical analysis of privacy design strategies. In: 2016 IEEE Security and Privacy Workshops (SPW), pp. 33\u201340 (2016). https:\/\/doi.org\/10.1109\/SPW.2016.23","DOI":"10.1109\/SPW.2016.23"},{"key":"12_CR3","unstructured":"Colesky, M., et al.: Patterns. https:\/\/privacypatterns.org\/patterns\/"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1007\/978-3-030-63007-2_48","volume-title":"Computational Collective Intelligence","author":"NT Dang","year":"2020","unstructured":"Dang, N.T., Nguyen, V.S., Le, H.-D., Maleszka, M., Tran, M.H.: Sharing secured data on peer-to-peer applications using attribute-based encryption. In: Nguyen, N.T., Hoang, B.H., Huynh, C.P., Hwang, D., Trawi\u0144ski, B., Vossen, G. (eds.) ICCCI 2020. LNCS (LNAI), vol. 12496, pp. 619\u2013630. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-63007-2_48"},{"key":"12_CR5","unstructured":"European Parliament: General data protection regulation (GDPR). https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32016R0679"},{"key":"12_CR6","doi-asserted-by":"publisher","first-page":"166","DOI":"10.5220\/0008982801660177","volume":"5","author":"A Gabel","year":"2020","unstructured":"Gabel, A., Ertas, F., Pleger, M., Schiering, I., M\u00fcller, S.: Privacy-preserving metrics for an mHealth app in the context of neuropsychological studies. HEALTHINF 5, 166\u2013177 (2020). https:\/\/doi.org\/10.5220\/0008982801660177","journal-title":"HEALTHINF"},{"key":"12_CR7","doi-asserted-by":"publisher","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st Annual ACM Symposium on Symposium on Theory of Computing - STOC 2009, p. 169. ACM Press (2009). https:\/\/doi.org\/10.1145\/1536414","DOI":"10.1145\/1536414"},{"key":"12_CR8","doi-asserted-by":"publisher","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, pp. 89\u201398. Association for Computing Machinery (2006). https:\/\/doi.org\/10.1145\/1180405.1180418","DOI":"10.1145\/1180405.1180418"},{"key":"12_CR9","doi-asserted-by":"publisher","unstructured":"Hansen, M., Jensen, M., Rost, M.: Protection goals for privacy engineering. In: 2015 IEEE Security and Privacy Workshops, pp. 159\u2013166 (2015). https:\/\/doi.org\/10.1109\/SPW.2015.13","DOI":"10.1109\/SPW.2015.13"},{"key":"12_CR10","doi-asserted-by":"publisher","unstructured":"Hillen, C.: The pseudonym broker privacy pattern in medical data collection. In: IEEE Trustcom\/BigDataSE\/ISPA, vol. 1, pp. 999\u20131005 (2015). https:\/\/doi.org\/10.1109\/Trustcom.2015.475","DOI":"10.1109\/Trustcom.2015.475"},{"issue":"1","key":"12_CR11","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1186\/s12916-015-0444-y","volume":"13","author":"K Huckvale","year":"2015","unstructured":"Huckvale, K., Prieto, J.T., Tilney, M., Benghozi, P.J., Car, J.: Unaddressed privacy risks in accredited health and wellness apps: a cross-sectional systematic assessment. BMC Med. 13(1), 214 (2015). https:\/\/doi.org\/10.1186\/s12916-015-0444-y","journal-title":"BMC Med."},{"key":"12_CR12","doi-asserted-by":"publisher","unstructured":"Kan, J., Kim, K.S.: MTFS: Merkle-tree-based file system. In: IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 43\u201347 (2019). https:\/\/doi.org\/10.1109\/BLOC.2019.8751389","DOI":"10.1109\/BLOC.2019.8751389"},{"key":"12_CR13","doi-asserted-by":"publisher","unstructured":"Khanezaei, N., Hanapi, Z.M.: A framework based on RSA and AES encryption algorithms for cloud computing services. In: IEEE Conference on Systems, Process and Control (ICSPC 2014), pp. 58\u201362 (2014). https:\/\/doi.org\/10.1109\/SPC.2014.7086230","DOI":"10.1109\/SPC.2014.7086230"},{"key":"12_CR14","doi-asserted-by":"publisher","unstructured":"Kotz, D.: A threat taxonomy for mHealth privacy. In: Third International Conference on Communication Systems and Networks (COMSNETS 2011), pp. 1\u20136 (2011). https:\/\/doi.org\/10.1109\/COMSNETS.2011.5716518","DOI":"10.1109\/COMSNETS.2011.5716518"},{"key":"12_CR15","doi-asserted-by":"publisher","unstructured":"Larson, R.S.: A path to better-quality mHealth apps. JMIR mHealth Health 6 (2018). https:\/\/doi.org\/10.2196\/10414","DOI":"10.2196\/10414"},{"key":"12_CR16","doi-asserted-by":"publisher","unstructured":"Lenhard, J., Fritsch, L., Herold, S.: A literature study on privacy patterns research. In: 43rd Euromicro Conference on Software Engineering and Advanced Applications (SEAA), pp. 194\u2013201 (2017). https:\/\/doi.org\/10.1109\/SEAA.2017.28","DOI":"10.1109\/SEAA.2017.28"},{"key":"12_CR17","doi-asserted-by":"publisher","unstructured":"Lewko, A., Sahai, A., Waters, B.: Revocation systems with very small private keys. In: 2010 IEEE Symposium on Security and Privacy, pp. 273\u2013285. IEEE (2010). https:\/\/doi.org\/10.1109\/SP.2010.23","DOI":"10.1109\/SP.2010.23"},{"key":"12_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1007\/978-3-642-20465-4_31","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"A Lewko","year":"2011","unstructured":"Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568\u2013588. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-20465-4_31"},{"key":"12_CR19","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1037\/a0024485","volume":"42","author":"DD Luxton","year":"2011","unstructured":"Luxton, D.D., McCann, R.A., Bush, N.E., Mishkind, M.C., Reger, G.M.: mHealth for mental health: integrating smartphone technology in behavioral healthcare. Prof. Psychol. Res. Pract. 42, 505\u2013512 (2011). https:\/\/doi.org\/10.1037\/a0024485","journal-title":"Prof. Psychol. Res. Pract."},{"key":"12_CR20","doi-asserted-by":"publisher","unstructured":"M\u00fcller, S.V., Ertas, F., Aust, J., Gabel, A., Schiering, I.: Kann eine mobileanwendung helfen abzuwaschen? Zeitschrift f\u00fcr Neuropsychologie 30(2), 123\u2013131 (2019). https:\/\/doi.org\/10.1024\/1016-264X\/a000256. Hogrefe AG","DOI":"10.1024\/1016-264X\/a000256"},{"key":"12_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/978-3-642-00730-9_2","volume-title":"Information Security and Cryptology \u2013 ICISC 2008","author":"S M\u00fcller","year":"2009","unstructured":"M\u00fcller, S., Katzenbeisser, S., Eckert, C.: Distributed attribute-based encryption. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 20\u201336. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-00730-9_2"},{"key":"12_CR22","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.ijmedinf.2010.10.016","volume":"80","author":"T Neubauer","year":"2011","unstructured":"Neubauer, T., Heurix, J.: A methodology for the pseudonymization of medical data. Int. J. Med. Inf. 80, 190\u2013204 (2011). https:\/\/doi.org\/10.1016\/j.ijmedinf.2010.10.016","journal-title":"Int. J. Med. Inf."},{"key":"12_CR23","doi-asserted-by":"publisher","unstructured":"Ometov, A., Bezzateev, S., M\u00e4kitalo, N., Andreev, S., Mikkonen, T., Koucheryavy, Y.: Multi-factor authentication: a survey 2 (2018). https:\/\/doi.org\/10.3390\/cryptography2010001","DOI":"10.3390\/cryptography2010001"},{"key":"12_CR24","doi-asserted-by":"publisher","first-page":"9390","DOI":"10.1109\/ACCESS.2018.2799522","volume":"6","author":"A Papageorgiou","year":"2018","unstructured":"Papageorgiou, A., Strigkos, M., Politou, E., Alepis, E., Solanas, A., Patsakis, C.: Security and privacy analysis of mobile health applications: the alarming state of practice. IEEE Access 6, 9390\u20139403 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2799522","journal-title":"IEEE Access"},{"key":"12_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"A Sahai","year":"2005","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457\u2013473. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11426639_27"},{"key":"12_CR26","unstructured":"Verheul, E.R., Jacobs, B., Meijer, C., Hildebrandt, M., de Ruiter, J.: Polymorphic encryption and pseudonymisation for personalised healthcare. IACR Cryptology ePrint Archive 2016, 411 (2016)"},{"key":"12_CR27","doi-asserted-by":"publisher","unstructured":"Vrhovec, S.L.R.: Challenges of mobile device use in healthcare. In: 39th international convention on information and communication technology, electronics and microelectronics (MIPRO), pp. 1393\u20131396 (2016). https:\/\/doi.org\/10.1109\/MIPRO.2016.7522357","DOI":"10.1109\/MIPRO.2016.7522357"}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-72465-8_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,31]],"date-time":"2021-03-31T12:05:29Z","timestamp":1617192329000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-72465-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030724641","9783030724658"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-72465-8_12","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"1 April 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Privacy and Identity","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Summer School on Privacy and Identity Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Maribor","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovenia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"privacy-identity2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ifip-summerschool.org\/dates.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"OCS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"62% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5-6","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1 tutorial paper is also included. The summer school was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}