메뉴 건너뛰기




Volumn 6, Issue 2-3, 2011, Pages 67-76

ESPAC: Enabling security and patient-centric access control for ehealth in cloud computing

Author keywords

ABE; Access control; Attribute based encryption; Cloud computing; Ehealth; Privacy; Security

Indexed keywords

CLOUD COMPUTING; CRYPTOGRAPHY; DATA PRIVACY; DIGITAL STORAGE; EHEALTH;

EID: 84857178198     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/IJSN.2011.043666     Document Type: Article
Times cited : (133)

References (19)
  • 1
    • 79959287901 scopus 로고    scopus 로고
    • Secure and quality of service assurance scheduling scheme for wban with application to ehealth
    • 2011 IEEE, Cancun, Quintana-Roo, Mexico
    • Barua, M., Alam, M.S., Liang, X. and Shen, X. (2011) 'Secure and quality of service assurance scheduling scheme for wban with application to ehealth', Wireless Communications and Networking Conference (WCNC), 2011 IEEE, Cancun, Quintana-Roo, Mexico, pp.1-5.
    • (2011) Wireless Communications and Networking Conference (WCNC) , pp. 1-5
    • Barua, M.1    Alam, M.S.2    Liang, X.3    Shen, X.4
  • 2
    • 34548731375 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption
    • DOI 10.1109/SP.2007.11, 4223236, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
    • Bethencourt, J., Sahai, A. and Waters, B. (2007) 'Ciphertext-policy attribute-based encryption', Security and Privacy, 2007. SP '07. IEEE Symposium on, Washington DC, USA, pp.321-334. (Pubitemid 47432538)
    • (2007) Proceedings - IEEE Symposium on Security and Privacy , pp. 321-334
    • Bethencourt, J.1    Sahai, A.2    Waters, B.3
  • 4
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Advances in Cryptology - CRYPTO 2001
    • Boneh, D. and Franklin, M.K. (2001) 'Identity-based encryption from the weil pairing', CRYPTO '01: Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag, London, UK, pp.213-229. (Pubitemid 33317917)
    • (2001) Lecture Notes in Computer Science , Issue.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 6
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • DOI 10.1145/1180405.1180418, 1180418, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
    • Goyal, V., Pandey, O., Sahai, A. and Waters, B. (2006) 'Attribute-based encryption for fine-grained access control of encrypted data', Proceedings of the 13th ACM Conference on Computer and Communications Security', CCS '06, ACM, New York, NY, USA, pp.89-98. (Pubitemid 47131359)
    • (2006) Proceedings of the ACM Conference on Computer and Communications Security , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 9
    • 79959305027 scopus 로고    scopus 로고
    • Patient self-controllable access policy on phi in ehealthcare systems
    • Kitchener, Ontario, Canada
    • Liang, X., Lu, R., Lin, X. and Shen, X. (2010) 'Patient self-controllable access policy on phi in ehealthcare systems', AHIC 2010, Kitchener, Ontario, Canada, pp.1-5.
    • (2010) AHIC 2010 , pp. 1-5
    • Liang, X.1    Lu, R.2    Lin, X.3    Shen, X.4
  • 10
    • 67349253018 scopus 로고    scopus 로고
    • Sage: A strong privacy-preserving scheme against global eavesdropping for ehealth systems
    • IEEE Journal on
    • Lin, X., Lu, R., Shen, X., Nemoto, Y. and Kato, N. (2009) 'Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems', Selected Areas in Communications, IEEE Journal on, Vol. 27, No. 4, pp.365-378.
    • (2009) Selected Areas in Communications , vol.27 , Issue.4 , pp. 365-378
    • Lin, X.1    Lu, R.2    Shen, X.3    Nemoto, Y.4    Kato, N.5
  • 11
    • 78249245445 scopus 로고    scopus 로고
    • Efficient sharing of secure cloud storage services
    • 2010 IEEE 10th International Conference on, Los Alamitos, CA, USA
    • Liu, Q., Wang, G. and Wu, J. (2010) 'Efficient sharing of secure cloud storage services', Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on, Los Alamitos, CA, USA, pp.922-929.
    • (2010) Computer and Information Technology (CIT) , pp. 922-929
    • Liu, Q.1    Wang, G.2    Wu, J.3
  • 12
    • 78249278133 scopus 로고    scopus 로고
    • Data-centric privacy protocol for intensive care grids
    • IEEE Transactions on
    • Luna, J., Dikaiakos, M., Marazakis, M. and Kyprianou, T. (2010) 'Data-centric privacy protocol for intensive care grids', Information Technology in Biomedicine, IEEE Transactions on, Vol. 14, No. 6, pp.1327-1337.
    • (2010) Information Technology in Biomedicine , vol.14 , Issue.6 , pp. 1327-1337
    • Luna, J.1    Dikaiakos, M.2    Marazakis, M.3    Kyprianou, T.4
  • 13
    • 84855669629 scopus 로고    scopus 로고
    • A secure handshake scheme with symptoms-matching for mhealthcare social network
    • Springer, Netherlands
    • Lu, R., Lin, X., Liang, X. and Shen, X. (2010) 'A secure handshake scheme with symptoms-matching for mhealthcare social network', Mobile Networks and Applications, Springer, Netherlands, pp.1-12.
    • (2010) Mobile Networks and Applications , pp. 1-12
    • Lu, R.1    Lin, X.2    Liang, X.3    Shen, X.4
  • 14
    • 84934300668 scopus 로고    scopus 로고
    • Computing cryptographic algorithms in portable and embedded devices
    • PORTABLE07, IEEE International Conference on, Orlando, Florida
    • Ramachandran, A., Zhou, Z. and Huang, D. (2007) 'Computing cryptographic algorithms in portable and embedded devices', Portable Information Devices, 2007. PORTABLE07, IEEE International Conference on, Orlando, Florida, pp.1-7.
    • (2007) Portable Information Devices, 2007 , pp. 1-7
    • Ramachandran, A.1    Zhou, Z.2    Huang, D.3
  • 17
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • 2010 Proceedings IEEE, San Diego, CA, USA
    • Yu, S., Wang, C., Ren, K. and Lou, W. (2010) 'Achieving secure, scalable, and fine-grained data access control in cloud computing', INFOCOM, 2010 Proceedings IEEE, San Diego, CA, USA, pp.1-9.
    • (2010) INFOCOM , pp. 1-9
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 18
    • 77957968012 scopus 로고    scopus 로고
    • Security models and requirements for healthcare application clouds
    • 2010 IEEE 3rd International Conference on, Miami, FL, USA
    • Zhang, R. and Liu, L. (2010) 'Security models and requirements for healthcare application clouds', Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on, Miami, FL, USA, pp.268-275.
    • (2010) Cloud Computing (CLOUD) , pp. 268-275
    • Zhang, R.1    Liu, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.