메뉴 건너뛰기




Volumn 35, Issue 15, 2012, Pages 1910-1920

HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks

Author keywords

Attribute oriented authentication; Attribute oriented transmission; Health social networks

Indexed keywords

ACCESS POLICIES; AUTHENTICATION SCHEME; CIPHERTEXTS; COLLUSION ATTACK; EAVESDROPPING ATTACKS; EXTENSIVE SIMULATIONS; FORGERY ATTACKS; HEALTH INFORMATIONS; PRIVACY PRESERVING; SECURITY ANALYSIS; SENSITIVE ATTRIBUTE; SOCIAL NETWORKS; TRANSMISSION SCHEMES; VARIOUS ATTACKS;

EID: 84865705618     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2012.01.009     Document Type: Article
Times cited : (54)

References (37)
  • 1
    • 84865720657 scopus 로고    scopus 로고
    • Patientslikeme
    • Patientslikeme. .
  • 2
    • 84865720658 scopus 로고    scopus 로고
    • AT&T Healthcare Community Online (HCO)
    • AT&T Healthcare Community Online (HCO). .
  • 4
    • 77954838422 scopus 로고    scopus 로고
    • Managing healthcare through social networks
    • M. Domingo Managing healthcare through social networks IEEE Computer Magazine 43 7 2010 20 25
    • (2010) IEEE Computer Magazine , vol.43 , Issue.7 , pp. 20-25
    • Domingo, M.1
  • 7
    • 84861648316 scopus 로고    scopus 로고
    • Exploiting Prediction to Enable Secure and Reliable Routing in Wireless Body Area Networks
    • X. Liang, X. Li, Q. Shen, R. Lu, X. Lin, X. Shen, W. Zhang, Exploiting Prediction to Enable Secure and Reliable Routing in Wireless Body Area Networks, in: IEEE INFOCOM 2012.
    • (2012) IEEE INFOCOM
    • Liang, X.1    Li, X.2    Shen, Q.3    Lu, R.4    Lin, X.5    Shen, X.6    Zhang, W.7
  • 8
    • 77649098516 scopus 로고    scopus 로고
    • Special Issue on Wireless Technologies for E-healthcare
    • X. Shen, N. Kato, X. Lin (guest editors), IEEE Wireless Communications, Special Issue on Wireless Technologies for E-healthcare 17 (1) (2010).
    • (2010) IEEE Wireless Communications , vol.17 , Issue.1
    • Shen, X.1    Kato, N.2    Lin, X.3
  • 10
    • 67349253018 scopus 로고    scopus 로고
    • Sage: A strong privacy-preserving scheme against global eavesdropping for ehealth systems
    • X. Lin, R. Lu, X. Shen, Y. Nemoto, and N. Kato Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems IEEE Journal on Selected Areas in Communication 27 4 2009 365 378
    • (2009) IEEE Journal on Selected Areas in Communication , vol.27 , Issue.4 , pp. 365-378
    • Lin, X.1    Lu, R.2    Shen, X.3    Nemoto, Y.4    Kato, N.5
  • 12
    • 77953319755 scopus 로고    scopus 로고
    • Routing in socially selfish delay tolerant networks
    • Q. Li, S. Zhu, G. Cao, Routing in socially selfish delay tolerant networks, in: IEEE INFOCOM, 2010, pp. 857-865.
    • (2010) IEEE INFOCOM , pp. 857-865
    • Li, Q.1    Zhu, S.2    Cao, G.3
  • 13
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • D. Boneh, M.K. Franklin, Identity-based encryption from the weil pairing, in: CRYPTO, 2001, pp. 213-229.
    • (2001) CRYPTO , pp. 213-229
    • Boneh, D.1    Franklin, M.K.2
  • 14
    • 37149007674 scopus 로고    scopus 로고
    • Full-domain subgroup hiding and constant-size group signatures
    • X. Boyen, B. Waters, Full-domain subgroup hiding and constant-size group signatures, in: Public Key Cryptography, 2007, pp. 1-15.
    • (2007) Public Key Cryptography , pp. 1-15
    • Boyen, X.1    Waters, B.2
  • 15
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • B. Waters, Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization, in: Public Key Cryptography, 2011, pp. 53-70.
    • (2011) Public Key Cryptography , pp. 53-70
    • Waters, B.1
  • 17
    • 38149009170 scopus 로고    scopus 로고
    • Short signatures without random oracles and the sdh assumption in bilinear groups
    • D. Boneh, and X. Boyen Short signatures without random oracles and the sdh assumption in bilinear groups Journal of Cryptology 21 2 2008 149 177
    • (2008) Journal of Cryptology , vol.21 , Issue.2 , pp. 149-177
    • Boneh, D.1    Boyen, X.2
  • 20
    • 84865734745 scopus 로고    scopus 로고
    • Multiprecision Integer and Rational Arithmetic C/C++ Library
    • Multiprecision Integer and Rational Arithmetic C/C++ Library. .
  • 24
    • 84862685743 scopus 로고    scopus 로고
    • Secure handshake with symptoms-matching: The essential to the success of mhealthcare social network
    • R. Lu, X. Lin, X. Liang, X. Shen, Secure handshake with symptoms-matching: the essential to the success of mhealthcare social network, in: BodyNets 2010.
    • (2010) BodyNets
    • Lu, R.1    Lin, X.2    Liang, X.3    Shen, X.4
  • 26
  • 27
    • 77954584058 scopus 로고    scopus 로고
    • To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles
    • E. Zheleva, L. Getoor, To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles, in: International World Wide Web Conference (WWW), 2009, pp. 531-540.
    • (2009) International World Wide Web Conference (WWW) , pp. 531-540
    • Zheleva, E.1    Getoor, L.2
  • 28
    • 84995488432 scopus 로고    scopus 로고
    • On the leakage of personally identifiable information via online social networks
    • B. Krishnamurthy, C.E. Wills, On the leakage of personally identifiable information via online social networks, in: Workshop on Online Social Networks (WOSN), 2009, pp. 7-12.
    • (2009) Workshop on Online Social Networks (WOSN) , pp. 7-12
    • Krishnamurthy, B.1    Wills, C.E.2
  • 34
    • 79956315983 scopus 로고    scopus 로고
    • Pec: A privacy-preserving emergency call scheme for mobile healthcare social networks
    • X. Liang, L. Chen, R. Lu, X. Lin, and X. Shen Pec: a privacy-preserving emergency call scheme for mobile healthcare social networks IEEE/KICS Journal Communications and Networks 13 2 2011 102 112
    • (2011) IEEE/KICS Journal Communications and Networks , vol.13 , Issue.2 , pp. 102-112
    • Liang, X.1    Chen, L.2    Lu, R.3    Lin, X.4    Shen, X.5
  • 36
    • 45849114411 scopus 로고    scopus 로고
    • A privacy-preserving ehealth protocol compliant with the belgian healthcare system
    • B.D. Decker, M. Layouni, H. Vangheluwe, K. Verslype, A privacy-preserving ehealth protocol compliant with the belgian healthcare system, in: EuroPKI, 2008, pp. 118-133.
    • (2008) EuroPKI , pp. 118-133
    • Decker, B.D.1    Layouni, M.2    Vangheluwe, H.3    Verslype, K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.