메뉴 건너뛰기




Volumn , Issue , 2011, Pages 549-556

A home healthcare system in the cloud - Addressing security and privacy challenges

Author keywords

Architecture; Cloud computing; Home healthcare; Security and privacy

Indexed keywords

APPLICATION ARCHITECTURE; CRITICAL APPLICATIONS; DIGITAL RIGHTS MANAGEMENT; EMERGING TECHNOLOGIES; ENCRYPTION TECHNOLOGIES; ENGINEERING PROCESS; HEALTHCARE SECTORS; HIGH POTENTIAL; HOME HEALTHCARE; MITIGATION TECHNIQUES; POLICY ENFORCEMENT; QUALITY OF HEALTH CARE; SECURITY AND PRIVACY; SOFTWARE DEVELOPMENT LIFE CYCLE;

EID: 80053133943     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CLOUD.2011.108     Document Type: Conference Paper
Times cited : (67)

References (18)
  • 1
    • 80053141332 scopus 로고    scopus 로고
    • retrieved in 2011
    • TClouds, "Trustworthy Clouds," http://www.tclouds-project.eu/, retrieved in 2011.
    • Trustworthy Clouds
  • 4
    • 0003187764 scopus 로고
    • Directive 95/46/EC of the european parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
    • EU
    • EU, "Directive 95/46/EC of the European parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data." Official Journal of the European Communities, vol. 281, pp. 31-50, 1995.
    • (1995) Official Journal of the European Communities , vol.281 , pp. 31-50
  • 6
    • 79952002261 scopus 로고    scopus 로고
    • A privacy threat analysis framework: Supporting the elicitation and fulfillment of privacy requirements
    • M. Deng, K. Wuyts, R. Scandariato, B. Preneel, and W. Joosen, "A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements," Requirements Engineering, vol. 16, no. 1, pp. 3-32, 2010.
    • (2010) Requirements Engineering , vol.16 , Issue.1 , pp. 3-32
    • Deng, M.1    Wuyts, K.2    Scandariato, R.3    Preneel, B.4    Joosen, W.5
  • 8
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • A. Sahai and B. Waters, "Fuzzy identity-based encryption," in EUROCRYPT, 2005, pp. 457-473. (Pubitemid 41313969)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 9
    • 76649143738 scopus 로고    scopus 로고
    • Mediated ciphertext-policy attribute-based encryption and its application
    • L. Ibraimi, M. Petković, S. Nikova, P. H. Hartel, and W. Jonker, "Mediated ciphertext-policy attribute-based encryption and its application," in WISA, 2009, pp. 309-323.
    • (2009) WISA , pp. 309-323
    • Ibraimi, L.1    Petković, M.2    Nikova, S.3    Hartel, P.H.4    Jonker, W.5
  • 10
    • 78651426152 scopus 로고    scopus 로고
    • An encryption scheme for a secure policy updating
    • L. Ibraimi, M. Asim, and M. Petković, "An encryption scheme for a secure policy updating," in SECRYPT, 2010, pp. 399-408.
    • (2010) SECRYPT , pp. 399-408
    • Ibraimi, L.1    Asim, M.2    Petković, M.3
  • 11
    • 80053149760 scopus 로고    scopus 로고
    • Secure management of personal health records by applying attribute-based encryption
    • July
    • L. Ibraimi, M. Asim, and M. Petković, "Secure management of personal health records by applying attribute-based encryption," Enschede, July 2009.
    • (2009) Enschede
    • Ibraimi, L.1    Asim, M.2    Petković, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.