메뉴 건너뛰기




Volumn 5, Issue 3, 2013, Pages 2201-2209

Dynamic federation in identity management for securing and sharing personal health records in a patientcentric model in cloud

Author keywords

Attribute based encryption; Cloud Computing; Data privacy; Dynamic trust management; Fine grained access control; Identity management; Personal health records; Privacy

Indexed keywords


EID: 84880953053     PISSN: None     EISSN: 09754024     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (4)

References (33)
  • 2
    • 84880937739 scopus 로고    scopus 로고
    • Securing Personal Health Records in Cloud Computing: Patient-centric and Fine-grained Data Access Control in Multi-owner Settings
    • NO. XX, XX
    • Ming Li, Shucheng Yu, Yao Zheng and Kui Ren, and Wenjing Lou1 "Securing Personal Health Records in Cloud Computing: Patient-centric and Fine-grained Data Access Control in Multi-owner Settings"IEEE Transactions on parallel and distributed systems vol. XX, NO. XX, XX 2012
    • (2012) IEEE Transactions on parallel and distributed systems , vol.20
    • Li, M.1    Yu, S.2    Zheng, Y.3    Ren, K.4    Loul, W.5
  • 3
    • 84880954860 scopus 로고    scopus 로고
    • http://docs.oracle.com/cd/B28196_01/idmanage.1014/b25355/intro.htm
  • 5
    • 0035798841 scopus 로고    scopus 로고
    • Public standards and patients' control: how to keep electronic medical records accessible but private
    • no. 7281, Feb
    • K. D. Mandl, P. Szolovits, and I. S. Kohane, "Public standards and patients' control: how to keep electronic medical records accessible but private," BMJ, vol. 322, no. 7281, p. 283, Feb. 2001.
    • (2001) BMJ , vol.322 , pp. 283
    • Mandl, K.D.1    Szolovits, P.2    Kohane, I.S.3
  • 6
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • In CCS '06
    • V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in CCS '06, 2006, pp. 89-98.
    • (2006) , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 7
    • 84880926360 scopus 로고    scopus 로고
    • Draft security architecture design process for health information exchanges (HIEs)
    • M. Scholl, K. Stine, K. Lin, and D. Steinberg, "Draft security architecture design process for health information exchanges (HIEs)," Report, NIST, 2009.
    • (2009) Report, NIST
    • Scholl, M.1    Stine, K.2    Lin, K.3    Steinberg, D.4
  • 9
    • 85011043313 scopus 로고    scopus 로고
    • Overencryption: management of access control evolution on outsourced data
    • in VLDB '07
    • S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, "Overencryption: management of access control evolution on outsourced data," in VLDB '07, 2007, pp. 123-134.
    • (2007) , pp. 123-134
    • di Vimercati, S.D.C.1    Foresti, S.2    Jajodia, S.3    Paraboschi, S.4    Samarati, P.5
  • 11
    • 74049154660 scopus 로고    scopus 로고
    • Secure and efficient access to outsourced data
    • in CCSW '09
    • W. Wang, Z. Li, R. Owens, and B. Bhargava, "Secure and efficient access to outsourced data," in CCSW '09, 2009, pp. 55-66.
    • (2009) , pp. 55-66
    • Wang, W.1    Li, Z.2    Owens, R.3    Bhargava, B.4
  • 13
    • 79951972056 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes
    • Online. Available
    • L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, "Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes," 2009. [Online]. Available: http://purl.org/utwente/65471
    • (2009)
    • Ibraimi, L.1    Petkovic, M.2    Nikova, S.3    Hartel, P.4    Jonker, W.5
  • 14
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • in IEEE INFOCOM'10
    • S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," in IEEE INFOCOM'10, 2010.
    • (2010)
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 15
    • 77954471010 scopus 로고    scopus 로고
    • Attribute based data sharing with attribute revocation
    • in ASIACCS'10
    • "Attribute based data sharing with attribute revocation," in ASIACCS'10, 2010.
    • (2010)
  • 16
    • 79959305027 scopus 로고    scopus 로고
    • Patient self-controllable access policy on phi in ehealthcare systems
    • X. Liang, R. Lu, X. Lin, and X. S. Shen, "Patient self-controllable access policy on phi in ehealthcare systems," in AHIC 2010, 2010.
    • (2010) AHIC
    • Liang, X.1    Lu, R.2    Lin, X.3    Shen, X.S.4
  • 17
    • 80052929091 scopus 로고    scopus 로고
    • Sharing Cloud Services: User Authentication for Social Enhancement of Home Networking
    • no.3, May
    • S.Grzonkowski and P.Corcoran, "Sharing Cloud Services: User Authentication for Social Enhancement of Home Networking", IEEE Transactions on Consumer Electronics, vol.57, no.3, May 2011.
    • (2011) IEEE Transactions on Consumer Electronics , vol.57
    • Grzonkowski, S.1    Corcoran, P.2
  • 20
    • 3142738238 scopus 로고    scopus 로고
    • PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities
    • no. 7
    • L. Xiong and L. Liu, "PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities", IEEE Transactions on Knowledge and Data Eng., vol. 16, no. 7, pp. 843-857, 2004.
    • (2004) IEEE Transactions on Knowledge and Data Eng , vol.16 , pp. 843-857
    • Xiong, L.1    Liu, L.2
  • 23
    • 42649112032 scopus 로고    scopus 로고
    • Privacy Online: Fair Information Practices in the Electronic Marketplace
    • Federal Trade Commission Washington DC, May
    • Federal Trade Commission, "Privacy Online: Fair Information Practices in the Electronic Marketplace", A Federal Trade Commission Report to Congress. Washington DC, May 2000.
    • (2000) A Federal Trade Commission Report to Congress
  • 24
    • 84880936381 scopus 로고    scopus 로고
    • Protecting Consumer Privacy in an Era of Rapid Change
    • Federal Trade Commission (FTC) Dec
    • Federal Trade Commission (FTC), "Protecting Consumer Privacy in an Era of Rapid Change", Preliminary FTC Staff Report, Dec. 2011.
    • (2011) Preliminary FTC Staff Report
  • 27
    • 85011043313 scopus 로고    scopus 로고
    • Over-encryption: management of access control evolution on outsourced data
    • in VLDB '07 b28
    • S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, "Over-encryption: management of access control evolution on outsourced data," in VLDB '07, 2007, pp. 123-134. [b28]
    • (2007) , pp. 123-134
    • di Vimercati, S.D.C.1    Foresti, S.2    Jajodia, S.3    Paraboschi, S.4    Samarati, P.5
  • 28
    • 77954471010 scopus 로고    scopus 로고
    • Attribute based data sharing with attribute revocation
    • in ASIACCS'10
    • S. Yu, C. Wang, K. Ren, and W. Lou, "Attribute based data sharing with attribute revocation," in ASIACCS'10, 2010.
    • (2010)
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 29
    • 74049163235 scopus 로고    scopus 로고
    • Improving privacy and security in multi-authority attribute-based encryption
    • in CCS '09
    • M. Chase and S. S. Chow, "Improving privacy and security in multi-authority attribute-based encryption," in CCS '09, 2009, pp. 121-130.
    • (2009) , pp. 121-130
    • Chase, M.1    Chow, S.S.2
  • 30
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," in IEEE INFOCOM'10, 2010.
    • (2010) IEEE INFOCOM , vol.10
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 31
    • 0005858785 scopus 로고    scopus 로고
    • The health insurance portability and accountability act
    • Online. Available
    • "The health insurance portability and accountability act." [Online]. Available: http://www.cms.hhs.gov/HIPAAGenInfo/01Overview.asp
  • 32
    • 33846834126 scopus 로고    scopus 로고
    • A survey of trust and reputation systems for online service provision
    • no. 2, Elsevier (ed.)
    • A. Jøsang, R. Ismail, and C. Boyd, "A survey of trust and reputation systems for online service provision", Decision Support System, vol. 43, no. 2, pp. 681-644, Elsevier (ed.), 2007.
    • (2007) Decision Support System , vol.43 , pp. 681-644
    • Jøsang, A.1    Ismail, R.2    Boyd, C.3
  • 33
    • 84880964749 scopus 로고    scopus 로고
    • www.cloudfoundry.com


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.