메뉴 건너뛰기




Volumn 2, Issue 4, 2011, Pages 487-508

Health records and the cloud computing paradigm from a privacy perspective

Author keywords

Cloud computing; Electronic health record; Personal health record; Privacy aspects; Privacy protection

Indexed keywords


EID: 84864091173     PISSN: 20402295     EISSN: 20402309     Source Type: Journal    
DOI: 10.1260/2040-2295.2.4.487     Document Type: Article
Times cited : (7)

References (30)
  • 3
    • 0347178887 scopus 로고    scopus 로고
    • Computer Security Institute (CSI)
    • Computer Security Institute (CSI). Computer Crime and Security Survey 2007. http://www.gocsi.com/forms/csi survey.jhtml
    • Computer Crime and Security Survey 2007
  • 4
    • 84864087027 scopus 로고    scopus 로고
    • Cloud Computing & SaaS In 2010-What To Expect After The Uncertainty & Hype Fade
    • Gain, B. Cloud Computing & SaaS In 2010-What To Expect After The Uncertainty & Hype Fade. Processor 32(1), 2010.
    • (2010) Processor , vol.32 , Issue.1
    • Gain, B.1
  • 7
    • 33644682163 scopus 로고    scopus 로고
    • Personal Health Records: Definitions, Benefits, and Strategies for Overcoming Barriers to Adoption
    • Tang, P.C., Ash, J.S., Bates, D.W., Overhage, J.M., and Sands, D.Z. Personal Health Records: Definitions, Benefits, and Strategies for Overcoming Barriers to Adoption. J Am Med Inform Assoc. 13 (2): 121-126, 2006.
    • (2006) J Am Med Inform Assoc. , vol.13 , Issue.2 , pp. 121-126
    • Tang, P.C.1    Ash, J.S.2    Bates, D.W.3    Overhage, J.M.4    Sands, D.Z.5
  • 8
    • 84875568307 scopus 로고    scopus 로고
    • Chronisch Kranke einstellen? Eine experimentelle Vignettenstudie unter Personalmanagern
    • In Martin Meidenbauer Verlag
    • Frick, U., Baer, N. et al. Chronisch Kranke einstellen? Eine experimentelle Vignettenstudie unter Personalmanagern. In Proc. FFH 2008, pages 45-50, Martin Meidenbauer Verlag, 2008.
    • (2008) Proc. FFH 2008 , pp. 45-50
    • Frick, U.1    Baer, N.2
  • 11
    • 67650522224 scopus 로고    scopus 로고
    • Secure e-Health Architecture based on the Appliance of Pseudonymization
    • Riedl, B., Grascher, V., and Neubauer, T. A Secure e-Health Architecture based on the Appliance of Pseudonymization. Journal of Software 3(2): 23-32, 2008.
    • (2008) Journal of Software , vol.3 , Issue.2 , pp. 23-32
    • Riedl, B.1    Grascher, V.2    Neubauer, T.A.3
  • 12
    • 33749405570 scopus 로고    scopus 로고
    • Patient bleibt Herr seiner Daten. Realisierung des eGK-Berechtigungs-konzepts -ber ein ticketbasiertes, virtuelles Dateisystem
    • Caumanns, J. Der Patient bleibt Herr seiner Daten. Realisierung des eGK-Berechtigungs-konzepts -ber ein ticketbasiertes, virtuelles Dateisystem. Informatik-Spektrum 29 (5): 323-331, 2006.
    • (2006) Informatik-Spektrum , vol.29 , Issue.5 , pp. 323-331
    • der Caumanns, J.1
  • 13
    • 52949085153 scopus 로고    scopus 로고
    • Privacy-Preserving Electronic Health Record Linkage Using Pseudonym Identifiers
    • In IEEE Communications Society
    • Alhaqbani, B., Fidge, C. Privacy-Preserving Electronic Health Record Linkage Using Pseudonym Identifiers. In Proc. of HealthComm 2008, pages 108 - 117, IEEE Communications Society, 2008.
    • (2008) Proc. of HealthComm 2008 , pp. 108-117
    • Alhaqbani, B.1    Fidge, C.2
  • 14
    • 68349133104 scopus 로고    scopus 로고
    • Privacy Management Architecture for Patient-Controlled Personal Health Record System
    • Huda, N., Sonehara, N., and Yamada, S. A Privacy Management Architecture for Patient-Controlled Personal Health Record System. Journal of Engineering Science and Technology 4(2): 154-170, 2009.
    • (2009) Journal of Engineering Science and Technology , vol.4 , Issue.2 , pp. 154-170
    • Huda, N.1    Sonehara, N.2    Yamada, S.A.3
  • 16
    • 0035517699 scopus 로고    scopus 로고
    • Protecting Respondents-Identities in Microdata Release
    • Samarati, P. Protecting Respondents- Identities in Microdata Release. IEEE Trans. Knowl. Data Eng. 13(6): 1010-1027, 2001.
    • (2001) IEEE Trans. Knowl. Data Eng. , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 17
    • 0001868672 scopus 로고
    • Optimal Asymmetric Encryption
    • In LNCSSpringer-Verlag
    • Bellare, M., and Rogaway, P.: Optimal Asymmetric Encryption. In Proc. of EUROCRYPT 1994. LNCS vol. 950, pages 92-111. Springer-Verlag, 1994.
    • (1994) Proc. of EUROCRYPT 1994 , vol.950 , pp. 92-111
    • Bellare, M.1    Rogaway, P.2
  • 18
    • 85032883059 scopus 로고
    • A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
    • In LNCSSpringer-Verlag
    • El Gamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In Proc. of CRYPTO 1984, LNCS vol. 196, pages 10-18. Springer-Verlag, 1984.
    • (1984) Proc. of CRYPTO 1984 , vol.196 , pp. 10-18
    • El Gamal, T.1
  • 19
    • 84870707379 scopus 로고    scopus 로고
    • A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack
    • In LNCS Springer-Verlag
    • Cramer, R., Shoup, V.: APractical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack. In Proc. of CRYPTO 1998, LNCS vol. 1462, pages 13-25. Springer-Verlag 1998.
    • (1998) Proc. of CRYPTO 1998 , vol.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 20
    • 58149354681 scopus 로고    scopus 로고
    • Privacy-enhancing methods for e-health applications: How to prevent statistical analyses and attacks
    • Stingl, C. and Slamanig, D. Privacy-enhancing methods for e-health applications: how to prevent statistical analyses and attacks. Int. J. Bus. Intell. Data Min. 3(3): 236-254, 2008.
    • (2008) Int. J. Bus. Intell. Data Min. , vol.3 , Issue.3 , pp. 236-254
    • Stingl, C.1    Slamanig, D.2
  • 21
    • 49049117866 scopus 로고    scopus 로고
    • Privacy Aspects of eHealth
    • In IEEE Computer Society
    • Slamanig, D., and Stingl, C. Privacy Aspects of eHealth. In Proc. of ARES 2008, pages 1226-1233. IEEE Computer Society, 2008.
    • (2008) Proc. of ARES 2008 , pp. 1226-1233
    • Slamanig, D.1    Stingl, C.2
  • 22
    • 38149068986 scopus 로고    scopus 로고
    • Deterministic and Efficiently Searchable Encryption
    • In LNCS. Springer-Verlag
    • Bellare, M., Boldyreva, A., O-Neill, A. Deterministic and Efficiently Searchable Encryption. In Proc. of CRYPTO 2007. LNCS, vol. 4622, pages 535-552. Springer-Verlag, 2007.
    • (2007) Proc. of CRYPTO 2007 , vol.4622 , pp. 535-552
    • Bellare, M.1    Boldyreva, A.2    O-Neill, A.3
  • 23
    • 50249171823 scopus 로고    scopus 로고
    • Survey of Anonymous Communication Channels
    • Microsoft Research
    • Danezis, G. and Diaz, C. A Survey of Anonymous Communication Channels. Technical Report MSRTR-2008-35, Microsoft Research, 2008.
    • (2008) Technical Report MSRTR-2008-35
    • Danezis, G.1    Diaz, C.A.2
  • 24
    • 84921018856 scopus 로고    scopus 로고
    • Practical and Provably Secure Coalition-Resistant Group Signature Scheme
    • In LNCS Springer-Verlag
    • Ateniese, G., Camenisch, J., Joye, M., Tsudik, G. A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. In Proc. of CRYPTO 2000. LNCS, vol. 1880, pages 255-270. Springer-Verlag, 2000.
    • (2000) Proc. of CRYPTO 2000 , vol.1880 , pp. 255-270
    • Ateniese, G.1    Camenisch, J.2    Joye, M.3    Tsudik, G.A.4
  • 25
    • 35048887476 scopus 로고    scopus 로고
    • Short Group Signatures
    • In LNCSSpringer-Verlag
    • Boneh, D., Boyen, X., Shacham, H. Short Group Signatures. In Proc. of CRYPTO 2004. LNCS, vol. 3152, pages 41-55. Springer-Verlag, 2004.
    • (2004) Proc. of CRYPTO 2004 , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 26
    • 33745871113 scopus 로고    scopus 로고
    • k-Times Anonymous Authentication with a Constant Proving Cost
    • In LNCS. Springer-Verlag
    • Teranishi, I., Sako, K. k-Times Anonymous Authentication with a Constant Proving Cost. In Proc. of Public-Key Cryptography 2006. LNCS, vol. 3958, pages 525-542. Springer-Verlag, 2006.
    • (2006) Proc. of Public-Key Cryptography 2006 , vol.3958 , pp. 525-542
    • Teranishi, I.1    Sako, K.2
  • 27
    • 74549164179 scopus 로고    scopus 로고
    • Practical Traceable Anonymous Identification
    • In INSTICC Press
    • Slamanig, D., Schartner, P., Stingl, C. Practical Traceable Anonymous Identification. In Proc. of SECRYPT 2009, pages 225-232. INSTICC Press, 2009.
    • (2009) Proc. of SECRYPT 2009 , pp. 225-232
    • Slamanig, D.1    Schartner, P.2    Stingl, C.3
  • 28
    • 78651460019 scopus 로고    scopus 로고
    • Anonymous But Authorized Transactions Supporting Selective Traceability
    • In IEEE Communications Society
    • Slamanig, D., and Rass, S. Anonymous But Authorized Transactions Supporting Selective Traceability. In Proc. of SECRYPT 2010, IEEE Communications Society, 2010.
    • (2010) Proc. of SECRYPT 2010
    • Slamanig, D.1    Rass, S.2
  • 29
    • 0018545449 scopus 로고
    • How to Share a Secret
    • Shamir, A. How to Share a Secret. Commun. ACM 22(11): 612-613, 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 30
    • 85027202957 scopus 로고
    • Generalized Secret Sharing and Monotone Functions
    • In LNCS, Springer-Verlag
    • Benaloh, J.C., and Leichter, J. Generalized Secret Sharing and Monotone Functions. In Proc. of CRYPTO 1988. LNCS, vol. 403, pages 27-35, Springer-Verlag, 1988.
    • (1988) Proc. of CRYPTO 1988 , vol.403 , pp. 27-35
    • Benaloh, J.C.1    Leichter, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.