메뉴 건너뛰기




Volumn 120 LNEE, Issue , 2012, Pages 69-79

Controlling decryption of personal health records in the cloud

Author keywords

Key recovery computation; Personal health records; Substitute key computation

Indexed keywords

INFORMATION PROTECTION; PERSONAL HEALTH RECORD; STORAGE SYSTEMS;

EID: 84255161860     PISSN: 18761100     EISSN: 18761119     Source Type: Book Series    
DOI: 10.1007/978-94-007-2911-7_6     Document Type: Conference Paper
Times cited : (2)

References (20)
  • 1
    • 20144362635 scopus 로고    scopus 로고
    • Defining the personal health record
    • AHIMAe-HIM Personal Health Record Work Group
    • AHIMAe-HIM Personal Health Record Work Group (2005) Defining the personal health record. J AHIMA 76(6):24-25
    • (2005) J AHIMA , vol.76 , Issue.6 , pp. 24-25
  • 5
    • 70350381719 scopus 로고    scopus 로고
    • Accessed 22 Aug 2011
    • Google Inc (2011) "Google Health," http://www.google.com/intl/ zh-TW/health/about/. Accessed 22 Aug 2011
    • (2011) Google Health
  • 6
    • 84855537810 scopus 로고    scopus 로고
    • Accessed 22 Aug 2011
    • Microsoft Corporation (2011) "HealthVault," http://www.microsoft.com/en-us/healthvault/. Accessed 22 Aug 2011
    • (2011) HealthVault
  • 7
    • 63649117166 scopus 로고    scopus 로고
    • Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility
    • Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2008) Cloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener Comput Syst 25(6):599-616
    • (2008) Future Gener Comput Syst , vol.25 , Issue.6 , pp. 599-616
    • Buyya, R.1    Yeo, C.S.2    Venugopal, S.3    Broberg, J.4    Brandic, I.5
  • 9
    • 79952115227 scopus 로고    scopus 로고
    • Ethical, legal and social issues for personal health records and applications
    • Cushman R, Froomkin M, Cava A, Abril P, Goodman KW (2010) Ethical, legal and social issues for personal health records and applications. J Biomed Inform 43(5 Supp. 1):S51-S55
    • (2010) J Biomed Inform , vol.43 , Issue.5 SUPPL. 1
    • Cushman, R.1    Froomkin, M.2    Cava, A.3    Abril, P.4    Goodman, K.W.5
  • 10
    • 67650951127 scopus 로고    scopus 로고
    • Online data storage using implicit security
    • Parakh A, Kak S (2009) Online data storage using implicit security. Inf Sci 179(19):3323-3333
    • (2009) Inf Sci , vol.179 , Issue.19 , pp. 3323-3333
    • Parakh, A.1    Kak, S.2
  • 11
    • 4644334031 scopus 로고    scopus 로고
    • Personal health information management system and its application in referral management
    • Wang M, Lau C, Matsen FA III, Kim Y (2004) Personal health information management system and its application in referral management. IEEE Trans Inf Technol Biomed 8(3):287-297
    • (2004) IEEE Trans Inf Technol Biomed , vol.8 , Issue.3 , pp. 287-297
    • Wang, M.1    Lau, C.2    Matsen III, F.A.3    Kim, Y.4
  • 14
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput App 34:1-11
    • (2011) J Netw Comput App , vol.34 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 17
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest R, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120-126
    • (1978) Commun ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 18
    • 85015402934 scopus 로고
    • Uses of elliptic curves in cryptography
    • Advances in cryptology-CRYPTO '85
    • Miller V, (1986) Uses of elliptic curves in cryptography, Advances in cryptology-CRYPTO '85, Lecture Notes in Computer Science 218: 417-426
    • (1986) Lecture Notes in Computer Science , vol.218 , pp. 417-426
    • Miller, V.1
  • 19
    • 0028513932 scopus 로고
    • Access control: Principle and practice
    • Sandhu RS, Samarati P (1994) Access control: principle and practice. IEEE Commun Mag 32(9):40-48
    • (1994) IEEE Commun Mag , vol.32 , Issue.9 , pp. 40-48
    • Sandhu, R.S.1    Samarati, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.