{"id":"https://openalex.org/W3082694315","doi":"https://doi.org/10.1155/2020/8899409","title":"Enhancing Transaction Security for Handling Accountability in Electronic Health Records","display_name":"Enhancing Transaction Security for Handling Accountability in Electronic Health Records","publication_year":2020,"publication_date":"2020-09-01","ids":{"openalex":"https://openalex.org/W3082694315","doi":"https://doi.org/10.1155/2020/8899409","mag":"3082694315"},"language":"en","primary_location":{"id":"doi:10.1155/2020/8899409","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8899409","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8899409.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2020/8899409.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046925239","display_name":"Chian Techapanupreed","orcid":null},"institutions":[{"id":"https://openalex.org/I4322889","display_name":"Mahanakorn University of Technology","ror":"https://ror.org/05qebwp08","country_code":"TH","type":"education","lineage":["https://openalex.org/I4322889"]}],"countries":["TH"],"is_corresponding":true,"raw_author_name":"Chian Techapanupreed","raw_affiliation_strings":["Faculty of Information Science and Technology, Mahanakorn University of Technology, Bangkok 10530, Thailand"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Science and Technology, Mahanakorn University of Technology, Bangkok 10530, Thailand","institution_ids":["https://openalex.org/I4322889"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003423435","display_name":"Werasak Kurutach","orcid":"https://orcid.org/0000-0002-1109-3543"},"institutions":[{"id":"https://openalex.org/I4322889","display_name":"Mahanakorn University of Technology","ror":"https://ror.org/05qebwp08","country_code":"TH","type":"education","lineage":["https://openalex.org/I4322889"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Werasak Kurutach","raw_affiliation_strings":["Faculty of Information Science and Technology, Mahanakorn University of Technology, Bangkok 10530, Thailand"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Science and Technology, Mahanakorn University of Technology, Bangkok 10530, Thailand","institution_ids":["https://openalex.org/I4322889"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5046925239"],"corresponding_institution_ids":["https://openalex.org/I4322889"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.8061,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.7559542,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"18"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9876000285148621,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9793000221252441,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/accountability","display_name":"Accountability","score":0.8417378664016724},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7046186327934265},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6839593648910522},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5845924019813538},{"id":"https://openalex.org/keywords/non-repudiation","display_name":"Non-repudiation","score":0.5577568411827087},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5290842056274414},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5110105276107788},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4432097375392914},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.44299134612083435},{"id":"https://openalex.org/keywords/traceability","display_name":"Traceability","score":0.4148983955383301},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.39269065856933594},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.15153458714485168},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.08106455206871033},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.08024182915687561}],"concepts":[{"id":"https://openalex.org/C2776007630","wikidata":"https://www.wikidata.org/wiki/Q2798912","display_name":"Accountability","level":2,"score":0.8417378664016724},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7046186327934265},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6839593648910522},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5845924019813538},{"id":"https://openalex.org/C44209976","wikidata":"https://www.wikidata.org/wiki/Q1327773","display_name":"Non-repudiation","level":3,"score":0.5577568411827087},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5290842056274414},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5110105276107788},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4432097375392914},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.44299134612083435},{"id":"https://openalex.org/C153876917","wikidata":"https://www.wikidata.org/wiki/Q899704","display_name":"Traceability","level":2,"score":0.4148983955383301},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.39269065856933594},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.15153458714485168},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.08106455206871033},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.08024182915687561},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2020/8899409","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8899409","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8899409.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:6a9f3d51cc6c442da378dae9153b0481","is_oa":true,"landing_page_url":"https://doaj.org/article/6a9f3d51cc6c442da378dae9153b0481","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2020 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2020/8899409","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8899409","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8899409.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.44999998807907104,"display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3082694315.pdf","grobid_xml":"https://content.openalex.org/works/W3082694315.grobid-xml"},"referenced_works_count":19,"referenced_works":["https://openalex.org/W1789401507","https://openalex.org/W2033223053","https://openalex.org/W2084024733","https://openalex.org/W2088588705","https://openalex.org/W2113532854","https://openalex.org/W2131789459","https://openalex.org/W2171987648","https://openalex.org/W2175661655","https://openalex.org/W2341759796","https://openalex.org/W2610757994","https://openalex.org/W2748100636","https://openalex.org/W2751296996","https://openalex.org/W2775470069","https://openalex.org/W2793642207","https://openalex.org/W2800814456","https://openalex.org/W2818894651","https://openalex.org/W2898901224","https://openalex.org/W2948898164","https://openalex.org/W3016744450"],"related_works":["https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W2379281045","https://openalex.org/W2358942851","https://openalex.org/W3003693171"],"abstract_inverted_index":{"Electronic":[0],"healthcare":[1,23,30],"systems":[2,20],"have":[3,93],"received":[4],"extensive":[5],"attention":[6],"during":[7],"the":[8,13,22,27,55,58,76,97,143,154,173,191,203,209,214,225],"last":[9],"decade":[10],"due":[11],"to":[12,39,67,75,86,96,116,151,201],"advancement":[14],"of":[15,29,46,51,57,102,186,193,196,211,230,232],"digital":[16],"technology.":[17],"Using":[18],"these":[19],"in":[21,80,190,238],"industry":[24],"can":[25,62],"improve":[26],"quality":[28],"services":[31],"tremendously.":[32],"However,":[33,100],"a":[34,64],"major":[35],"issue":[36],"that":[37,110,129,153,172,198],"needs":[38],"be":[40,63],"concerned,":[41],"when":[42],"utilizing":[43],"this":[44,133,187,239],"kind":[45],"system,":[47],"is":[48,84,111,176,235],"accountability.":[49],"Employments":[50],"electronic":[52,81,140,155,205],"health":[53,82,141,156,206],"records,":[54],"core":[56],"systems,":[59],"without":[60],"accountability":[61,98,137,166],"big":[65],"risk":[66],"both":[68,117,146],"patients":[69],"and":[70,120,148,163,168,179,221,253],"service":[71],"personals":[72],"and,":[73],"consequently,":[74],"entire":[77],"society.":[78],"Accountability":[79],"records":[83,157],"essential":[85,107],"creating":[87],"trust":[88],"among":[89],"parties.":[90],"Many":[91],"researchers":[92],"been":[94],"introduced":[95],"protocol.":[99],"most":[101],"them":[103],"still":[104],"lack":[105],"some":[106],"security":[108,197,247],"property":[109],"mutual":[112],"authentication.":[113],"This":[114],"leads":[115],"information":[118],"traceability":[119],"nonrepudiation":[121],"which":[122],"are":[123,158,199],"necessary":[124,200],"for":[125,139],"resolving":[126],"any":[127],"conflict":[128],"may":[130],"arise.":[131],"In":[132],"paper,":[134],"we":[135],"propose":[136],"protocol":[138,144,175,216,234,248],"records;":[142],"employs":[145],"asymmetric":[147],"symmetric":[149],"encryptions":[150],"ensure":[152],"having":[159],"confidentiality,":[160],"integrity,":[161],"authentication,":[162],"authorization.":[164],"The":[165,183],"analysis":[167,170],"performance":[169],"show":[171],"proposed":[174,215],"more":[177],"capable":[178],"effective":[180],"than":[181],"others.":[182],"novel":[184],"aspect":[185],"idea":[188],"lies":[189],"inclusion":[192],"certain":[194],"forms":[195],"protect":[202],"patient\u2019s":[204],"records.":[207],"To":[208],"best":[210],"our":[212,233],"knowledge,":[213],"consumes":[217],"less":[218],"cost,":[219],"energy,":[220],"time":[222],"compared":[223],"with":[224],"existing":[226],"protocols.":[227],"A":[228],"proof":[229,249],"concept":[231],"also":[236],"presented":[237],"paper":[240],"by":[241],"using":[242],"BAN":[243],"logic,":[244],"an":[245],"automated":[246],"tool":[250],"named":[251],"Scyther,":[252],"AVISPA":[254]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
