메뉴 건너뛰기




Volumn , Issue , 2009, Pages 103-114

Patient controlled encryption: Ensuring privacy of electronic medical records

Author keywords

Electronic health records; Electronic medical records; Encryption; Privacy

Indexed keywords

ACCESS RIGHTS; CRYPTOGRAPHIC PRIMITIVES; DATA CENTERS; EFFICIENT SYSTEMS; ELECTRONIC HEALTH RECORD; ELECTRONIC HEALTH RECORD SYSTEMS; ELECTRONIC MEDICAL RECORD; ENCRYPTION KEY; ENCRYPTION SCHEMES;

EID: 74049110390     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1655008.1655024     Document Type: Conference Paper
Times cited : (271)

References (18)
  • 2
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • Selim G. Akl and Peter D. Taylor. Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. Comput. Syst., 1(3):239-248, 1983.
    • (1983) ACM Trans. Comput. Syst , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 3
  • 4
    • 74049149007 scopus 로고    scopus 로고
    • Benaloh. Key compression and its application to digital fingerprinting
    • Microsoft Research
    • Josh Benaloh. Key compression and its application to digital fingerprinting. Technical Report Technical Report, Microsoft Research, 2009.
    • (2009) Technical Report Technical Report
    • Josh1
  • 7
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-ciphertext security from identity-based encryption
    • Ran Canetti, Shai Halevi, and Jonathan Katz. Chosen-ciphertext security from identity-based encryption. In EUROCRYPT, pages 207-222, 2004.
    • (2004) EUROCRYPT , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 11
    • 70349557354 scopus 로고    scopus 로고
    • Hierarchical ID-based cryptography
    • Yuliang Zheng, editor, Advances in Cryptology, ASIACRYPT 2002, of, Springer Verlag
    • Craig Gentry and Alice Silverberg. Hierarchical ID-based cryptography. In Yuliang Zheng, editor, Advances in Cryptology - ASIACRYPT 2002, volume 2501 of Lecture Notes in Computer Science, pages 548-566. Springer Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2501 , pp. 548-566
    • Gentry, C.1    Silverberg, A.2
  • 15
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Amit Sahai and Brent Waters. Fuzzy identity-based encryption. In EUROCRYPT, pages 457-473, 2005.
    • (2005) EUROCRYPT , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 16
    • 0023962708 scopus 로고
    • Cryptographic implementation of a tree hierarchy for access control
    • Ravi S. Sandhu. Cryptographic implementation of a tree hierarchy for access control. Inf. Process. Lett., 27(2):95-98, 1988.
    • (1988) Inf. Process. Lett , vol.27 , Issue.2 , pp. 95-98
    • Sandhu, R.S.1
  • 17
    • 38049015677 scopus 로고
    • On the generation of cryptographically strong pseudorandom sequences
    • Adi Shamir. On the generation of cryptographically strong pseudorandom sequences. In ACM Transaction on Computer Systems, volume 1, pages 38-44, 1983.
    • (1983) ACM Transaction on Computer Systems , vol.1 , pp. 38-44
    • Shamir, A.1
  • 18
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • George Robert Blakley and David Chaum, editors, Advances in Cryptology, CRYPTO '84, of, Springer Verlag
    • Adi Shamir. Identity-based cryptosystems and signature schemes. In George Robert Blakley and David Chaum, editors, Advances in Cryptology - CRYPTO '84, volume 196 of Lecture Notes in Computer Science, pages 47-53. Springer Verlag, 1985.
    • (1985) Lecture Notes in Computer Science , vol.196 , pp. 47-53
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.