-
1
-
-
68249129760
-
-
February
-
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: A berkeley view of cloud computing (February 2009)
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
2
-
-
84885887371
-
-
At risk of exposure - in the push for electronic medical records, concern is growing about how well privacy can be safeguarded
-
At risk of exposure - in the push for electronic medical records, concern is growing about how well privacy can be safeguarded (2006), http://articles.latimes.com/2006/jun/26/health/he-privacy26
-
(2006)
-
-
-
4
-
-
74049110390
-
Patient controlled encryption: Ensuring privacy of electronic medical records
-
Benaloh, J., Chase, M., Horvitz, E., Lauter, K.: Patient controlled encryption: ensuring privacy of electronic medical records. In: CCSW 2009: Proceedings of the 2009 ACM workshop on Cloud computing security, pp. 103-114 (2009)
-
(2009)
CCSW 2009: Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 103-114
-
-
Benaloh, J.1
Chase, M.2
Horvitz, E.3
Lauter, K.4
-
5
-
-
0035798841
-
Public standards and patients' control: How to keep electronic medical records accessible but private
-
Mandl, K.D., Szolovits, P., Kohane, I.S.: Public standards and patients' control: how to keep electronic medical records accessible but private. BMJ 322(7281), 283 (2001)
-
(2001)
BMJ
, vol.322
, Issue.7281
, pp. 283
-
-
Mandl, K.D.1
Szolovits, P.2
Kohane, I.S.3
-
6
-
-
74049154660
-
Secure and efficient access to outsourced data
-
Wang, W., Li, Z., Owens, R., Bhargava, B.: Secure and efficient access to outsourced data. In: CCSW 2009, pp. 55-66 (2009)
-
(2009)
CCSW 2009
, pp. 55-66
-
-
Wang, W.1
Li, Z.2
Owens, R.3
Bhargava, B.4
-
7
-
-
33244469997
-
Key management for multi-user encrypted databases
-
DOI 10.1145/1103780.1103792, StorageSS'05 - Proceedings of the 2005 ACM Workshop on Storage Security and Survivability
-
Damiani, E., di Vimercati, S.D.C., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Key management for multi-user encrypted databases. In: StorageSS 2005, pp. 74-83 (2005) (Pubitemid 43275375)
-
(2005)
StorageSS'05 - Proceedings of the 2005 ACM Workshop on Storage Security and Survivability
, pp. 74-83
-
-
Damiani, E.1
Jajodia, S.2
De Capitani Di Vimercati, S.3
Paraboschi, S.4
Foresti, S.5
Samarati, P.6
-
8
-
-
33745793594
-
Dynamic and efficient key management for access hierarchies
-
DOI 10.1145/1102120.1102147, CCS 2005 - Proceedings of the 12th ACM Conference on Computer and Communications Security
-
Atallah, M.J., Frikken, K.B., Blanton, M.: Dynamic and efficient key management for access hierarchies. In: CCS 2005, pp. 190-202 (2005) (Pubitemid 44022003)
-
(2005)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 190-202
-
-
Atallah, M.J.1
Frikken, K.B.2
Blanton, M.3
-
9
-
-
77955710442
-
Managing key hierarchies for access control enforcement: Heuristic approaches
-
(to appear)
-
Blundo, C., Cimato, S., De Capitani di Vimercati, S., De Santis, A., Foresti, S., Paraboschi, S., Samarati, P.: Managing key hierarchies for access control enforcement: Heuristic approaches. In: Computers & Security (2010) (to appear)
-
(2010)
Computers & Security
-
-
Blundo, C.1
Cimato, S.2
De Capitani Di Vimercati, S.3
De Santis, A.4
Foresti, S.5
Paraboschi, S.6
Samarati, P.7
-
10
-
-
84880926360
-
Draft security architecture design process for health information exchanges (HIEs)
-
Scholl, M., Stine, K., Lin, K., Steinberg, D.: Draft security architecture design process for health information exchanges (HIEs). Report, NIST (2009)
-
(2009)
Report, NIST
-
-
Scholl, M.1
Stine, K.2
Lin, K.3
Steinberg, D.4
-
11
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM TISSEC 4(3), 224-274 (2001)
-
(2001)
ACM TISSEC
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
12
-
-
70450252045
-
Patient-centric authorization framework for sharing electronic health records
-
Jin, J., Ahn, G.-J., Hu, H., Covington, M.J., Zhang, X.: Patient-centric authorization framework for sharing electronic health records. In: SACMAT 2009, pp. 125-134 (2009)
-
(2009)
SACMAT 2009
, pp. 125-134
-
-
Jin, J.1
Ahn, G.-J.2
Hu, H.3
Covington, M.J.4
Zhang, X.5
-
13
-
-
85011043313
-
Overencryption: Management of access control evolution on outsourced data
-
di Vimercati, S.D.C., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Overencryption: management of access control evolution on outsourced data. In: VLDB 2007, pp. 123-134 (2007)
-
(2007)
VLDB 2007
, pp. 123-134
-
-
Di Vimercati, S.D.C.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
14
-
-
50249137692
-
Shared and searchable encrypted data for untrusted servers
-
Dong, C., Russello, G., Dulay, N.: Shared and searchable encrypted data for untrusted servers. In: DBSec 2008, pp. 127-143 (2008)
-
(2008)
DBSec 2008
, pp. 127-143
-
-
Dong, C.1
Russello, G.2
Dulay, N.3
-
16
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
DOI 10.1145/1180405.1180418, 1180418, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for finegrained access control of encrypted data. In: CCS 2006, pp. 89-98 (2006) (Pubitemid 47131359)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
17
-
-
69949166012
-
Identity-based encryption with efficient revocation
-
Boldyreva, A., Goyal, V., Kumar, V.: Identity-based encryption with efficient revocation. In: CCS 2008, pp. 417-426 (2008)
-
(2008)
CCS 2008
, pp. 417-426
-
-
Boldyreva, A.1
Goyal, V.2
Kumar, V.3
-
18
-
-
79951972056
-
-
Ibraimi, L., Petkovic, M., Nikova, S., Hartel, P., Jonker, W.: Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes (2009), http://purl.org/utwente/65471
-
(2009)
Ciphertext-policy Attribute-based Threshold Decryption with Flexible Delegation and Revocation of User Attributes
-
-
Ibraimi, L.1
Petkovic, M.2
Nikova, S.3
Hartel, P.4
Jonker, W.5
-
19
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: IEEE INFOCOM 2010 (2010)
-
(2010)
IEEE INFOCOM 2010
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
20
-
-
77954471010
-
Attribute based data sharing with attribute revocation
-
Yu, S., Wang, C., Ren, K., Lou, W.: Attribute based data sharing with attribute revocation. In: ASIACCS 2010 (2010)
-
(2010)
ASIACCS 2010
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
21
-
-
79959305027
-
Patient self-controllable access policy on phi in ehealthcare systems
-
Liang, X., Lu, R., Lin, X., Shen, X.S.: Patient self-controllable access policy on phi in ehealthcare systems. In: AHIC 2010 (2010)
-
(2010)
AHIC 2010
-
-
Liang, X.1
Lu, R.2
Lin, X.3
Shen, X.S.4
-
22
-
-
80755124440
-
Secure management of personal health records by applying attribute-based encryption
-
Ibraimi, L., Asim, M., Petkovic, M.: Secure management of personal health records by applying attribute-based encryption. Technical Report, University of Twente (2009)
-
(2009)
Technical Report, University of Twente
-
-
Ibraimi, L.1
Asim, M.2
Petkovic, M.3
-
23
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
DOI 10.1109/SP.2007.11, 4223236, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
-
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE S& P 2007, pp. 321-334 (2007) (Pubitemid 47432538)
-
(2007)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
24
-
-
74049163235
-
Improving privacy and security in multi-authority attribute-based encryption
-
Chase, M., Chow, S.S.: Improving privacy and security in multi-authority attribute-based encryption. In: CCS 2009, pp. 121-130 (2009)
-
(2009)
CCS 2009
, pp. 121-130
-
-
Chase, M.1
Chow, S.S.2
-
25
-
-
79957599737
-
Ciphertext policy attribute based encryption with efficient revocation
-
Liang, X., Lu, R., Lin, X., Shen, X.S.: Ciphertext policy attribute based encryption with efficient revocation. Technical Report, University of Waterloo (2010)
-
(2010)
Technical Report, University of Waterloo
-
-
Liang, X.1
Lu, R.2
Lin, X.3
Shen, X.S.4
|