Serveur d'exploration sur la télématique

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

A Data Encryption Solution for Mobile Health Apps in Cooperation Environments

Identifieur interne : 000901 ( Ncbi/Checkpoint ); précédent : 000900; suivant : 000902

A Data Encryption Solution for Mobile Health Apps in Cooperation Environments

Auteurs :

Source :

RBID : PMC:3636327

Abstract

Background

Mobile Health (mHealth) proposes health care delivering anytime and anywhere. It aims to answer several emerging problems in health services, including the increasing number of chronic diseases, high costs on national health services, and the need to provide direct access to health services, regardless of time and place. mHealth systems include the use of mobile devices and apps that interact with patients and caretakers. However, mobile devices present several constraints, such as processor, energy, and storage resource limitations. The constant mobility and often-required Internet connectivity also exposes and compromises the privacy and confidentiality of health information.

Objective

This paper presents a proposal, construction, performance evaluation, and validation of a data encryption solution for mobile health apps (DE4MHA), considering a novel and early-proposed cooperation strategy. The goal was to present a robust solution based on encryption algorithms that guarantee the best confidentiality, integrity, and authenticity of users health information. In this paper, we presented, explained, evaluated the performance, and discussed the cooperation mechanisms and the proposed encryption solution for mHealth apps.

Methods

First, we designed and deployed the DE4MHA. Then two studies were performed: (1) study and comparison of symmetric and asymmetric encryption/decryption algorithms in an mHealth app under a cooperation environment, and (2) performance evaluation of the DE4MHA. Its performance was evaluated through a prototype using an mHealth app for obesity prevention and cares, called SapoFit. We then conducted an evaluation study of the mHealth app with cooperation mechanisms and the DE4MHA using real users and a real cooperation scenario. In 5 days, 5 different groups of 7 students selected randomly agreed to use and experiment the SapoFit app using the 7 devices available for trials.

Results

There were 35 users of SapoFit that participated in this study. The performance evaluation of the app was done using 7 real mobile devices in 5 different days. The results showed that confidentiality and protection of the users’ health information was guaranteed and SapoFit users were able to use the mHealth app with satisfactory quality. Results also showed that the app with the DE4MHA presented nearly the same results as the app without the DE4MHA. The performance evaluation results considered the probability that a request was successfully answered as a function of the number of uncooperative nodes in the network. The service delivery probability decreased with the increase of uncooperative mobile nodes. Using DE4MHA, it was observed that performance presented a slightly worse result. The service average was also slightly worse but practically insignificantly different than with DE4MHA, being considered negligible.

Conclusions

This paper proposed a data encryption solution for mobile health apps, called DE4MHA. The data encryption algorithm DE4MHA with cooperation mechanisms in mobile health allow users to safely obtain health information with the data being carried securely. These security mechanisms did not deteriorate the overall network performance and the app, maintaining similar performance levels as without the encryption. More importantly, it offers a robust and reliable increase of privacy, confidentiality, integrity, and authenticity of their health information. Although it was experimented on a specific mHealth app, SapoFit, both DE4MHA and the cooperation strategy can be deployed in other mHealth apps.


Url:
DOI: 10.2196/jmir.2498
PubMed: 23624056
PubMed Central: 3636327


Affiliations:


Links toward previous steps (curation, corpus...)


Links to Exploration step

PMC:3636327

Le document en format XML

<record>
<TEI>
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">A Data Encryption Solution for Mobile Health Apps in Cooperation Environments</title>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">PMC</idno>
<idno type="pmid">23624056</idno>
<idno type="pmc">3636327</idno>
<idno type="url">http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3636327</idno>
<idno type="RBID">PMC:3636327</idno>
<idno type="doi">10.2196/jmir.2498</idno>
<date when="2013">2013</date>
<idno type="wicri:Area/Pmc/Corpus">000479</idno>
<idno type="wicri:explorRef" wicri:stream="Pmc" wicri:step="Corpus" wicri:corpus="PMC">000479</idno>
<idno type="wicri:Area/Pmc/Curation">000479</idno>
<idno type="wicri:explorRef" wicri:stream="Pmc" wicri:step="Curation">000479</idno>
<idno type="wicri:Area/Pmc/Checkpoint">000270</idno>
<idno type="wicri:explorRef" wicri:stream="Pmc" wicri:step="Checkpoint">000270</idno>
<idno type="wicri:Area/Ncbi/Merge">000901</idno>
<idno type="wicri:Area/Ncbi/Curation">000901</idno>
<idno type="wicri:Area/Ncbi/Checkpoint">000901</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title xml:lang="en" level="a" type="main">A Data Encryption Solution for Mobile Health Apps in Cooperation Environments</title>
</analytic>
<series>
<title level="j">Journal of Medical Internet Research</title>
<idno type="ISSN">1439-4456</idno>
<idno type="eISSN">1438-8871</idno>
<imprint>
<date when="2013">2013</date>
</imprint>
</series>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<textClass></textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">
<sec sec-type="background">
<title>Background</title>
<p>Mobile Health (mHealth) proposes health care delivering anytime and anywhere. It aims to answer several emerging problems in health services, including the increasing number of chronic diseases, high costs on national health services, and the need to provide direct access to health services, regardless of time and place. mHealth systems include the use of mobile devices and apps that interact with patients and caretakers. However, mobile devices present several constraints, such as processor, energy, and storage resource limitations. The constant mobility and often-required Internet connectivity also exposes and compromises the privacy and confidentiality of health information.</p>
</sec>
<sec sec-type="objective">
<title>Objective</title>
<p>This paper presents a proposal, construction, performance evaluation, and validation of a data encryption solution for mobile health apps (DE4MHA), considering a novel and early-proposed cooperation strategy. The goal was to present a robust solution based on encryption algorithms that guarantee the best confidentiality, integrity, and authenticity of users health information. In this paper, we presented, explained, evaluated the performance, and discussed the cooperation mechanisms and the proposed encryption solution for mHealth apps.</p>
</sec>
<sec sec-type="methods">
<title>Methods</title>
<p>First, we designed and deployed the DE4MHA. Then two studies were performed: (1) study and comparison of symmetric and asymmetric encryption/decryption algorithms in an mHealth app under a cooperation environment, and (2) performance evaluation of the DE4MHA. Its performance was evaluated through a prototype using an mHealth app for obesity prevention and cares, called SapoFit. We then conducted an evaluation study of the mHealth app with cooperation mechanisms and the DE4MHA using real users and a real cooperation scenario. In 5 days, 5 different groups of 7 students selected randomly agreed to use and experiment the SapoFit app using the 7 devices available for trials.</p>
</sec>
<sec sec-type="results">
<title>Results</title>
<p>There were 35 users of SapoFit that participated in this study. The performance evaluation of the app was done using 7 real mobile devices in 5 different days. The results showed that confidentiality and protection of the users’ health information was guaranteed and SapoFit users were able to use the mHealth app with satisfactory quality. Results also showed that the app with the DE4MHA presented nearly the same results as the app without the DE4MHA. The performance evaluation results considered the probability that a request was successfully answered as a function of the number of uncooperative nodes in the network. The service delivery probability decreased with the increase of uncooperative mobile nodes. Using DE4MHA, it was observed that performance presented a slightly worse result. The service average was also slightly worse but practically insignificantly different than with DE4MHA, being considered negligible.</p>
</sec>
<sec sec-type="conclusions">
<title>Conclusions</title>
<p>This paper proposed a data encryption solution for mobile health apps, called DE4MHA. The data encryption algorithm DE4MHA with cooperation mechanisms in mobile health allow users to safely obtain health information with the data being carried securely. These security mechanisms did not deteriorate the overall network performance and the app, maintaining similar performance levels as without the encryption. More importantly, it offers a robust and reliable increase of privacy, confidentiality, integrity, and authenticity of their health information. Although it was experimented on a specific mHealth app, SapoFit, both DE4MHA and the cooperation strategy can be deployed in other mHealth apps.</p>
</sec>
</div>
</front>
<back>
<div1 type="bibliography">
<listBibl>
<biblStruct>
<analytic>
<author>
<name sortKey="Le Moullee, B" uniqKey="Le Moullee B">B Le Moullee</name>
</author>
<author>
<name sortKey="Ray, P" uniqKey="Ray P">P Ray</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Akter, S" uniqKey="Akter S">S Akter</name>
</author>
<author>
<name sortKey="D Ambra, J" uniqKey="D Ambra J">J D'Ambra</name>
</author>
<author>
<name sortKey="Ray, P" uniqKey="Ray P">P Ray</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Subramoniam, S" uniqKey="Subramoniam S">S Subramoniam</name>
</author>
<author>
<name sortKey="Sadi, S" uniqKey="Sadi S">S Sadi</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Akter, S" uniqKey="Akter S">S Akter</name>
</author>
<author>
<name sortKey="Ray, P" uniqKey="Ray P">P Ray</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Tachakra, S" uniqKey="Tachakra S">S Tachakra</name>
</author>
<author>
<name sortKey="Wang, Xh" uniqKey="Wang X">XH Wang</name>
</author>
<author>
<name sortKey="Istepanian, Rs" uniqKey="Istepanian R">RS Istepanian</name>
</author>
<author>
<name sortKey="Song, Yh" uniqKey="Song Y">YH Song</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Laxminarayan, S" uniqKey="Laxminarayan S">S Laxminarayan</name>
</author>
<author>
<name sortKey="Istepanian, Rs" uniqKey="Istepanian R">RS Istepanian</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Istepanian, Rsh" uniqKey="Istepanian R">RSH Istepanian</name>
</author>
<author>
<name sortKey="Lacal, Jc" uniqKey="Lacal J">JC Lacal</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Istepanian, Rsh" uniqKey="Istepanian R">RSH Istepanian</name>
</author>
<author>
<name sortKey="Laxminarayan, S" uniqKey="Laxminarayan S">S Laxminarayan</name>
</author>
<author>
<name sortKey="Pattichis, Cs" uniqKey="Pattichis C">CS Pattichis</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Pare, G" uniqKey="Pare G">G Paré</name>
</author>
<author>
<name sortKey="Moqadem, K" uniqKey="Moqadem K">K Moqadem</name>
</author>
<author>
<name sortKey="Pineau, G" uniqKey="Pineau G">G Pineau</name>
</author>
<author>
<name sortKey="St Hilaire, C" uniqKey="St Hilaire C">C St-Hilaire</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Fayn, J" uniqKey="Fayn J">J Fayn</name>
</author>
<author>
<name sortKey="Rubel, P" uniqKey="Rubel P">P Rubel</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Lin, Ct" uniqKey="Lin C">CT Lin</name>
</author>
<author>
<name sortKey="Chang, Kc" uniqKey="Chang K">KC Chang</name>
</author>
<author>
<name sortKey="Lin, Cl" uniqKey="Lin C">CL Lin</name>
</author>
<author>
<name sortKey="Chiang, Cc" uniqKey="Chiang C">CC Chiang</name>
</author>
<author>
<name sortKey="Lu, Sw" uniqKey="Lu S">SW Lu</name>
</author>
<author>
<name sortKey="Chang, Ss" uniqKey="Chang S">SS Chang</name>
</author>
<author>
<name sortKey="Lin, Bs" uniqKey="Lin B">BS Lin</name>
</author>
<author>
<name sortKey="Liang, Hy" uniqKey="Liang H">HY Liang</name>
</author>
<author>
<name sortKey="Chen, Rj" uniqKey="Chen R">RJ Chen</name>
</author>
<author>
<name sortKey="Lee, Yt" uniqKey="Lee Y">YT Lee</name>
</author>
<author>
<name sortKey="Ko, Lw" uniqKey="Ko L">LW Ko</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Kollmann, A" uniqKey="Kollmann A">A Kollmann</name>
</author>
<author>
<name sortKey="Riedl, M" uniqKey="Riedl M">M Riedl</name>
</author>
<author>
<name sortKey="Kastner, P" uniqKey="Kastner P">P Kastner</name>
</author>
<author>
<name sortKey="Schreier, G" uniqKey="Schreier G">G Schreier</name>
</author>
<author>
<name sortKey="Ludvik, B" uniqKey="Ludvik B">B Ludvik</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Mougiakakou, Sg" uniqKey="Mougiakakou S">SG Mougiakakou</name>
</author>
<author>
<name sortKey="Bartsocas, Cs" uniqKey="Bartsocas C">CS Bartsocas</name>
</author>
<author>
<name sortKey="Bozas, E" uniqKey="Bozas E">E Bozas</name>
</author>
<author>
<name sortKey="Chaniotakis, N" uniqKey="Chaniotakis N">N Chaniotakis</name>
</author>
<author>
<name sortKey="Iliopoulou, D" uniqKey="Iliopoulou D">D Iliopoulou</name>
</author>
<author>
<name sortKey="Kouris, I" uniqKey="Kouris I">I Kouris</name>
</author>
<author>
<name sortKey="Pavlopoulos, S" uniqKey="Pavlopoulos S">S Pavlopoulos</name>
</author>
<author>
<name sortKey="Prountzou, A" uniqKey="Prountzou A">A Prountzou</name>
</author>
<author>
<name sortKey="Skevofilakas, M" uniqKey="Skevofilakas M">M Skevofilakas</name>
</author>
<author>
<name sortKey="Tsoukalis, A" uniqKey="Tsoukalis A">A Tsoukalis</name>
</author>
<author>
<name sortKey="Varotsis, K" uniqKey="Varotsis K">K Varotsis</name>
</author>
<author>
<name sortKey="Vazeou, A" uniqKey="Vazeou A">A Vazeou</name>
</author>
<author>
<name sortKey="Zarkogianni, K" uniqKey="Zarkogianni K">K Zarkogianni</name>
</author>
<author>
<name sortKey="Nikita, Ks" uniqKey="Nikita K">KS Nikita</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Jara, Aj" uniqKey="Jara A">AJ Jara</name>
</author>
<author>
<name sortKey="Zamora, Ma" uniqKey="Zamora M">MA Zamora</name>
</author>
<author>
<name sortKey="Skarmeta, Afg" uniqKey="Skarmeta A">AFG Skarmeta</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Zhu, F" uniqKey="Zhu F">F Zhu</name>
</author>
<author>
<name sortKey="Bosch, M" uniqKey="Bosch M">M Bosch</name>
</author>
<author>
<name sortKey="Woo, I" uniqKey="Woo I">I Woo</name>
</author>
<author>
<name sortKey="Kim, S" uniqKey="Kim S">S Kim</name>
</author>
<author>
<name sortKey="Boushey, Cj" uniqKey="Boushey C">CJ Boushey</name>
</author>
<author>
<name sortKey="Ebert, Ds" uniqKey="Ebert D">DS Ebert</name>
</author>
<author>
<name sortKey="Delp, Ej" uniqKey="Delp E">EJ Delp</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Pollak, J" uniqKey="Pollak J">J Pollak</name>
</author>
<author>
<name sortKey="Gay, G" uniqKey="Gay G">G Gay</name>
</author>
<author>
<name sortKey="Byrne, S" uniqKey="Byrne S">S Byrne</name>
</author>
<author>
<name sortKey="Wagner, E" uniqKey="Wagner E">E Wagner</name>
</author>
<author>
<name sortKey="Retelny, D" uniqKey="Retelny D">D Retelny</name>
</author>
<author>
<name sortKey="Humphreys, L" uniqKey="Humphreys L">L Humphreys</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Patrick, K" uniqKey="Patrick K">K Patrick</name>
</author>
<author>
<name sortKey="Raab, F" uniqKey="Raab F">F Raab</name>
</author>
<author>
<name sortKey="Adams, Ma" uniqKey="Adams M">MA Adams</name>
</author>
<author>
<name sortKey="Dillon, L" uniqKey="Dillon L">L Dillon</name>
</author>
<author>
<name sortKey="Zabinski, M" uniqKey="Zabinski M">M Zabinski</name>
</author>
<author>
<name sortKey="Rock, Cl" uniqKey="Rock C">CL Rock</name>
</author>
<author>
<name sortKey="Griswold, Wg" uniqKey="Griswold W">WG Griswold</name>
</author>
<author>
<name sortKey="Norman, Gj" uniqKey="Norman G">GJ Norman</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Watson, A" uniqKey="Watson A">A Watson</name>
</author>
<author>
<name sortKey="Bickmore, T" uniqKey="Bickmore T">T Bickmore</name>
</author>
<author>
<name sortKey="Cange, A" uniqKey="Cange A">A Cange</name>
</author>
<author>
<name sortKey="Kulshreshtha, A" uniqKey="Kulshreshtha A">A Kulshreshtha</name>
</author>
<author>
<name sortKey="Kvedar, J" uniqKey="Kvedar J">J Kvedar</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Whittaker, R" uniqKey="Whittaker R">R Whittaker</name>
</author>
<author>
<name sortKey="Dorey, E" uniqKey="Dorey E">E Dorey</name>
</author>
<author>
<name sortKey="Bramley, D" uniqKey="Bramley D">D Bramley</name>
</author>
<author>
<name sortKey="Bullen, C" uniqKey="Bullen C">C Bullen</name>
</author>
<author>
<name sortKey="Denny, S" uniqKey="Denny S">S Denny</name>
</author>
<author>
<name sortKey="Elley, Cr" uniqKey="Elley C">CR Elley</name>
</author>
<author>
<name sortKey="Maddison, R" uniqKey="Maddison R">R Maddison</name>
</author>
<author>
<name sortKey="Mcrobbie, H" uniqKey="Mcrobbie H">H McRobbie</name>
</author>
<author>
<name sortKey="Parag, V" uniqKey="Parag V">V Parag</name>
</author>
<author>
<name sortKey="Rodgers, A" uniqKey="Rodgers A">A Rodgers</name>
</author>
<author>
<name sortKey="Salmon, P" uniqKey="Salmon P">P Salmon</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Deglise, C" uniqKey="Deglise C">C Déglise</name>
</author>
<author>
<name sortKey="Suggs, Ls" uniqKey="Suggs L">LS Suggs</name>
</author>
<author>
<name sortKey="Odermatt, P" uniqKey="Odermatt P">P Odermatt</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Silva, Bmc" uniqKey="Silva B">BMC Silva</name>
</author>
<author>
<name sortKey="Lopes, Imc" uniqKey="Lopes I">IMC Lopes</name>
</author>
<author>
<name sortKey="Machado, Tmf" uniqKey="Machado T">TMF Machado</name>
</author>
<author>
<name sortKey="Zhou, L" uniqKey="Zhou L">L Zhou</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Silva, Bmc" uniqKey="Silva B">BMC Silva</name>
</author>
<author>
<name sortKey="Lopes, Imc" uniqKey="Lopes I">IMC Lopes</name>
</author>
<author>
<name sortKey="Rodrigues, Jjpc" uniqKey="Rodrigues J">JJPC Rodrigues</name>
</author>
<author>
<name sortKey="Ray, P" uniqKey="Ray P">P Ray</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Rodrigues, Jj" uniqKey="Rodrigues J">JJ Rodrigues</name>
</author>
<author>
<name sortKey="Lopes, Im" uniqKey="Lopes I">IM Lopes</name>
</author>
<author>
<name sortKey="Silva, Bm" uniqKey="Silva B">BM Silva</name>
</author>
<author>
<name sortKey="De La Torre, I" uniqKey="De La Torre I">I de la Torre</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Jonsson, J" uniqKey="Jonsson J">J Jonsson</name>
</author>
<author>
<name sortKey="Kaliski, B" uniqKey="Kaliski B">B Kaliski</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Raeburn, K" uniqKey="Raeburn K">K Raeburn</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Housley, R" uniqKey="Housley R">R Housley</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Jaganathan, K" uniqKey="Jaganathan K">K Jaganathan</name>
</author>
<author>
<name sortKey="Zhu, L" uniqKey="Zhu L">L Zhu</name>
</author>
<author>
<name sortKey="Brezak, J" uniqKey="Brezak J">J Brezak</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Shirey, R" uniqKey="Shirey R">R Shirey</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Rescorla, E" uniqKey="Rescorla E">E Rescorla</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Mcgrew, D" uniqKey="Mcgrew D">D McGrew</name>
</author>
<author>
<name sortKey="Igoe, M" uniqKey="Igoe M">M Igoe</name>
</author>
<author>
<name sortKey="Salter, M" uniqKey="Salter M">M Salter</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Raychaudhuri, K" uniqKey="Raychaudhuri K">K Raychaudhuri</name>
</author>
<author>
<name sortKey="Ray, P" uniqKey="Ray P">P Ray</name>
</author>
</analytic>
</biblStruct>
</listBibl>
</div1>
</back>
</TEI>
<affiliations>
<list></list>
<tree></tree>
</affiliations>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/TelematiV1/Data/Ncbi/Checkpoint
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000901 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Ncbi/Checkpoint/biblio.hfd -nk 000901 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Ticri/CIDE
   |area=    TelematiV1
   |flux=    Ncbi
   |étape=   Checkpoint
   |type=    RBID
   |clé=     PMC:3636327
   |texte=   A Data Encryption Solution for Mobile Health Apps in Cooperation Environments
}}

Pour générer des pages wiki

HfdIndexSelect -h $EXPLOR_AREA/Data/Ncbi/Checkpoint/RBID.i   -Sk "pubmed:23624056" \
       | HfdSelect -Kh $EXPLOR_AREA/Data/Ncbi/Checkpoint/biblio.hfd   \
       | NlmPubMed2Wicri -a TelematiV1 

Wicri

This area was generated with Dilib version V0.6.31.
Data generation: Thu Nov 2 16:09:04 2017. Site generation: Sun Mar 10 16:42:28 2024