메뉴 건너뛰기




Volumn 50 LNICST, Issue , 2010, Pages 89-106

Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings

Author keywords

Attribute based encryption; Cloud computing; Fine grained access control; Patient centric privacy; Personal health records

Indexed keywords

ACCESS CONTROL SCHEMES; ATTRIBUTE-BASED ENCRYPTION; COMPUTING ENVIRONMENTS; CRYPTOGRAPHIC KEY; DATA ACCESS CONTROL; EMERGENCY SCENARIO; FINE-GRAINED ACCESS CONTROL; FULL CONTROL; KEY DISTRIBUTION; KEY MANAGEMENT; MEDICAL RECORD; MULTIPLE SECURITIES; OPERATIONAL COSTS; PATIENT-CENTRIC PRIVACY; PERSONAL HEALTH; PERSONAL HEALTH RECORD; PHYSICAL CONTROL; SERVICE PROVIDER; USER ACCESS;

EID: 84872006849     PISSN: 18678211     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-16161-2_6     Document Type: Conference Paper
Times cited : (343)

References (25)
  • 2
    • 84885887371 scopus 로고    scopus 로고
    • At risk of exposure - in the push for electronic medical records, concern is growing about how well privacy can be safeguarded
    • At risk of exposure - in the push for electronic medical records, concern is growing about how well privacy can be safeguarded (2006), http://articles.latimes.com/2006/jun/26/health/he-privacy26
    • (2006)
  • 5
    • 0035798841 scopus 로고    scopus 로고
    • Public standards and patients' control: How to keep electronic medical records accessible but private
    • Mandl, K.D., Szolovits, P., Kohane, I.S.: Public standards and patients' control: how to keep electronic medical records accessible but private. BMJ 322(7281), 283 (2001)
    • (2001) BMJ , vol.322 , Issue.7281 , pp. 283
    • Mandl, K.D.1    Szolovits, P.2    Kohane, I.S.3
  • 6
    • 74049154660 scopus 로고    scopus 로고
    • Secure and efficient access to outsourced data
    • Wang, W., Li, Z., Owens, R., Bhargava, B.: Secure and efficient access to outsourced data. In: CCSW 2009, pp. 55-66 (2009)
    • (2009) CCSW 2009 , pp. 55-66
    • Wang, W.1    Li, Z.2    Owens, R.3    Bhargava, B.4
  • 10
    • 84880926360 scopus 로고    scopus 로고
    • Draft security architecture design process for health information exchanges (HIEs)
    • Scholl, M., Stine, K., Lin, K., Steinberg, D.: Draft security architecture design process for health information exchanges (HIEs). Report, NIST (2009)
    • (2009) Report, NIST
    • Scholl, M.1    Stine, K.2    Lin, K.3    Steinberg, D.4
  • 12
    • 70450252045 scopus 로고    scopus 로고
    • Patient-centric authorization framework for sharing electronic health records
    • Jin, J., Ahn, G.-J., Hu, H., Covington, M.J., Zhang, X.: Patient-centric authorization framework for sharing electronic health records. In: SACMAT 2009, pp. 125-134 (2009)
    • (2009) SACMAT 2009 , pp. 125-134
    • Jin, J.1    Ahn, G.-J.2    Hu, H.3    Covington, M.J.4    Zhang, X.5
  • 14
    • 50249137692 scopus 로고    scopus 로고
    • Shared and searchable encrypted data for untrusted servers
    • Dong, C., Russello, G., Dulay, N.: Shared and searchable encrypted data for untrusted servers. In: DBSec 2008, pp. 127-143 (2008)
    • (2008) DBSec 2008 , pp. 127-143
    • Dong, C.1    Russello, G.2    Dulay, N.3
  • 17
    • 69949166012 scopus 로고    scopus 로고
    • Identity-based encryption with efficient revocation
    • Boldyreva, A., Goyal, V., Kumar, V.: Identity-based encryption with efficient revocation. In: CCS 2008, pp. 417-426 (2008)
    • (2008) CCS 2008 , pp. 417-426
    • Boldyreva, A.1    Goyal, V.2    Kumar, V.3
  • 19
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: IEEE INFOCOM 2010 (2010)
    • (2010) IEEE INFOCOM 2010
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 20
    • 77954471010 scopus 로고    scopus 로고
    • Attribute based data sharing with attribute revocation
    • Yu, S., Wang, C., Ren, K., Lou, W.: Attribute based data sharing with attribute revocation. In: ASIACCS 2010 (2010)
    • (2010) ASIACCS 2010
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 21
    • 79959305027 scopus 로고    scopus 로고
    • Patient self-controllable access policy on phi in ehealthcare systems
    • Liang, X., Lu, R., Lin, X., Shen, X.S.: Patient self-controllable access policy on phi in ehealthcare systems. In: AHIC 2010 (2010)
    • (2010) AHIC 2010
    • Liang, X.1    Lu, R.2    Lin, X.3    Shen, X.S.4
  • 24
    • 74049163235 scopus 로고    scopus 로고
    • Improving privacy and security in multi-authority attribute-based encryption
    • Chase, M., Chow, S.S.: Improving privacy and security in multi-authority attribute-based encryption. In: CCS 2009, pp. 121-130 (2009)
    • (2009) CCS 2009 , pp. 121-130
    • Chase, M.1    Chow, S.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.