{"id":"https://openalex.org/W2024834490","doi":"https://doi.org/10.1145/1968613.1968645","title":"Managing security and privacy in ubiquitous eHealth information interchange","display_name":"Managing security and privacy in ubiquitous eHealth information interchange","publication_year":2011,"publication_date":"2011-02-21","ids":{"openalex":"https://openalex.org/W2024834490","doi":"https://doi.org/10.1145/1968613.1968645","mag":"2024834490"},"language":"en","primary_location":{"id":"doi:10.1145/1968613.1968645","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1968613.1968645","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050839544","display_name":"Ebenezer Akin Oladimeji","orcid":null},"institutions":[{"id":"https://openalex.org/I1302485747","display_name":"Verizon (United States)","ror":"https://ror.org/02vdyxx64","country_code":"US","type":"company","lineage":["https://openalex.org/I1302485747"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ebenezer A. Oladimeji","raw_affiliation_strings":["Product Design and Dev., IT, Verizon Communications Irving, Texas"],"affiliations":[{"raw_affiliation_string":"Product Design and Dev., IT, Verizon Communications Irving, Texas","institution_ids":["https://openalex.org/I1302485747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102840118","display_name":"Lawrence Chung","orcid":"https://orcid.org/0000-0003-3269-4097"},"institutions":[{"id":"https://openalex.org/I162577319","display_name":"The University of Texas at Dallas","ror":"https://ror.org/049emcs32","country_code":"US","type":"education","lineage":["https://openalex.org/I162577319"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lawrence Chung","raw_affiliation_strings":["University of Texas at Dallas, Richardson, Texas"],"affiliations":[{"raw_affiliation_string":"University of Texas at Dallas, Richardson, Texas","institution_ids":["https://openalex.org/I162577319"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044458042","display_name":"Hyo Taeg Jung","orcid":null},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hyo Taeg Jung","raw_affiliation_strings":["Contents Research Division, ETRI, Yuseong-gu Daejeon, Korea","Contents Research Division, ETRI, Yuseong-gu Daejeon, Korea#TAB#"],"affiliations":[{"raw_affiliation_string":"Contents Research Division, ETRI, Yuseong-gu Daejeon, Korea","institution_ids":["https://openalex.org/I142401562"]},{"raw_affiliation_string":"Contents Research Division, ETRI, Yuseong-gu Daejeon, Korea#TAB#","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023268702","display_name":"Jaehyoun Kim","orcid":null},"institutions":[{"id":"https://openalex.org/I848706","display_name":"Sungkyunkwan University","ror":"https://ror.org/04q78tk20","country_code":"KR","type":"education","lineage":["https://openalex.org/I848706"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jaehyoun Kim","raw_affiliation_strings":["Sungkyunkwan University, Seoul, Korea","Sungkyunkwan University, Seoul, Korea#TAB#"],"affiliations":[{"raw_affiliation_string":"Sungkyunkwan University, Seoul, Korea","institution_ids":["https://openalex.org/I848706"]},{"raw_affiliation_string":"Sungkyunkwan University, Seoul, Korea#TAB#","institution_ids":["https://openalex.org/I848706"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5050839544"],"corresponding_institution_ids":["https://openalex.org/I1302485747"],"apc_list":null,"apc_paid":null,"fwci":8.2636,"has_fulltext":false,"cited_by_count":36,"citation_normalized_percentile":{"value":0.96964656,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10444","display_name":"Context-Aware Activity Recognition Systems","score":0.9868000149726868,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6840187907218933},{"id":"https://openalex.org/keywords/ubiquitous-computing","display_name":"Ubiquitous computing","score":0.6824830174446106},{"id":"https://openalex.org/keywords/ehealth","display_name":"eHealth","score":0.6587914228439331},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6267635822296143},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.5178823471069336},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4941270649433136},{"id":"https://openalex.org/keywords/health-care","display_name":"Health care","score":0.4772643744945526},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4685828387737274},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4355889558792114},{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.4315699338912964},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.08355802297592163}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6840187907218933},{"id":"https://openalex.org/C172195944","wikidata":"https://www.wikidata.org/wiki/Q541265","display_name":"Ubiquitous computing","level":2,"score":0.6824830174446106},{"id":"https://openalex.org/C202645933","wikidata":"https://www.wikidata.org/wiki/Q4930","display_name":"eHealth","level":3,"score":0.6587914228439331},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6267635822296143},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.5178823471069336},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4941270649433136},{"id":"https://openalex.org/C160735492","wikidata":"https://www.wikidata.org/wiki/Q31207","display_name":"Health care","level":2,"score":0.4772643744945526},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4685828387737274},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4355889558792114},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.4315699338912964},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.08355802297592163},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1968613.1968645","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1968613.1968645","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6200000047683716,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W160459144","https://openalex.org/W345593293","https://openalex.org/W1490299937","https://openalex.org/W1515421369","https://openalex.org/W1523201822","https://openalex.org/W1524043790","https://openalex.org/W1525753916","https://openalex.org/W1544534151","https://openalex.org/W1553292528","https://openalex.org/W1576337687","https://openalex.org/W1791702618","https://openalex.org/W1829319095","https://openalex.org/W1974582201","https://openalex.org/W1990414895","https://openalex.org/W2008068306","https://openalex.org/W2020214787","https://openalex.org/W2049344313","https://openalex.org/W2105539612","https://openalex.org/W2113738519","https://openalex.org/W2152505375","https://openalex.org/W2153074717","https://openalex.org/W2157539922","https://openalex.org/W2159927513","https://openalex.org/W2168884369","https://openalex.org/W2488355999","https://openalex.org/W2614268818","https://openalex.org/W3102845218","https://openalex.org/W4213150674","https://openalex.org/W4242182825","https://openalex.org/W4285719527","https://openalex.org/W6638317698","https://openalex.org/W6764000109"],"related_works":["https://openalex.org/W317272953","https://openalex.org/W2108730513","https://openalex.org/W3148806143","https://openalex.org/W3157697804","https://openalex.org/W2371258175","https://openalex.org/W3116065443","https://openalex.org/W2789135102","https://openalex.org/W2066004246","https://openalex.org/W3048678171","https://openalex.org/W4303183864"],"abstract_inverted_index":{"Ubiquitous":[0],"computing":[1],"has":[2],"the":[3,8,31,45,115,175,190,227],"potential":[4],"to":[5,25,33,91,111,164],"significantly":[6],"improve":[7],"quality":[9],"of":[10,30,96,177,192,229],"healthcare":[11,89],"delivery":[12],"by":[13,210],"making":[14],"relevant":[15],"patient":[16,104],"health":[17,36,153],"history":[18],"and":[19,47,58,63,80,119,140,146,161,167,171],"vital":[20],"signs":[21],"readily":[22],"available":[23,110],"on-demand":[24],"caregivers.":[26],"However,":[27],"this":[28],"promise":[29],"ability":[32],"track":[34],"electronic":[35],"information":[37,57,105,154],"signals":[38],"from":[39,239],"distributed":[40],"ubiquitous":[41,85,123,152,240],"devices,":[42],"conflicts":[43],"with":[44,69],"security":[46,62,127,145,166,194],"privacy":[48,64,147,168],"concerns":[49,65],"that":[50,82,103,183,219],"most":[51],"people":[52],"have":[53,66],"regarding":[54],"their":[55],"personal":[56],"medical":[59],"history.":[60],"While":[61],"been":[67],"dealt":[68],"extensively":[70],"in":[71,88,93,114,122,151,174],"mainstream":[72],"computing,":[73],"there":[74],"is":[75,106],"need":[76],"for":[77,143],"new":[78],"techniques":[79,99,163],"tools":[81],"can":[83,100,213,220],"enable":[84],"system":[86],"designers":[87],"domains":[90],"build":[92],"appropriate":[94],"levels":[95],"protection.":[97],"Such":[98],"help":[101],"ensure":[102],"minimally":[107],"but":[108],"sufficiently":[109],"different":[112],"stakeholders":[113],"care":[116],"giving":[117],"chain,":[118],"are":[120,186],"useful":[121],"environments":[124],"where":[125],"traditional":[126,184],"mechanisms":[128],"may":[129],"be":[130,214,221],"either":[131],"impractical":[132],"or":[133,179],"insufficient.":[134],"This":[135],"paper":[136],"presents":[137],"a":[138],"goal-centric":[139],"policy-driven":[141],"framework":[142],"deriving":[144],"risk":[148],"mitigation":[149,172],"strategies":[150,173],"interchange.":[155],"Specifically,":[156],"we":[157,232],"use":[158],"scenario":[159],"analysis":[160],"goal-oriented":[162],"model":[165],"objectives,":[169],"threats,":[170],"form":[176],"safeguards":[178,205],"countermeasures.":[180],"We":[181,200],"demonstrate":[182],"solutions":[185],"insufficient,":[187],"while":[188],"introducing":[189],"notion":[191],"purpose-driven":[193],"policies":[195],"based":[196],"on":[197],"sensitivity":[198],"meta-tags.":[199],"also":[201],"show":[202],"how":[203],"administrative":[204],"(such":[206],"as":[207],"those":[208],"required":[209],"HIPAA":[211],"rules)":[212],"refined":[215],"into":[216],"intermediate":[217],"specifications":[218],"analyzed":[222],"more":[223],"systematically.":[224],"To":[225],"validate":[226],"utility":[228],"our":[230,234],"approach,":[231],"illustrate":[233],"major":[235],"concepts":[236],"using":[237],"examples":[238],"emergency":[241],"response":[242],"scenarios.":[243]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":4},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
