메뉴 건너뛰기




Volumn 13, Issue 2, 2011, Pages 102-112

PEC: A privacy-preserving emergency call scheme for mobile healthcare social networks

Author keywords

Fine grained access control; Mobile healthcare social network; Privacy preservation; Revocation

Indexed keywords

HEALTH CARE; NETWORK SECURITY; PERSONAL DIGITAL ASSISTANTS; PRIVACY-PRESERVING TECHNIQUES; SOCIAL NETWORKING (ONLINE);

EID: 79956315983     PISSN: 12292370     EISSN: None     Source Type: Journal    
DOI: 10.1109/jcn.2011.6157409     Document Type: Article
Times cited : (75)

References (32)
  • 1
    • 84898626815 scopus 로고    scopus 로고
    • List of causes of death by rate. [Online]. Available: http://en.wikipedia. org/wiki/List-of-causes-of-death-by-rate
    • List of Causes of Death by Rate
  • 3
  • 5
    • 33745949749 scopus 로고    scopus 로고
    • Emergency medical services. [Online]. Available: http://en.wikipedia. org/wiki/Emergency-medical-services
    • Emergency Medical Services
  • 6
    • 84868107697 scopus 로고    scopus 로고
    • Secure handshake with symptomsmatching: The essential to the success of mhealthcare social network
    • R. Lu, X. Lin, X. Liang, and X. Shen, "Secure handshake with symptomsmatching: The essential to the success of mhealthcare social network," in Proc. BodyNets, 2010.
    • (2010) Proc. BodyNets
    • Lu, R.1    Lin, X.2    Liang, X.3    Shen, X.4
  • 7
    • 77955579359 scopus 로고    scopus 로고
    • Exploring the use of social network methods in designing healthcare quality improvement teams
    • D. Meltzer, J. Chung, P. Khalili, E. Marlowa, V. Arora, G. Schumock, and R. Burt, "Exploring the use of social network methods in designing healthcare quality improvement teams," in Proc. Soc. Sci. Med., vol. 71, no. 6, 2010, pp. 1119-1130.
    • (2010) Proc. Soc. Sci. Med. , vol.71 , Issue.6 , pp. 1119-1130
    • Meltzer, D.1    Chung, J.2    Khalili, P.3    Marlowa, E.4    Arora, V.5    Schumock, G.6    Burt, R.7
  • 8
    • 77954838422 scopus 로고    scopus 로고
    • Managing healthcare through social networks
    • M. Domingo, "Managing healthcare through social networks," in Proc. IEEE Comput. Mag., vol. 43, no. 7, 2010, pp. 20-25.
    • (2010) Proc. IEEE Comput. Mag. , vol.43 , Issue.7 , pp. 20-25
    • Domingo, M.1
  • 9
    • 77956882701 scopus 로고    scopus 로고
    • Wireless sensor networks for healthcare: A survey
    • H. Alemdar and C. Ersoy, "Wireless sensor networks for healthcare: A survey," in Proc. Comput. Netw., vol. 54, no. 15,2010, pp. 2688-2710.
    • (2010) Proc. Comput. Netw. , vol.54 , Issue.15 , pp. 2688-2710
    • Alemdar, H.1    Ersoy, C.2
  • 10
    • 35549002780 scopus 로고    scopus 로고
    • Addressing security in medical sensor networks
    • K. Malasri and L. Wang, "Addressing security in medical sensor networks," in Proc. HealthNet, 2007, pp. 7-12.
    • (2007) Proc. HealthNet , pp. 7-12
    • Malasri, K.1    Wang, L.2
  • 12
    • 77953976354 scopus 로고    scopus 로고
    • An attribute-based authorization policy framework with dynamic conflict resolution
    • A. Mohan and D. M. Blough, "An attribute-based authorization policy framework with dynamic conflict resolution," in Proc. IDtrust, 2010, pp. 37-50.
    • (2010) Proc. IDtrust , pp. 37-50
    • Mohan, A.1    Blough, D.M.2
  • 14
    • 85161646279 scopus 로고    scopus 로고
    • One patient, one record: Report on one-day symposium to promote patient ehealth
    • K. J. Leonard, "One patient, one record: Report on one-day symposium to promote patient ehealth," in Proc. Technique Reports. [Online]. Available:http://patientdestiny.typepad.com/OPOR%20Report%20%20Ottawa.pdf, 2010
    • (2010) Proc. Technique Reports
    • Leonard, K.J.1
  • 15
    • 39049122093 scopus 로고    scopus 로고
    • Extracting a mobility model from real user traces
    • M. Kim, D. Kotz, and S. Kim, "Extracting a mobility model from real user traces," in Proc. IEEE INFOCOM, 2006, pp. 1-13.
    • (2006) Proc. IEEE INFOCOM , pp. 1-13
    • Kim, M.1    Kotz, D.2    Kim, S.3
  • 16
    • 69649091318 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • B. Waters, "Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization," in Proc. Cryptology ePrint Archive: Report 2008/290, 2008.
    • (2008) Proc. Cryptology EPrint Archive: Report 2008/290
    • Waters, B.1
  • 17
    • 38149076425 scopus 로고    scopus 로고
    • Short group signature without random oracles
    • X. Liang, Z. Cao, J. Shao, and H. Lin, "Short group signature without random oracles," in Proc. ICICS, 2007, pp. 69-82.
    • (2007) Proc. ICICS , pp. 69-82
    • Liang, X.1    Cao, Z.2    Shao, J.3    Lin, H.4
  • 18
    • 37149007674 scopus 로고    scopus 로고
    • Full-domain subgroup hiding and constant-size group signatures
    • X. Boyen and B. Waters, "Full-domain subgroup hiding and constant-size group signatures," in Proc. PKC, 2007, pp. 1-15.
    • (2007) Proc. PKC , pp. 1-15
    • Boyen, X.1    Waters, B.2
  • 20
    • 69949166012 scopus 로고    scopus 로고
    • Identity-based encryption with efficient revocation
    • A. Boldyreva, V. Goyal, and V. Kumar, "Identity-based encryption with efficient revocation," in Proc. ACM CCS, 2008, pp. 417-426.
    • (2008) Proc. ACM CCS , pp. 417-426
    • Boldyreva, A.1    Goyal, V.2    Kumar, V.3
  • 21
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-id secure identity-based encryption without random oracles
    • D. Boneh and X. Boyen, "Efficient selective-id secure identity-based encryption without random oracles," in Proc. EUROCRYPT, 2004, pp. 223-238.
    • (2004) Proc. EUROCRYPT , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 22
    • 70349682512 scopus 로고    scopus 로고
    • Fdac: Toward fine-grained distributed data access control in wireless sensor networks
    • S. Yu, K. Ren, and W. Lou, "Fdac: Toward fine-grained distributed data access control in wireless sensor networks," in Proc. IEEE INFOCOM, 2009, pp. 963-971.
    • (2009) Proc. IEEE INFOCOM , pp. 963-971
    • Yu, S.1    Ren, K.2    Lou, W.3
  • 23
    • 77649094379 scopus 로고    scopus 로고
    • Data security and privacy in wireless body area networks
    • M. Li, W. Lou, and K. Ren, "Data security and privacy in wireless body area networks," IEEE Wireless Commun., vol. 17, no. 1, pp. 51-58, 2010.
    • (2010) IEEE Wireless Commun. , vol.17 , Issue.1 , pp. 51-58
    • Li, M.1    Lou, W.2    Ren, K.3
  • 24
    • 67349253018 scopus 로고    scopus 로고
    • Sage: A strong privacy-preserving scheme against global eavesdropping for ehealth systems
    • X. Lin, R. Lu, X. Shen, Y. Nemoto, and N. Kato, "Sage: A strong privacy-preserving scheme against global eavesdropping for ehealth systems," IEEE J. Sel. Areas Commun., vol. 27, no. 4, pp. 365-378, 2009.
    • (2009) IEEE J. Sel. Areas Commun. , vol.27 , Issue.4 , pp. 365-378
    • Lin, X.1    Lu, R.2    Shen, X.3    Nemoto, Y.4    Kato, N.5
  • 25
    • 79956295485 scopus 로고    scopus 로고
    • Privacy policy enforcement for health information data access
    • F. Currim, E. Jung, X. Xiao, and I. Jo, "Privacy policy enforcement for health information data access," in Proc. WiMD, 2009, pp. 39-44.
    • (2009) Proc. WiMD , pp. 39-44
    • Currim, F.1    Jung, E.2    Xiao, X.3    Jo, I.4
  • 26
    • 35549010677 scopus 로고    scopus 로고
    • Rendezvous-based access control for medical records in the pre-hospital environment
    • F. W. Dillema and S. Lupetti, "Rendezvous-based access control for medical records in the pre-hospital environment," in Proc. HealthNet, 2007, pp. 1-6.
    • (2007) Proc. HealthNet , pp. 1-6
    • Dillema, F.W.1    Lupetti, S.2
  • 27
    • 84872124618 scopus 로고    scopus 로고
    • Towards a security policy for ubiquitous healthcare systems (position paper)
    • J. Kim, A. Beresford, and F. Stajano, "Towards a security policy for ubiquitous healthcare systems (position paper)," in Proc. ICUCT, 2006, pp. 263-272.
    • (2006) Proc. ICUCT , pp. 263-272
    • Kim, J.1    Beresford, A.2    Stajano, F.3
  • 30
    • 49049111604 scopus 로고    scopus 로고
    • Bounded ciphertext policy attribute based encryption
    • V. Goyal, A. Jain, O. Pandey, and A. Sahai, "Bounded ciphertext policy attribute based encryption," in Proc. ICALP (2), 2008, pp. 579-591.
    • (2008) Proc. ICALP (2) , pp. 579-591
    • Goyal, V.1    Jain, A.2    Pandey, O.3    Sahai, A.4
  • 31
    • 85084163661 scopus 로고    scopus 로고
    • A method for fast revocation of public key certificates and security capabilities
    • D. Boneh, X. Ding, G. Tsudik, and M. Wong, "A method for fast revocation of public key certificates and security capabilities," in Proc. USENIX Security Symp., 2001, pp. 22-22.
    • (2001) Proc. USENIX Security Symp. , pp. 22-22
    • Boneh, D.1    Ding, X.2    Tsudik, G.3    Wong, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.